Mock Version: 1.2.17 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target i686 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.79.0-5.el7_9-20230320160924-16911/root'shell=FalseprintOutput=Falseenv={'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0logger=uid=1005) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target i686 --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: i686 Building for target i686 Wrote: /builddir/build/SRPMS/nss-3.79.0-5.el7_9.src.rpm Child return code was: 0 ENTER ['do'](['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target i686 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.79.0-5.el7_9-20230320160924-16911/root'shell=Falseuid=1005env={'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0private_network=Truelogger=printOutput=False) Executing command: ['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target i686 --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: i686 Building for target i686 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.fl9eJI + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.79 + /usr/bin/tar -xf - + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.79.tar.gz + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.79 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . Patch #2 (add-relro-linker-option.patch): + echo 'Patch #2 (add-relro-linker-option.patch):' + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 188 (offset 14 lines). + echo 'Patch #3 (renegotiate-transitional.patch):' Patch #3 (renegotiate-transitional.patch): + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 72 (offset 5 lines). Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk + echo 'Patch #50 (iquote.patch):' Patch #50 (iquote.patch): + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/httpserv/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile patching file ./nss/cmd/pk12util/Makefile patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk Hunk #1 succeeded at 42 (offset -3 lines). patching file ./nss/gtests/ssl_gtest/Makefile Hunk #1 succeeded at 52 (offset -1 lines). patching file ./nss/lib/certhigh/Makefile Hunk #1 succeeded at 36 (offset -2 lines). patching file ./nss/lib/cryptohi/Makefile Hunk #1 succeeded at 36 (offset -2 lines). patching file ./nss/lib/libpkix/pkix/checker/Makefile Hunk #1 succeeded at 37 (offset -1 lines). patching file ./nss/lib/nss/Makefile patching file ./nss/lib/pkcs12/Makefile Hunk #1 succeeded at 37 (offset -2 lines). patching file ./nss/lib/ssl/Makefile + pushd nss ~/build/BUILD/nss-3.79/nss ~/build/BUILD/nss-3.79 Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file ./cmd/Makefile patching file ./cmd/shlibsign/Makefile + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1435 (offset 30 lines). Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh + echo 'Patch #56 (p-ignore-setpolicy.patch):' Patch #56 (p-ignore-setpolicy.patch): + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p1 -b --suffix .1026677_ignore_set_policy --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1721 (offset 330 lines). Hunk #2 succeeded at 1732 (offset 330 lines). Patch #62 (nss-fix-deadlock-squash.patch): + echo 'Patch #62 (nss-fix-deadlock-squash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-fix-deadlock-squash.patch + /usr/bin/patch -p1 -b --suffix .fix_deadlock --fuzz=0 patching file lib/pki/tdcache.c Hunk #5 succeeded at 1110 (offset 8 lines). Patch #100 (nss-3.79-version-range.patch): + echo 'Patch #100 (nss-3.79-version-range.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-version-range.patch + /usr/bin/patch -p1 -b --suffix .version-range --fuzz=0 patching file lib/ssl/sslsock.c + popd ~/build/BUILD/nss-3.79 Patch #108 (nss-sni-c-v-fix.patch): + echo 'Patch #108 (nss-sni-c-v-fix.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sni-c-v-fix.patch + /usr/bin/patch -p0 -b --suffix .sni_c_v_fix --fuzz=0 patching file nss/tests/ssl/sslauth.txt Hunk #1 succeeded at 72 (offset 8 lines). + pushd nss ~/build/BUILD/nss-3.79/nss ~/build/BUILD/nss-3.79 Patch #123 (nss-skip-util-gtest.patch): + echo 'Patch #123 (nss-skip-util-gtest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-util-gtest.patch + /usr/bin/patch -p1 -b --suffix .skip-util-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 55 (offset 20 lines). patching file gtests/ssl_gtest/manifest.mn Hunk #1 succeeded at 72 (offset 5 lines). + echo 'Patch #126 (nss-reorder-cipher-suites.patch):' Patch #126 (nss-reorder-cipher-suites.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 100 (offset 10 lines). Hunk #2 succeeded at 146 (offset 10 lines). patching file lib/ssl/sslenum.c + echo 'Patch #127 (nss-disable-cipher-suites.patch):' Patch #127 (nss-disable-cipher-suites.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-disable-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .disable-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 106 (offset 10 lines). Hunk #2 succeeded at 118 (offset 10 lines). Patch #130 (nss-reorder-cipher-suites-gtests.patch): + echo 'Patch #130 (nss-reorder-cipher-suites-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites-gtests.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites-gtests --fuzz=0 patching file gtests/ssl_gtest/ssl_auth_unittest.cc Hunk #1 succeeded at 1156 (offset 120 lines). Hunk #2 succeeded at 2112 (offset 279 lines). Hunk #3 succeeded at 2145 (offset 279 lines). patching file gtests/ssl_gtest/ssl_recordsize_unittest.cc patching file gtests/ssl_gtest/ssl_staticrsa_unittest.cc patching file gtests/ssl_gtest/tls_agent.cc Hunk #1 succeeded at 605 (offset 2 lines). Patch #136 (nss-sql-default.patch): + echo 'Patch #136 (nss-sql-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default.patch + /usr/bin/patch -p1 -b --suffix .sql-default --fuzz=0 patching file tests/all.sh Hunk #1 succeeded at 118 (offset 4 lines). Hunk #2 succeeded at 175 (offset 4 lines). patching file tests/merge/merge.sh + echo 'Patch #139 (nss-modutil-skip-changepw-fips.patch):' Patch #139 (nss-modutil-skip-changepw-fips.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-modutil-skip-changepw-fips.patch + /usr/bin/patch -p1 -b --suffix .modutil-skip-changepw-fips --fuzz=0 patching file cmd/modutil/pk11.c Hunk #1 succeeded at 813 (offset 49 lines). + echo 'Patch #148 (nss-sysinit-userdb.patch):' Patch #148 (nss-sysinit-userdb.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-userdb.patch + /usr/bin/patch -p1 -b --suffix .sysinit-userdb --fuzz=0 -R patching file lib/sysinit/nsssysinit.c Hunk #1 succeeded at 36 (offset -1 lines). Hunk #2 succeeded at 49 (offset -1 lines). Patch #141 (nss-sysinit-getenv.patch): + echo 'Patch #141 (nss-sysinit-getenv.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-getenv.patch + /usr/bin/patch -p1 -b --suffix .sysinit-getenv --fuzz=0 patching file lib/sysinit/nsssysinit.c Hunk #3 succeeded at 100 (offset 1 line). + echo 'Patch #149 (nss-skip-sysinit-gtests.patch):' Patch #149 (nss-skip-sysinit-gtests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-skip-sysinit-gtests.patch + /usr/bin/patch -p1 -b --suffix .skip-sysinit-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 33 (offset 2 lines). Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch): + echo 'Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-ssl2-compatible-client-hello.patch + /usr/bin/patch -p1 -b --suffix .ssl2hello --fuzz=0 patching file lib/ssl/sslsock.c + echo 'Patch #152 (nss-version-range-set.patch):' Patch #152 (nss-version-range-set.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-version-range-set.patch + /usr/bin/patch -p1 -b --suffix .version-range-set --fuzz=0 patching file gtests/ssl_gtest/ssl_versionpolicy_unittest.cc patching file lib/ssl/sslsock.c Hunk #1 succeeded at 2798 (offset 256 lines). Hunk #2 succeeded at 2806 (offset 256 lines). Patch #156 (nss-skip-cavs-tests.patch): + echo 'Patch #156 (nss-skip-cavs-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-cavs-tests.patch + /usr/bin/patch -p1 -b --suffix .skip-cavs --fuzz=0 patching file tests/fips/fips.sh Patch #128 (nss-3.67-revert-sql-manage-change.patch): + echo 'Patch #128 (nss-3.67-revert-sql-manage-change.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.67-revert-sql-manage-change.patch + /usr/bin/patch -p1 -b --suffix .sql-man-page --fuzz=0 -R patching file doc/certutil.xml patching file doc/html/certutil.html patching file doc/html/derdump.html patching file doc/html/modutil.html patching file doc/html/pk12util.html patching file doc/html/pp.html patching file doc/html/signver.html patching file doc/html/ssltap.html patching file doc/modutil.xml patching file doc/nroff/certutil.1 patching file doc/nroff/crlutil.1 patching file doc/nroff/derdump.1 patching file doc/nroff/modutil.1 patching file doc/nroff/pk12util.1 patching file doc/nroff/pp.1 patching file doc/nroff/signtool.1 patching file doc/nroff/signver.1 patching file doc/nroff/ssltap.1 patching file doc/nroff/vfychain.1 patching file doc/nroff/vfyserv.1 patching file doc/pk12util.xml patching file doc/signver.xml Patch #158 (nss-sql-default-tests.patch): + echo 'Patch #158 (nss-sql-default-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default-tests.patch + /usr/bin/patch -p1 -b --suffix .sql-default-tests --fuzz=0 patching file tests/all.sh patching file tests/common/init.sh Hunk #1 succeeded at 722 (offset 71 lines). patching file tests/remote/Makefile + echo 'Patch #159 (nss-disable-dc.patch):' Patch #159 (nss-disable-dc.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-disable-dc.patch + /usr/bin/patch -p1 -b --suffix .dc --fuzz=0 patching file gtests/ssl_gtest/manifest.mn patching file lib/ssl/sslsock.c Hunk #1 succeeded at 828 (offset 9 lines). Hunk #2 succeeded at 1346 (offset 9 lines). + echo 'Patch #160 (nss-3.66-restore-old-pkcs12-default.patch):' Patch #160 (nss-3.66-restore-old-pkcs12-default.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-restore-old-pkcs12-default.patch + /usr/bin/patch -p1 -b --suffix .restore-pkcs12-defaults --fuzz=0 patching file cmd/pk12util/pk12util.c Hunk #1 succeeded at 1042 (offset 11 lines). Hunk #2 succeeded at 1160 (offset 11 lines). patching file tests/tools/tools.sh + echo 'Patch #161 (nss-3.66-disable-external-host-test.patch):' Patch #161 (nss-3.66-disable-external-host-test.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-disable-external-host-test.patch + /usr/bin/patch -p1 -b --suffix .brew --fuzz=0 patching file tests/ssl/ssl.sh Hunk #1 succeeded at 1654 (offset 13 lines). + echo 'Patch #162 (nss-3.79-distrusted-certs.patch):' Patch #162 (nss-3.79-distrusted-certs.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-distrusted-certs.patch + /usr/bin/patch -p1 -b --suffix .distrusted-certs --fuzz=0 -R patching file lib/ckfw/builtins/certdata.txt Patch #170 (cve-2023-0767.patch): + echo 'Patch #170 (cve-2023-0767.patch):' + /usr/bin/cat /builddir/build/SOURCES/cve-2023-0767.patch + /usr/bin/patch -p1 -b --suffix .cve-2023-0767 --fuzz=0 patching file lib/pkcs12/p12d.c patching file lib/pkcs12/p12t.h patching file lib/pkcs12/p12tmpl.c Patch #200 (nss-3.79-skip-pwdecrypt-time.patch): + echo 'Patch #200 (nss-3.79-skip-pwdecrypt-time.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-skip-pwdecrypt-time.patch + /usr/bin/patch -p1 -b --suffix .skip-pwdecrypt-time --fuzz=0 patching file tests/sdr/sdr.sh + echo 'Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch):' Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-r7-remove-explicit-ipv4.patch + /usr/bin/patch -p1 -b --suffix .remove-explicit-ipv4 --fuzz=0 patching file tests/ssl/ssl.sh Patch #301 (nss-3.79-fix-client-cert-crash.patch): + echo 'Patch #301 (nss-3.79-fix-client-cert-crash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-fix-client-cert-crash.patch + /usr/bin/patch -p1 -b --suffix .client-cert-crash --fuzz=0 patching file lib/ssl/authcert.c + echo 'Patch #302 (nss-3.79-pkcs12-fix-null-password.patch):' Patch #302 (nss-3.79-pkcs12-fix-null-password.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-pkcs12-fix-null-password.patch + /usr/bin/patch -p1 -b --suffix .fix-pkcs12-null --fuzz=0 patching file lib/pkcs12/p12local.c + popd ~/build/BUILD/nss-3.79 + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low + pushd nss/tests/ssl ~/build/BUILD/nss-3.79/nss/tests/ssl ~/build/BUILD/nss-3.79 + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslcov.txt + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + popd ~/build/BUILD/nss-3.79 + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.wyJA0U + umask 022 + cd /builddir/build/BUILD + cd nss-3.79 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export POLICY_FILE=nss-rhel7.config + POLICY_FILE=nss-rhel7.config + export POLICY_PATH=/etc/pki/nss-legacy + POLICY_PATH=/etc/pki/nss-legacy + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + export NSS_DISABLE_GTESTS=1 + NSS_DISABLE_GTESTS=1 + /usr/bin/make -C ./nss all make: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 # no real way to encode these in any sensible way /usr/bin/make -C coreconf/nsinstall program make[1]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nsinstall.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pathsub.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pathsub.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pathsub.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbase.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 xconst.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certxutl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certdb.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspt.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptoht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 key.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyhi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keythi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sechash.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 dev.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssdevt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssdev.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_errorstrings.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_results.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkixt.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_params.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revchecker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certstore.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pki.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_sample_modules.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_checker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_system.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_util.h ../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcertselparams.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlselector.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certchainchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_ekuchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_expirationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_namechainingchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_nameconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_ocspchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_policychecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revocationmethod.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revocationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_signaturechecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_targetcertchecker.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_trustanchor.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_valparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_resourcelimits.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_policynode.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_valresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_verifynode.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_validate.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_error.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_logger.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_list.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_cert.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyinfo.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicymap.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyqualifier.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crl.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crldp.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crlentry.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_date.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_generalname.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_infoaccess.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nameconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocsprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_publickey.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_x500name.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mem.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_object.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_string.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_primhash.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bigint.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mutex.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bytearray.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_oid.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_hashtable.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_rwlock.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_monitorlock.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_colcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapt.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldaprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nsscontext.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pk11certstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_socket.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 dev3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secpkcs5.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11func.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11hpke.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11pub.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11priv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11sdr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11pqg.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkistore.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkitm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkim.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssoptions.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfw.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfwm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfwtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckmd.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckepv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfw.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfwc.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfwt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckmdt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckt.h ../../../dist/public/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Nothing to be done for `export'. make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmft.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar-ds.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jarfile.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12plcy.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p7local.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secpkcs7.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs7t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmslocal.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 smime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmsreclist.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslexp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslproto.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 preenc.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 page.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 extern.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 queue.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hash.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 search.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ncompat.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 winfile.h ../../../../dist/public/dbm make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11table.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 true -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/arena.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables arena.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/error.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables error.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/errorval.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables errorval.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hashops.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables hashops.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables libc.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tracker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tracker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/item.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables item.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables utf8.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables list.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables hash.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/arena.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/error.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/errorval.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hashops.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libc.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tracker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/item.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/utf8.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/list.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/alg1485.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables alg1485.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certdb.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certv3.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certv3.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certxutl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certxutl.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crl.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/genname.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables genname.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables stanpcertdb.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/polcyxtn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables polcyxtn.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secname.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secname.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xauthkid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables xauthkid.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xbsconst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables xbsconst.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xconst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables xconst.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/alg1485.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdb.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certv3.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certxutl.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crl.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/genname.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secname.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xconst.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certhtml.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certhtml.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certreq.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certreq.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlv2.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crlv2.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocsp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ocsp.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspsig.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ocspsig.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certhigh.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certhigh.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certvfy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certvfy.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certvfypkix.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certvfypkix.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xcrldist.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables xcrldist.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certhtml.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certreq.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlv2.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocsp.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certhigh.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certvfy.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xcrldist.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sechash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sechash.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/seckey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables seckey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secsign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secsign.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secvfy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secvfy.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dsautil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dsautil.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sechash.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/seckey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secsign.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secvfy.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dsautil.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devslot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables devslot.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devtoken.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables devtoken.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables devutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckhelper.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ckhelper.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devslot.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devtoken.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckhelper.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_certselector.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_comcertselparams.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_crlselector.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_comcrlselparams.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_basicconstraintschecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_certchainchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_crlchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_ekuchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_expirationchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_namechainingchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_nameconstraintschecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_ocspchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_revocationmethod.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_revocationchecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_policychecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_signaturechecker.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_targetcertchecker.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_trustanchor.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_procparams.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_valparams.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_resourcelimits.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_buildresult.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_policynode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_valresult.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_verifynode.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_store.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_store.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_store.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_validate.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_validate.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_lifecycle.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_build.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_build.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_build.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_tools.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_tools.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_error.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_error.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_logger.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_logger.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_list.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_errpaths.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_basicconstraints.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_cert.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_certpolicyinfo.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_certpolicymap.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_certpolicyqualifier.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_crl.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_crldp.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_crlentry.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_date.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_generalname.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_infoaccess.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_nameconstraints.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ocsprequest.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ocspresponse.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_publickey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_x500name.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ocspcertid.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_bigint.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_bytearray.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_common.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_error.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_hashtable.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_lifecycle.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_mem.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_monitorlock.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_mutex.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_object.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_oid.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_primhash.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_rwlock.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_string.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_aiamgr.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_colcertstore.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_httpcertstore.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_httpdefaultclient.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ldaptemplates.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ldapcertstore.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ldapresponse.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ldaprequest.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_ldapdefaultclient.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_nsscontext.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_pk11certstore.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix_pl_socket.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dev3hack.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dev3hack.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11akey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11akey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11auth.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11auth.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11cert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11cert.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11cxt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11cxt.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11err.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11err.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11hpke.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11hpke.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11kea.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11kea.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11list.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11load.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11load.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mech.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11mech.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11merge.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11merge.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11nobj.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11nobj.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11obj.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11obj.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pars.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11pars.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pbe.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11pbe.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pk12.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11pk12.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pqg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11pqg.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11sdr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11sdr.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11skey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11skey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11slot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11slot.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11util.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11util.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11err.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11hpke.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11list.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11load.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11util.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/asymmkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables asymmkey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certificate.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certificate.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cryptocontext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cryptocontext.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symmkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables symmkey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/trustdomain.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables trustdomain.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tdcache.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tdcache.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdecode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certdecode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkistore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkistore.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkibase.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkibase.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pki3hack.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pki3hack.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certificate.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symmkey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tdcache.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdecode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkistore.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkibase.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pki3hack.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nssinit.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssoptions.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nssoptions.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nssver.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/utilwrap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables utilwrap.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/utilwrap.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss.def ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss.def -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11hpke.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/arena.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/error.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libc.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/item.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/list.o ../base/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crypto.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crypto.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/find.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables find.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables hash.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/instance.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables instance.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mutex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables mutex.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/object.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables object.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/session.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables session.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sessobj.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sessobj.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/slot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables slot.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/token.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables token.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/wrap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables wrap.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mechanism.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables mechanism.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crypto.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/find.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/instance.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mutex.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/object.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/session.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sessobj.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/slot.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/token.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/wrap.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mechanism.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables anchor.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables constants.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables bfind.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables binst.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables bobject.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables bsession.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables bslot.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables btoken.c perl certdata.perl certdata.txt Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/anchor.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/constants.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bfind.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/binst.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bobject.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bsession.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bslot.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoken.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../anchor.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../bfind.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../binst.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../bobject.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../bsession.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../bslot.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../btoken.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../ckbiver.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins ../constants.c perl ../certdata.perl certdata-testlib.txt Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables -I../../../../lib/ckfw/builtins Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi-testlib.so -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/anchor.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bfind.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/binst.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bobject.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bsession.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bslot.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoken.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/constants.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.o ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so ../../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so ../../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfenc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmfenc.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmftmpl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmftmpl.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfreq.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmfreq.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfpop.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmfpop.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfdec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmfdec.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfget.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmfget.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfcont.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crmfcont.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmmfasn1.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfresp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmmfresp.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfrec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmmfrec.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfchal.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmmfchal.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/servget.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables servget.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables encutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/respcli.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables respcli.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/respcmn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables respcmn.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/challcli.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables challcli.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/asn1cmn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables asn1cmn.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfget.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/servget.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/respcli.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/respcmn.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/challcli.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/asn1cmn.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables jarver.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarsign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables jarsign.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jar.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables jar.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jar-ds.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables jar-ds.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarfile.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables jarfile.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarint.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables jarint.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libjar.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarsign.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jar.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarfile.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/jarint.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libjar.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12local.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12local.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12creat.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12creat.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12dec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12dec.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12plcy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12plcy.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12tmpl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12tmpl.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12e.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12e.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12d.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p12d.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12local.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12creat.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12dec.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12e.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12d.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certread.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certread.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7common.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7common.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7create.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7create.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7decode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7decode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7encode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7encode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7local.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7local.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmime.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secmime.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certread.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7common.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7create.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7decode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7encode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7local.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmime.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsarray.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsarray.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsasn1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsasn1.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsattr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsattr.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmscinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmscinfo.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmscipher.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmscipher.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdecode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsdecode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsdigdata.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdigest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsdigest.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsencdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsencdata.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsencode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsencode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsenvdata.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsmessage.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsmessage.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmspubkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmspubkey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsrecinfo.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsreclist.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsreclist.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmssigdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmssigdata.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmssiginfo.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsudf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsudf.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimemessage.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables smimemessage.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimeutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables smimeutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimever.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables smimever.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimever.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smime.def ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smime.def -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/authcert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables authcert.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmpcert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmpcert.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dtls13con.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dtls13con.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dtlscon.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dtlscon.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/prelib.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables prelib.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables selfencrypt.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3con.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssl3con.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssl3ecc.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3ext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssl3ext.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssl3exthandle.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssl3gthr.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslauth.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslauth.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslbloom.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslbloom.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslcert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslcert.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslcon.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslcon.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssldef.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssldef.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslencode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslencode.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslenum.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslenum.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslerr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslerr.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslerrstrs.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslgrp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslgrp.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslinfo.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslinit.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslmutex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslmutex.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslnonce.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslnonce.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslprimitive.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslprimitive.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslreveal.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslreveal.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsecur.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslsecur.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsnce.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslsnce.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslsock.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslspec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslspec.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltrace.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssltrace.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sslver.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13con.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13con.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13ech.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13ech.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13echv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13echv.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13exthandle.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13hashstate.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13hkdf.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13psk.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13psk.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13replay.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13replay.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tls13subcerts.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/unix_err.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables unix_err.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/authcert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dtls13con.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/prelib.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslbloom.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslencode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslprimitive.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslspec.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13ech.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13echv.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13psk.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13replay.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/unix_err.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl.def -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/authcert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dtls13con.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/prelib.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslbloom.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslencode.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslprimitive.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslspec.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sslver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13ech.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13echv.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13psk.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13replay.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nsssysinit.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a grep -v ';-' nsssysinit.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.def rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -Wl,--version-script,Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.def -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/db.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables db.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_bigkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables h_bigkey.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_func.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables h_func.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_log2.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables h_log2.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_page.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables h_page.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables hash.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash_buf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables hash_buf.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mktemp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables mktemp.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dirent.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dirent.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/db.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_bigkey.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_func.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_log2.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/h_page.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/hash_buf.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mktemp.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dirent.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/basicutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables basicutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secpwd.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secpwd.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derprint.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables derprint.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/moreoids.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables moreoids.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pppolicy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pppolicy.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ffs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ffs.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11table.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11table.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/basicutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secpwd.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derprint.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/moreoids.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ffs.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11table.o echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mangle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables mangle.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mangle cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mangle.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/shlibsign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables shlibsign.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/shlibsign cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/shlibsign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables addbuiltin.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/atob.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables atob.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/atob cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/atob.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoa.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables btoa.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoa cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoa.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certext.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/keystuff.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables keystuff.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certutil cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certext.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/keystuff.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/chktest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables chktest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/chktest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/chktest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crlgen_lex.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlgen.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crlgen.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables crlutil.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlutil cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlgen.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/testcrmf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables testcrmf.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmftest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/testcrmf.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dbtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dbtest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dbtest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dbtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derdump.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables derdump.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derdump cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derdump.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/digest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables digest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/digest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/digest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/httpserv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables httpserv.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/httpserv cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/httpserv.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/listsuites.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables listsuites.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/listsuites cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/listsuites.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/makepqg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables makepqg.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/makepqg cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/makepqg.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/multinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables multinit.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/multinit cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/multinit.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nss-policy-check.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ocspclnt.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspresp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ocspresp.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspresp cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspresp.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/oidcalc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables oidcalc.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/oidcalc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/oidcalc.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7content.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7content.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7content cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7content.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7env.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7env.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7env cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7env.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7sign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7sign.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7sign cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7sign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7verify.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables p7verify.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7verify cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7verify.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk12util.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk12util.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk12util cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk12util.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11importtest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11ectest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11gcmtest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11mode.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mode cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mode.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk1sign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk1sign.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk1sign cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk1sign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pp.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pp cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pp.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pwdecrypt.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsaperf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables rsaperf.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/defkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables defkey.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsaperf cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/defkey.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables rsapoptst.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sdbthreadtst.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdrtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sdrtest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdrtest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdrtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfserv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables selfserv.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfserv cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfserv.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signtool.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables signtool.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certgen.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables certgen.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/javascript.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables javascript.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables list.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables sign.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/util.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables util.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/verify.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables verify.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/zip.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables zip.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signtool cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signtool.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/certgen.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/javascript.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/list.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/sign.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/util.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/verify.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/zip.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables signver.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk7print.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk7print.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signver cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signver.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk7print.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables cmsutil.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables ssltap.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltap cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltap.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/strsclnt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables strsclnt.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/strsclnt cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/strsclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables symkeyutil.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/baddbdir.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables baddbdir.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/baddbdir cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/baddbdir.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/conflict.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables conflict.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/conflict cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/conflict.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dertimetest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables dertimetest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dertimetest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dertimetest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables encodeinttest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nonspr10.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables nonspr10.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nonspr10 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nonspr10.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/remtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables remtest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/remtest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/remtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmodtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables secmodtest.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmodtest cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmodtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/baddbdir Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/conflict Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/dertimetest Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nonspr10 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/remtest Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tstclnt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables tstclnt.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tstclnt cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tstclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/validation.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables validation.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/validation cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/validation -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/validation.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/validation ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfychain.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables vfychain.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfychain cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfychain.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyserv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables vfyserv.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables vfyutil.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyserv cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/modutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables modutil.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pk11.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/instsec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables instsec.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/install.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables install.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/installparse.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables installparse.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/install-ds.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables install-ds.c cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables lex.Pk11Install_yy.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/modutil cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/modutil.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pk11.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/instsec.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/install.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/installparse.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/install-ds.o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables pkix-errcodes.c rm -f Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes cc -o Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tables Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' make: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' + /usr/bin/make -C ./nss latest make: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 echo Linux3.10_x86_cc_glibc_PTH_OPT.OBJ > ./../dist/latest make: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' + unset NSS_BLTEST_NOT_AVAILABLE ~/build/BUILD/nss-3.79/nss/doc ~/build/BUILD/nss-3.79 + pushd ./nss/doc + rm -rf ./nroff + /usr/bin/make clean rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii + echo -n 'Nov 13 2013' + echo -n 3.79.0 + /usr/bin/make mkdir -p html mkdir -p nroff xmlto -o nroff man certutil.xml Note: Writing certutil.1 xmlto -o nroff man cmsutil.xml Note: Writing cmsutil.1 xmlto -o nroff man crlutil.xml Note: Writing crlutil.1 xmlto -o nroff man pk12util.xml Note: Writing pk12util.1 xmlto -o nroff man modutil.xml Note: Writing modutil.1 xmlto -o nroff man ssltap.xml Note: Writing ssltap.1 xmlto -o nroff man derdump.xml Note: Writing derdump.1 xmlto -o nroff man signtool.xml Note: Writing signtool.1 xmlto -o nroff man signver.xml Note: Writing signver.1 xmlto -o nroff man pp.xml Note: Writing pp.1 xmlto -o nroff man vfychain.xml Note: Writing vfychain.1 xmlto -o nroff man vfyserv.xml Note: Writing vfyserv.1 xmlto -o nroff man nss-policy-check.xml Note: Writing nss-policy-check.1 xmlto -o html html pk12util.xml Writing index.html for refentry(pk12util) mv html/index.html html/pk12util.html xmlto -o html html modutil.xml Writing index.html for refentry(modutil) mv html/index.html html/modutil.html xmlto -o html html signver.xml Writing index.html for refentry(signver) mv html/index.html html/signver.html xmlto -o html html nss-policy-check.xml Writing index.html for refentry(nss-policy-check) mv html/index.html html/nss-policy-check.html + popd ~/build/BUILD/nss-3.79 + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/nss-policy-check.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.79.0,g -e s,%NSPR_VERSION%,4.34.0,g -e s,%NSSUTIL_VERSION%,3.79.0,g -e s,%SOFTOKEN_VERSION%,3.79.0,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=79 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,79,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + echo -n 'Nov 13 2013' + echo -n 3.79.0 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.o2bVnk + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 ++ dirname /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 + cd nss-3.79 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/nss-policy-check /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/validation /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11hpke.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslexp.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/nss-policy-check.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/nss-policy-check.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/share/man/man5/secmod.db.5 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/etc/pki/nss-legacy + /usr/bin/install -p -m 644 /builddir/build/SOURCES/nss-rhel7.config /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/etc/pki/nss-legacy/nss-rhel7.config + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.79 extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/nss-policy-check extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/unsupported-tools/validation extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386/usr/lib/nss/libnssckbi.so /usr/lib/rpm/sepdebugcrcfix: Updated 27 CRC32s, 0 CRC32s did match. cpio: nss-3.79/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.79/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 26522 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.t3EdkX + umask 022 + cd /builddir/build/BUILD + cd nss-3.79 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export 'NSS_FIPS_VERSION=nss\ 3.79.0-%{srpmhash}' + NSS_FIPS_VERSION='nss\ 3.79.0-%{srpmhash}' ++ sed -n 's/^\(\(NAME\|VERSION_ID\)=.*\)/OS_\1/p' /etc/os-release ++ sed -e 's/ /\\ /g' + eval 'OS_NAME="CentOS\' 'Linux"' 'OS_VERSION_ID="7"' ++ OS_NAME='CentOS\ Linux' ++ OS_VERSION_ID=7 + export 'FIPS_MODULE_OS=CentOS\ Linux\ 7' + FIPS_MODULE_OS='CentOS\ Linux\ 7' + export 'NSS_FIPS_MODULE_ID=CentOS\ Linux\ 7\ nss\ 3.79.0-%{srpmhash}' + NSS_FIPS_MODULE_ID='CentOS\ Linux\ 7\ nss\ 3.79.0-%{srpmhash}' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export 'GTESTS=certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + GTESTS='certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + export GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 + export NSS_SKIP_PWDECRYPT_TIME=true + NSS_SKIP_PWDECRYPT_TIME=true ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9887 + echo 9887 9887 selfserv_9887 + RANDSERV=selfserv_9887 + echo selfserv_9887 ++ ls -d ./dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin ./dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin ++ pwd ~/build/BUILD/nss-3.79 ~/build/BUILD/nss-3.79 + pushd /builddir/build/BUILD/nss-3.79 + cd ./dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9887 + popd ~/build/BUILD/nss-3.79 + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -v '\.crt$' + grep -vw CVS + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9887/g' + killall selfserv_9887 selfserv_9887: no process found + : + rm -rf ./tests_results + pushd ./nss/tests/ ~/build/BUILD/nss-3.79/nss/tests ~/build/BUILD/nss-3.79 + export NSS_DEFAULT_DB_TYPE=dbm + NSS_DEFAULT_DB_TYPE=dbm ++ rpm -q nss-softokn + soft=nss-softokn-3.79.0-4.el7_9.i686 + soft_minor=79 + nss_soft=3.79.0 + nss_soft_minor=79 + export 'NSS_CYCLES=standard pkix upgradedb sharedb threadunsafe' + NSS_CYCLES='standard pkix upgradedb sharedb threadunsafe' + export 'NSS_TESTS=libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec' + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec' + export NSS_SSL_RUN= + NSS_SSL_RUN= + export NSS_SSL_TESTS= + NSS_SSL_TESTS= + '[' 79 -lt 79 ']' + HOST=localhost + DOMSUF=localdomain + PORT=9887 + ./all.sh ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /builddir/build/BUILD/nss-3.79/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.79/tests_results/security ******************************************** Platform: Linux3.10_x86_cc_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib: Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 20 18:51:53 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #87: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #111: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 7e70ed286633340be377083da5b6b8adaf8b86e8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k e22ae5061a5f8da19eee587e2a0144d38b9dc504 -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:e8:79:78:c6:af:39:d0:1e:6f:9e:cd:cb:95:07:53: cb:e0:6c:d5:43:6e:47:e6:49:ca:ce:38:f7:8c:ff:c6: dc:14:fa:40:1e:c5:44:a4:3f:4f:df:51:11:da:16:e1: ed:78:7b:02:6e:a2:e8:27:f8:25:b6:ac:91:6f:cf:e0: 8c:3d:ba:ef:d3:cb:86:8c:da:79:84:bd:eb:02:b1:a4: 07:13:08:c2:7a:c2:c5:14:17:53:e2:b0:a0:c1:6b:c6: 8d:47:0c:2e:7f:48:85:7c:fb:03:30:6d:d4:ab:d8:0c: 5b:f3:8b:4a:0b:c5:9e:79:98:e0:52:e7:11:dc:8c:4f: 68:69:5b:3d:fb:24:a2:8f:9d:60:48:d1:d8:d6:29:a5: 49:5b:98:3d:d8:06:0b:32:c1:79:d7:79:73:e3:fb:f9: db:41:51:eb:b3:e9:94:98:ca:d3:40:2e:09:3a:9f:53: 7f:96:c0:a2:23:0f:b6:c1:23:dc:8f:0e:cb:c4:56:c6: 16:60:aa:8f:ee:e7:84:e1:8a:a0:36:e1:f3:21:bf:34: 15:84:ec:97:e2:41:0a:97:c7:ae:03:d0:56:4e:d4:7a: 32:33:36:e9:46:ac:34:d8:a2:32:73:83:d9:bd:46:d2: 62:39:8e:62:0c:92:33:df:36:e7:c3:b9:0b:f6:83:f3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:36:72:54:5a:83:4f:2a:99:ef:80:d4:36:1f:b3:7c: b8:39:ad:c5:d6:64:a8:51:1c:a9:78:69:c1:fe:88:e6: 6d:95:e0:42:78:18:40:f2:f1:74:5e:a4:89:f3:da:2b: 27:c9:56:5b:da:d6:c5:fd:72:0b:94:4a:a7:a0:53:7d: d3:ff:24:57:45:34:a4:95:f6:b5:68:fa:ee:06:ec:1e: 5f:59:75:bb:be:71:6f:99:ef:4a:ae:04:48:b8:a5:07: fb:61:4a:15:94:02:9a:91:29:6f:57:13:66:86:24:c5: 0d:cc:82:f5:fe:3c:17:f1:e7:22:11:3a:c9:73:6d:80: d6:83:61:c6:cb:3a:53:4b:6d:dd:ef:07:d0:88:10:55: 67:7d:d6:ca:07:12:24:3e:1b:29:db:e2:22:cb:20:7b: c6:bb:dd:36:69:ca:34:93:df:48:e0:96:29:da:f1:0d: f2:c4:2f:5c:28:6f:25:82:e4:38:a8:e8:1c:50:17:3f: 14:85:65:dc:fe:0a:fc:09:f0:12:ad:2d:69:6e:e7:9a: 78:1c:32:63:b4:c8:4a:7b:3c:56:d8:43:d0:d9:17:3a: ca:d6:98:ff:e7:1b:04:ab:5d:4e:04:8c:fd:9d:e4:ba: 53:62:ab:85:83:d5:ec:01:b9:c0:e9:74:60:f7:57:d8 Fingerprint (SHA-256): 65:B9:1E:B1:C8:C6:43:6A:7C:5C:22:F4:E1:A0:EA:FA:87:C6:59:9A:A2:7F:3F:9B:5F:94:9A:BF:93:21:9C:5C Fingerprint (SHA1): B2:C6:83:D0:B3:45:C9:91:4C:A9:36:B7:52:F4:0B:17:60:C0:CD:AB cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:c9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:38 2023 Not After : Tue Jun 20 18:52:38 2023 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:54:45:22:1f:59:a1:df:19:03:1a:5f:52:44:33:ad: cd:80:80:93:a4:f4:d1:d1:1f:d6:45:02:6a:df:c6:0f: 42:ae:38:b7:b8:7c:0c:e4:24:ea:c1:01:4c:f5:73:80: 9c:15:53:b2:a4:95:3e:a3:80:24:9b:2b:1e:88:b9:2e: 85:90:36:3b:26:fe:c1:22:f6:ae:95:98:f6:75:d4:23: 44:0f:a2:61:c8:5e:92:1b:92:62:b9:57:64:71:4e:34: 10:d6:85:e2:07:59:c4:b1:40:3b:dd:e8:99:ed:8c:42: b9:ad:2b:be:61:a1:8b:56:f5:36:c9:f5:80:36:21:ed: f5:e7:0e:0d:35:d0:cf:37:33:92:d6:47:63:aa:82:89: 47:fa:f6:50:cf:14:fe:3d:f6:3d:02:7a:10:c8:9c:b5: 13:a7:62:04:71:dc:f3:fb:fc:e8:fc:de:29:0b:13:70: 14:77:8d:f7:2e:4a:8d:24:74:71:e5:90:1d:7d:90:0f: 85:ca:7a:e3:c8:4b:ad:b8:d6:d3:bc:6a:15:2f:7f:86: dd:26:0d:7d:b1:cb:31:d9:02:0c:cc:ec:a4:46:95:10: 98:d3:b5:33:8d:ff:53:6e:10:f1:f0:82:27:93:b4:89: 16:06:38:3e:55:81:72:75:8c:25:46:01:e4:68:f0:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:af:dd:88:d7:b3:72:b2:51:cd:99:e6:6b:43:1d:4e: 3d:f0:c9:02:11:b8:4b:85:39:ad:6d:d6:31:6d:14:72: ce:cf:ca:a3:6c:98:e4:ec:76:15:7a:f3:f9:85:6f:b2: 56:b2:12:0d:11:50:1b:26:e9:88:ea:12:9d:1a:a1:38: e2:f2:91:f9:a1:7f:da:f5:09:df:19:40:57:cc:89:4e: c4:4b:5b:d9:d1:a2:4b:ae:24:e3:da:dc:d8:bd:73:4d: 8d:6d:52:d2:a0:b9:54:f9:47:0c:7f:9e:d4:cd:44:96: 2a:ee:2b:4c:3b:c7:fe:ec:de:1f:ab:35:83:31:0a:fe: 1c:10:12:d9:75:22:2d:0b:fd:d8:55:6d:1f:48:c7:e9: 76:6b:df:4e:45:da:f6:21:e6:70:47:be:45:01:93:7e: 5c:f4:19:51:08:03:4b:88:49:d7:a4:88:11:53:fa:ac: 05:99:ca:a3:a4:ea:f6:d0:b5:af:37:e0:e1:2d:17:59: a6:00:9c:a4:85:5e:3d:75:ae:23:78:f8:b3:a7:60:21: fb:86:86:3e:d6:fe:73:e3:9c:ad:a3:c3:bc:d2:78:55: 63:6a:00:7a:b7:93:c0:12:1f:0b:09:87:b5:ed:20:02: 59:44:6f:94:b4:24:88:c2:60:52:c8:e4:d3:c6:e2:8e Fingerprint (SHA-256): C2:4D:D5:12:61:8D:A8:71:E8:EE:F4:AD:F2:E0:C7:32:68:37:BC:E2:73:80:87:8D:43:97:1B:87:AB:9D:D1:AE Fingerprint (SHA1): 7D:07:D5:15:69:83:FC:F5:D7:E7:4C:47:79:F8:F2:C9:E9:14:4B:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:ca Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:39 2023 Not After : Tue Jun 20 18:52:39 2023 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:29:38:4b:5c:e7:42:10:99:bc:73:40:0f:52:07:25: 7f:54:ff:95:b6:5a:62:1e:11:9c:31:b1:de:aa:09:e6: 8b:f2:a6:f2:46:0a:96:75:33:3c:3a:55:b0:5b:74:d1: d9:39:e9:72:a8:fc:b1:37:5e:94:7a:fb:7b:5a:f5:1b: fa:85:d8:70:41:47:48:d5:11:83:d5:af:69:73:b4:02: 7f:93:38:51:2c:e0:9e:ab:3e:9a:ac:df:cc:ff:02:c9: 53:7f:37:b2:af:a2:a1:c6:2d:43:61:a2:4b:2c:2e:e6: 7a:66:c4:94:d4:04:63:d3:f8:8d:87:a7:36:61:6a:f5: cf:99:90:b4:ed:13:49:d5:2d:a2:ea:1d:c7:9b:ce:4c: f0:c3:b5:c1:2e:dc:b8:04:e8:f3:e1:73:37:24:cb:f4: 22:8c:b9:a0:e5:81:db:a5:d9:a4:73:63:55:13:c3:78: eb:c1:91:fe:cf:35:f3:37:a8:12:1f:24:cc:62:6f:84: 83:3c:da:92:13:77:d6:e1:5f:17:73:c1:a0:e4:d9:f0: 12:77:9e:85:59:b6:ff:9b:44:09:11:c9:43:db:f0:ba: 8e:35:de:0c:9a:c6:ed:ea:4e:78:69:5d:34:1f:26:ae: da:d8:b6:49:9f:e0:89:37:cc:a1:66:e9:62:71:0c:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:fc:76:2c:06:07:16:e6:b7:b2:67:d3:a1:bf:89:79: 86:ae:c4:48:ed:32:cf:51:1f:d0:c3:47:8b:86:d7:fd: d0:f7:47:0b:19:a7:ab:37:69:a9:e3:50:3d:38:05:c6: 7e:8a:dd:5d:4b:f6:2a:a6:28:83:3c:6e:b1:c3:87:2d: 13:f2:85:7a:13:8f:64:f2:38:1d:6c:73:17:85:0f:e7: 38:87:20:b3:cf:e6:86:83:89:df:be:63:22:d9:f7:56: 7a:e8:10:ae:36:50:67:d2:20:86:aa:a4:e9:9b:c8:83: 02:9b:7e:63:c1:b2:b9:7e:80:2f:3d:67:77:f3:5f:77: 93:b4:ce:06:be:c6:ad:15:f6:48:bb:b4:1d:aa:01:bc: e6:ff:b1:50:84:61:33:4b:25:7f:64:96:09:7b:78:f8: 7e:3a:75:7f:5a:b9:24:4c:8f:c4:dd:b5:a3:ae:d6:65: c1:2b:82:c2:da:2a:22:72:1d:ca:61:99:37:ea:10:dd: f9:4a:ae:00:3f:0c:61:04:cb:64:a8:2a:d9:e1:fc:78: c5:67:47:f2:0f:6e:9e:07:42:34:4e:3e:8c:47:04:10: 33:b6:be:57:d6:ab:5f:78:e8:a7:95:6d:5d:c0:ab:e4: fe:29:ef:de:8b:42:96:96:46:6e:12:73:75:cf:a0:77 Fingerprint (SHA-256): 6A:2E:4E:DC:40:99:6B:8F:50:BD:D1:99:98:03:92:77:34:C9:33:14:C6:3A:ED:66:E2:CA:29:40:E5:F4:0A:17 Fingerprint (SHA1): 59:70:E4:30:91:56:DF:4F:8A:5E:4E:73:FF:B2:C9:26:36:8D:27:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:cc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:40 2023 Not After : Tue Jun 20 18:52:40 2023 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:1d:11:37:e8:d1:be:06:2e:2e:a8:ad:38:84:c2:c9: dd:b9:33:c8:7e:00:21:f5:ec:60:09:33:24:3d:c6:2e: 2c:b9:85:ab:91:b5:77:f7:4e:d8:32:66:2e:71:42:80: 7a:b6:57:43:0e:7a:e4:04:b9:77:84:7c:d6:65:2e:a9: 7d:ee:f9:f2:0a:8a:c8:25:0a:78:a1:f7:7f:c0:b8:2a: 68:e6:27:10:7c:84:5d:93:4d:aa:fd:6f:49:05:22:8d: 07:8c:58:cd:e1:f9:40:70:46:c0:ce:ef:70:ef:fd:91: 85:a7:11:25:b6:28:42:1e:e2:ab:56:cb:07:be:05:a7: 12:94:16:51:25:cd:84:6c:53:43:62:d6:e5:cd:7f:59: c0:3e:c5:94:00:42:ee:e5:0c:a3:f5:fe:54:54:3f:f4: 16:54:e9:df:71:02:ad:b4:ae:7e:f7:de:d2:83:6a:c2: 28:7c:8a:42:fd:08:3b:f1:fd:04:ff:74:94:fe:48:1e: 5c:44:ba:87:08:3f:b7:e0:a1:a4:7c:49:1e:4f:88:e4: 0b:98:02:fc:e3:b0:85:19:3f:72:b1:0f:97:57:ef:a0: 2e:ed:2e:b7:58:87:d8:02:a5:ac:21:34:ed:e6:c0:18: 3a:99:f6:d5:88:ad:4a:dc:d3:c8:8b:60:64:c9:76:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:06:21:09:a4:96:ce:7d:ee:0f:a8:03:a9:36:f8:62: fd:12:a6:e4:78:e1:a2:30:73:46:38:b5:4d:45:77:a2: aa:df:18:55:2b:1a:34:b2:0c:53:d3:1a:1a:e5:a6:47: fb:b0:45:57:26:8d:91:b2:1a:9c:07:79:a8:2d:68:bd: a2:71:3a:a1:c7:7a:9b:ef:16:f1:16:c5:8a:6b:bd:f9: 90:e0:e7:7e:51:07:49:cc:bb:9e:53:d7:f5:83:08:2d: 14:60:81:50:d9:53:02:dd:cd:3b:19:36:6b:b2:2f:53: a6:a5:b4:21:a0:dd:d5:fa:ad:b5:66:34:af:0e:4e:df: 78:37:eb:d2:df:35:a3:5d:f8:4e:45:8f:4b:06:15:9c: 1c:82:7e:f1:b8:9d:bc:36:da:90:68:82:60:a4:71:ec: 5e:6d:3e:64:ef:15:19:ea:94:bc:fa:cc:34:f8:dd:33: 2e:5b:e9:ae:ca:2e:ac:de:38:a1:d6:97:cd:70:1e:4a: 85:8b:a2:ce:b8:20:c3:ad:f6:fe:89:85:56:f0:8f:cc: 7d:8c:9d:c1:db:84:4d:98:6d:03:a3:01:34:ed:da:a2: 68:67:06:57:19:e5:df:7d:d2:e9:4d:76:c9:9e:68:9f: 1d:5f:b2:46:d8:55:d2:23:fb:b4:87:97:13:ca:f3:15 Fingerprint (SHA-256): DA:E4:FF:9F:37:73:4F:02:BF:CA:FE:2B:F1:59:9B:61:74:EE:2E:5E:17:63:65:A1:3F:3D:2C:1B:F7:E4:B9:23 Fingerprint (SHA1): 2F:3E:BC:0A:EF:B5:30:7A:56:73:36:B2:9F:33:3D:AF:92:85:88:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:ce Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:41 2023 Not After : Tue Jun 20 18:52:41 2023 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:2f:ee:fc:b7:d1:ee:8f:ce:44:f7:cb:dc:24:5e:b8: 74:ec:80:91:83:a4:c5:49:f4:59:fb:78:90:6d:21:11: 94:57:87:7c:0f:c7:5b:39:b4:fa:ea:36:37:86:ba:ea: ee:9b:63:01:01:a5:93:5a:d0:f7:f4:b9:7a:23:f6:28: 09:de:7c:04:73:e9:a0:43:9e:5f:90:ba:3e:c5:9d:bb: 9f:f8:25:eb:55:53:2e:d9:54:9f:3c:2a:02:97:21:c0: f6:80:3a:ad:22:4e:ee:a2:48:2e:af:8c:c1:44:70:67: 67:9b:b4:77:fd:78:3f:a6:ca:2b:46:1d:f0:d7:0d:39: f8:97:44:ee:a0:a5:f6:35:cb:43:a8:ac:ec:11:30:aa: 21:ef:4b:6a:e0:31:c0:94:35:0f:59:bb:8a:e9:37:d7: e3:df:2c:15:2f:0d:0d:97:6f:ea:48:1d:72:2d:a4:9b: 00:25:a3:6a:79:f5:b0:26:70:65:cd:c7:20:c4:7a:8c: e6:ab:cb:07:81:29:65:c3:70:1c:f1:f2:dc:40:2a:93: 10:1a:eb:e9:5d:ef:77:b8:e3:ab:33:81:cc:91:71:58: 91:a5:67:96:6c:8d:37:61:51:33:d4:3c:de:7b:0f:f6: 61:f8:fa:11:f9:82:97:b4:0f:99:58:91:14:a2:c0:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:09:28:33:c3:7d:47:6f:dd:b2:8f:be:c8:52:5f:47: 4a:b0:d7:22:c9:87:d6:b8:e3:41:01:a8:dc:ff:6f:58: d7:98:59:28:be:b6:68:d4:eb:a3:bc:af:d1:43:86:26: c7:b3:25:f7:2b:2f:ba:a3:79:3e:c0:d9:88:d4:d5:ed: c7:b2:9c:5a:55:58:3c:8d:b7:03:74:56:fc:e8:c4:bd: 18:ef:7d:e5:2b:0f:12:5e:79:70:2a:1f:c5:85:9b:22: 65:75:0c:31:d4:69:be:dc:1a:36:ba:29:9b:d3:91:b2: bf:88:32:d4:72:00:56:8f:aa:e8:f6:f6:8a:8f:c1:98: e0:5d:72:2e:4c:c2:4c:bf:5c:3b:6f:d6:b3:f0:39:04: df:fd:1e:dc:71:e7:da:a8:cf:e1:66:94:00:05:86:4b: c2:ff:07:74:75:bb:c6:94:55:76:ea:63:77:64:23:85: 1c:e3:4b:2a:90:97:8f:a3:cc:c5:fc:6f:67:cd:40:0a: 55:d2:fd:3b:ed:92:b9:b6:1a:e1:a2:1b:ad:3d:e1:af: 2f:3a:84:a6:5d:1b:1e:8d:4a:58:1d:14:51:5d:56:44: b8:97:74:de:c0:ce:58:27:8e:b8:86:22:13:d6:bc:cd: de:65:ef:57:db:a4:72:04:33:91:c7:c5:d8:b5:a9:d6 Fingerprint (SHA-256): 57:AB:22:C6:E7:AF:58:C4:EB:3D:55:07:A5:9F:39:29:EF:33:A1:4E:47:B0:41:1F:30:2B:CD:B5:A3:A9:D1:00 Fingerprint (SHA1): B6:CE:DA:C9:5E:60:A0:2B:80:5D:11:25:6D:3B:AB:79:40:CA:61:B6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:cf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:41 2023 Not After : Tue Jun 20 18:52:41 2023 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:35:d5:ca:2e:01:26:99:c1:e0:bd:36:bd:6e:a7:42: 89:47:4b:5a:91:38:3b:7f:ef:3c:02:ed:4b:c3:58:cb: f7:68:36:8f:fa:56:02:e2:df:dc:50:c5:fc:47:91:cb: a7:a6:86:9c:ce:45:c5:c4:cf:f1:00:01:0a:95:3e:11: 5e:71:2e:0b:c0:c6:be:f6:f2:29:c0:c8:fa:f8:10:fe: 50:c6:8e:70:9e:bf:dc:82:56:a7:a8:9b:0d:cf:39:ee: 29:3f:26:db:87:9f:ab:34:54:16:38:b0:04:bf:18:65: 1a:35:37:96:a5:1c:03:b2:00:01:b0:3a:4e:b7:1f:52: b2:b4:cb:9e:b1:ba:fc:bc:49:f7:c2:96:2a:9e:25:d3: 5a:24:8f:16:4c:83:ce:2f:9a:e8:24:e7:5b:cd:32:23: bb:8a:b4:49:8e:31:2b:a9:12:48:4f:84:4d:5d:17:78: 67:2e:c3:24:c0:d3:58:b7:5e:33:09:dc:37:25:b4:a6: 0f:94:d3:7d:52:f8:5d:6d:95:f9:5e:f4:13:3a:96:7f: 44:52:f4:cd:2a:57:cf:5e:f4:70:37:12:26:c6:3a:0f: 3c:4e:bd:2b:a7:fb:21:d0:e3:3c:bb:c5:35:b7:83:ed: e1:ab:07:f0:64:d6:38:22:cb:a3:f3:1c:cd:c2:34:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:8b:ad:f2:5c:d6:8f:dd:53:e9:49:8a:fc:af:29:1f: 41:b5:fa:22:95:a4:52:5d:1e:55:bd:7a:31:f0:57:f8: a6:2a:1b:27:ff:fe:81:4f:81:db:c8:b2:fd:0a:fc:66: 7d:d4:c5:84:8d:84:1b:58:c9:a5:61:75:bc:cf:bf:4a: 7e:35:a1:99:51:f4:fb:71:3f:fd:a7:86:31:80:c1:4a: 1c:a8:bc:b4:ea:27:bb:0e:35:b0:2c:83:d0:e3:0e:09: 0a:56:b5:ea:94:8b:91:c4:e0:cc:35:da:98:65:04:d8: 2f:a3:d3:cd:43:52:e8:54:1e:6f:c9:19:8d:fa:58:82: e9:87:cd:eb:68:4d:cc:b7:91:0f:d7:10:1e:d4:af:7d: a9:41:2a:96:a5:7f:7c:f6:45:de:21:ab:08:24:ae:c5: 33:c9:91:c0:66:48:96:42:fd:6c:77:da:30:fd:13:1f: d4:8b:38:fc:3f:db:f0:1a:fd:af:2f:3a:42:97:f0:f2: 62:fc:b2:c6:50:39:88:b8:f8:30:ea:1f:a3:cb:6d:30: 67:78:85:8e:18:af:59:33:3b:6b:93:fe:74:b4:7e:b1: 22:f4:ac:a1:47:7b:d5:d9:e4:5f:56:c1:b0:7d:5a:53: 8c:b1:01:c7:a5:b7:57:65:85:8b:58:28:d0:5e:f9:73 Fingerprint (SHA-256): A1:30:10:02:58:2A:5D:BC:DE:23:33:E4:36:3F:77:C8:98:0C:77:A7:5D:FA:49:2D:A9:7E:5F:64:E9:CF:42:2F Fingerprint (SHA1): 65:88:20:72:AE:EA:8E:95:BC:41:40:19:88:57:BD:47:5A:B0:BA:96 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:42 2023 Not After : Tue Jun 20 18:52:42 2023 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:66:87:45:f3:7f:14:86:f3:6d:e8:be:45:e9:70:53: 3a:16:10:bc:11:33:41:85:50:b6:27:80:98:e8:f9:f1: a8:9a:7e:e3:90:d0:35:a9:42:32:17:dd:48:4d:38:df: 91:f1:2a:11:e6:64:6a:a6:eb:61:2f:41:db:c7:91:cb: f5:4d:66:d5:4c:4c:87:4b:61:f7:c4:f6:12:61:8a:32: ed:d5:9f:7e:e5:ca:cd:e9:6b:d8:44:19:b4:56:10:88: 4f:96:dd:6b:12:af:8b:0c:27:14:4c:21:45:3c:69:27: 58:a6:0e:73:0d:c5:d5:2d:4a:7a:92:8e:ce:3a:7c:1a: 44:bb:7f:45:ce:66:57:e5:d5:7b:a4:8b:0e:cd:7b:f3: 85:82:99:43:fa:12:99:a9:92:e6:91:25:db:7f:9f:ad: 16:f9:d0:f0:fb:36:be:f1:de:8f:6d:c3:b0:8f:5a:e2: d8:2c:3b:ff:88:07:5e:bd:3f:10:61:c0:2f:90:3c:be: ae:61:30:86:e9:20:52:b4:c1:87:09:48:a1:d7:0e:36: d1:64:bf:8d:24:79:d8:54:75:65:08:66:05:4d:a0:60: 11:c9:56:5d:83:64:85:c8:aa:ca:45:5a:86:f8:fe:76: 67:e2:ec:2a:1b:71:39:44:d3:2b:1b:4a:01:9c:e2:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:8c:66:a2:90:23:0f:8f:a8:dc:1b:be:78:3c:bf:9b: 5d:fd:c2:d2:b7:dc:54:35:fe:1a:fd:cf:84:19:18:24: ba:48:10:83:41:36:1a:4e:b3:df:38:d7:0b:3e:a7:49: de:6a:92:d5:c4:d6:4a:83:d4:48:7a:c1:e5:d9:40:fa: 40:04:fa:bf:61:4a:4e:9c:25:07:a0:6a:3f:4d:c4:52: e4:61:eb:5b:c5:11:26:89:8d:84:b3:e1:c9:c9:f2:0b: 39:28:40:a9:07:f9:8e:be:2c:7d:16:91:28:a2:c1:5d: 5f:10:61:ec:80:a6:df:b6:14:2a:73:eb:8e:7e:aa:9e: a3:ae:05:65:6a:6e:4e:a2:1a:bb:33:a0:41:90:2e:af: 1e:cf:d3:2e:ed:d0:ee:99:34:c0:ec:b7:a9:75:36:c0: fc:cb:da:0d:62:b5:17:84:e2:20:95:bf:90:ad:dd:71: 5b:d7:5c:d6:a7:d6:71:f6:67:b0:08:a2:de:48:81:d6: 35:f0:18:aa:a4:20:74:8d:26:a8:55:f2:25:52:1d:a8: 52:a2:88:0e:18:6a:1b:d8:41:be:d4:c3:92:ef:83:49: 6b:3a:1e:df:ac:0d:c3:50:dc:92:10:30:82:7c:a5:b6: ba:f7:c2:ad:be:27:84:85:72:53:04:64:f9:0f:fc:5d Fingerprint (SHA-256): D9:AF:F9:A3:15:0D:32:36:1C:C9:3B:0C:AE:F2:9A:F5:B9:57:88:E6:54:6C:2D:83:73:83:DA:86:41:95:E5:0E Fingerprint (SHA1): 36:10:79:82:AE:D4:B6:19:AF:9F:4B:87:47:91:DA:5D:A5:34:E4:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:43 2023 Not After : Tue Jun 20 18:52:43 2023 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b0:07:c4:33:b7:ae:f6:82:ac:38:be:53:95:34:89: 6e:0b:db:0b:7b:96:b0:f3:cc:01:82:6f:83:cf:6c:ca: 5c:0f:81:f6:f0:17:b2:bf:3f:4f:3d:9c:de:cc:4d:6d: 16:9f:70:bf:c9:41:bb:e3:00:44:31:ab:2f:7f:26:85: 2b:62:40:90:06:49:96:f0:82:39:b0:7d:42:b4:47:fd: 28:c4:5e:a2:bd:76:84:54:82:1f:71:cf:b8:b1:dd:0b: 71:77:1e:33:1f:1c:c7:3f:3d:af:16:98:77:48:65:93: e7:bf:49:be:34:cf:74:b7:90:79:cd:5d:6c:8f:ea:d7: 12:a8:2f:58:e1:d1:b6:ba:a0:71:52:e9:86:e2:7e:a2: ce:c5:3c:74:97:e5:2d:6a:25:9d:61:db:a8:a1:91:71: bb:3e:f7:54:91:0c:ae:4f:ac:e7:c7:72:7f:b0:cc:15: 22:77:88:e0:77:55:a9:79:01:7e:f5:92:68:c1:fd:07: f4:d5:11:59:78:6a:33:b4:2c:b4:16:55:ca:54:c9:7c: 86:3d:1e:20:63:c0:0c:be:e9:2f:ea:7b:74:c7:81:c1: fa:6a:a6:04:d4:9a:44:34:48:10:93:0c:4e:98:35:43: 70:f3:8f:e5:d9:55:b1:dc:94:63:98:91:df:68:b8:9d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:84:10:83:b4:ad:27:2d:cc:ed:6d:20:17:a5:3a:66: 4c:e0:93:ad:1c:66:53:87:9a:8f:a6:4f:40:0f:78:d7: 65:54:bc:01:fa:9f:65:3a:4f:64:b6:08:5f:57:e6:ea: d1:4d:80:44:ff:4f:47:b0:00:eb:8c:d1:a7:e5:37:9c: 36:68:35:16:3e:40:cd:09:3c:a0:b6:a8:ab:aa:1c:b9: a1:ab:19:29:63:7c:08:e4:d7:23:45:90:7d:15:0e:10: 3d:bd:87:e5:f1:2c:af:2b:10:07:7b:7f:01:38:7c:c0: 3e:1d:81:22:23:92:84:64:b7:8b:42:cc:e1:8d:b9:a2: 5a:a4:a4:4e:e9:67:05:e2:d7:4f:e7:ac:eb:7a:26:c2: 10:bf:10:73:22:35:54:f5:1e:22:a4:31:bb:b3:48:3b: 6f:9d:2a:9d:af:25:73:53:13:21:43:6b:6e:bb:c0:77: aa:e1:96:fc:f5:0f:30:6e:8a:ab:48:b2:db:c8:0a:d5: ca:6b:5f:ee:f7:8c:cd:26:1e:d3:1c:d8:a3:ed:78:b6: cc:71:85:03:58:5d:2d:29:25:f4:0d:aa:b3:3f:04:13: c3:34:c6:80:b2:0f:d2:8b:4e:c8:87:33:af:ae:69:bd: e0:f7:7c:69:42:e6:d8:3f:31:1b:a3:65:39:2f:9d:73 Fingerprint (SHA-256): BB:8C:D4:70:E8:5F:CC:0A:A1:8E:77:94:F1:BD:B1:D6:8B:EF:68:98:48:61:5D:C5:A1:7A:F8:AF:39:A4:D8:60 Fingerprint (SHA1): 45:65:8F:BA:AD:B9:80:CA:2B:55:C1:19:B2:5E:96:51:4F:18:63:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:43 2023 Not After : Tue Jun 20 18:52:43 2023 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:60:e8:3c:5c:fe:6c:6f:0d:b5:67:ec:53:0b:59:80: 1e:ae:51:ec:0e:7d:ca:64:4a:9d:c3:91:f6:d6:ed:45: 34:89:90:43:22:01:02:af:ae:ab:e4:ef:3f:2e:18:37: 25:3c:0d:aa:a7:4c:a0:8b:b9:e8:31:b5:0e:5c:bb:15: c5:d7:13:0f:de:95:be:be:96:30:d9:e1:e7:cb:53:dc: 0d:7f:b0:a5:49:9b:2c:f0:5b:c5:28:3d:e9:54:31:14: 01:85:3e:49:82:f3:2e:e6:f7:12:f2:b0:0b:4e:f2:48: dd:bd:99:ff:52:bb:b9:b8:f9:38:db:16:4a:af:d9:84: 9b:db:69:c6:f5:ef:d4:68:0b:80:b5:4b:6a:3a:86:ea: f5:c0:67:ff:85:b7:5f:70:e4:e7:00:89:0f:43:85:58: 89:57:19:87:94:81:56:22:cb:23:8a:b5:5c:c3:06:28: ec:d3:60:ec:67:3d:08:3f:21:13:03:19:b6:3d:bb:bc: a4:41:3d:f4:e0:74:15:53:66:36:91:de:23:fa:76:e4: b6:19:31:74:fc:d7:a5:70:54:30:b9:28:82:0e:9a:31: 0f:a7:9c:ad:f6:9e:ff:4b:33:2d:6c:9c:04:bd:be:69: cf:75:0c:4a:9a:da:be:1f:11:65:00:61:b6:c3:f5:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:65:b0:56:a0:b2:fd:70:20:ec:a0:2a:bf:7e:8f:e0: 76:cb:19:c1:de:cb:6b:78:11:53:1a:2c:cd:a0:74:b5: e1:65:a8:c6:3c:0f:44:4b:93:6c:91:db:44:b4:87:97: 04:f2:6b:9c:f5:5a:e5:2c:82:d1:ba:eb:e2:b9:7b:fc: af:c5:65:fe:4a:22:b6:0c:b2:72:61:6a:e8:69:83:b4: 7a:24:64:c8:42:e3:49:65:0e:61:8a:1a:ff:de:5e:5d: 4c:9f:aa:36:51:e5:53:80:72:3c:81:15:60:3e:e3:fd: 5d:de:3b:35:da:f7:f5:77:94:d3:e3:06:82:f6:bb:7b: d3:e7:10:76:00:40:9b:e7:0c:4a:63:37:5d:53:62:de: 3e:cb:6a:e2:ca:13:28:bf:56:d2:61:8d:8d:e5:0b:42: a6:72:69:ae:aa:bb:ad:0f:d6:a3:25:86:8f:9b:c3:19: 11:21:5f:e0:90:f8:7b:15:e0:01:c6:79:b2:69:68:e0: ed:9f:b0:f1:a4:7f:aa:92:8f:be:21:a5:37:fe:49:37: ae:0f:84:d4:7f:25:06:56:91:42:57:27:b0:68:8e:58: dc:45:30:a8:8e:ac:97:12:ec:5a:0b:e6:cf:68:a7:f0: 20:0d:4b:f8:91:59:15:0f:83:50:00:4e:ec:f5:69:4e Fingerprint (SHA-256): 29:C4:99:B2:69:68:10:88:3E:72:B5:A9:E1:56:D3:B8:31:46:7E:78:AE:F9:38:17:2C:77:4B:10:88:62:58:97 Fingerprint (SHA1): FD:64:F0:80:36:EE:D7:52:B1:1B:35:B1:26:08:86:CF:04:46:66:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:44 2023 Not After : Tue Jun 20 18:52:44 2023 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:0e:7c:bd:ce:f5:4f:8e:8d:ad:ee:0d:18:ad:61:23: 87:13:b3:c5:98:df:a1:88:70:58:80:e2:ed:7b:87:60: 8c:aa:b2:bd:76:14:a5:0b:93:6c:2e:34:dc:1f:bc:f5: b4:71:0e:3d:ef:75:0a:6c:62:79:2f:eb:3e:db:90:b5: 5b:ad:47:63:15:9d:46:de:15:19:ee:e3:80:c6:b7:a1: 9c:6b:35:57:cb:9a:fe:84:32:52:4b:86:fc:00:8d:5b: 29:71:81:42:a2:6f:fd:aa:33:1e:ce:68:3e:9b:d0:49: 5f:4f:bd:2d:25:7f:e1:c7:12:05:9e:a0:b5:c5:84:4c: cd:b1:51:96:ad:cf:26:a9:c2:e1:a0:72:42:8a:96:6c: bb:5a:03:19:ca:6d:85:c2:94:bd:01:2a:99:ca:bf:65: d2:99:40:03:30:d6:5f:4c:9b:9a:b9:06:f9:3b:40:17: 45:28:7b:60:8a:f1:ff:09:48:7d:e0:9c:06:38:49:20: 0a:9c:12:5f:b6:80:c5:10:8a:e6:f1:ab:b4:00:67:56: 99:36:b0:84:eb:fb:33:cc:33:13:4c:1c:06:a4:56:77: 91:a6:7c:91:f3:9b:13:d4:ae:1e:52:e3:ef:eb:22:ac: d2:08:dd:5b:e5:88:e0:ec:c8:ed:59:85:0a:9f:20:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:41:53:8f:f8:66:f6:a0:e7:22:1b:f0:2f:2a:4c:71: 1c:92:0f:c1:04:ee:03:a6:91:91:5a:05:12:96:5f:73: ee:c7:b6:fe:b9:f8:9c:a4:2f:58:fc:f3:3b:c7:08:a7: bb:31:fe:f7:4c:f9:2f:7b:2d:45:b3:72:b1:b3:1a:6b: 8d:5b:86:d6:d7:8d:62:e9:13:59:05:b4:50:a8:a9:e4: 58:e9:0e:90:71:bb:9f:5f:a9:4e:b0:aa:a0:ec:b6:22: 48:19:0f:ec:e8:e6:7e:7e:1a:1a:67:1a:a0:72:7d:e0: 98:43:52:af:d0:dc:8a:71:19:e9:85:3f:2e:77:7f:00: a8:75:33:1f:b7:e4:9e:8c:9a:2f:93:bc:60:d8:fe:ab: 2f:20:be:a9:80:19:c5:64:b5:b9:95:ee:a2:dd:d3:5f: 84:fa:5d:0e:6e:90:c4:1e:3e:90:6d:d3:c2:cf:b9:cd: c6:2e:70:f5:36:00:3f:93:52:1b:11:5f:96:a8:48:70: 0e:96:e8:03:d8:92:e4:b5:58:d6:c4:6c:5c:0f:1f:36: 76:70:e5:c1:da:49:bf:f7:3e:cc:21:f6:45:59:96:ff: 3d:0f:11:96:ae:90:14:f4:82:4d:33:2e:4e:bd:52:ae: 52:ef:6e:7f:82:a8:20:4d:db:f2:f6:be:50:d2:87:20 Fingerprint (SHA-256): EA:30:73:14:5A:E2:3D:95:1B:4F:09:D4:50:BD:C4:45:86:9C:06:41:15:F9:71:6D:2D:0B:70:A8:E9:A7:6F:A3 Fingerprint (SHA1): 81:B0:0D:72:A0:97:E7:61:0A:EC:A4:DD:3C:C2:57:A0:0C:D8:2A:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:44 2023 Not After : Tue Jun 20 18:52:44 2023 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:f7:e8:1d:46:f3:26:72:36:09:64:d0:d7:59:13:b3: f0:5e:85:05:3f:3b:ba:07:d6:a4:fc:79:10:1b:9b:58: ea:99:ea:4a:aa:d7:83:be:b0:c8:0a:df:f1:d3:ed:23: 2e:26:c1:6c:1a:85:ab:ef:e1:ab:54:6b:ed:84:ca:2c: 5f:6d:22:36:ed:16:22:11:6f:4b:15:50:04:76:0c:b2: ff:cc:0d:dd:4f:42:b3:b0:f6:41:d8:5e:49:0f:b6:95: 1a:d9:03:ae:0a:3b:a4:b8:e2:a2:db:30:3b:f9:d3:7d: e0:c3:c0:04:76:db:1b:fc:e7:ea:d3:cf:f8:65:f0:f7: 1c:ce:5f:22:ee:9d:4b:c5:aa:aa:17:c8:f7:59:0c:0e: 86:26:06:a9:f8:cb:49:3c:db:65:8d:97:cd:d5:6f:27: df:f6:3b:50:3c:b8:cf:73:91:50:bc:79:df:a6:d4:7c: 1f:a4:e0:f7:36:51:4e:81:78:b4:54:02:9b:0f:8f:0f: 7d:a4:05:2b:35:35:33:a5:b1:7c:2f:3e:5d:e3:d9:90: 07:5a:25:20:12:85:f2:9a:23:6c:9f:41:60:95:75:ac: ad:2c:7a:39:8c:24:f6:4d:17:f6:23:a4:13:7f:dd:e6: b6:eb:64:21:85:df:37:0f:1e:fb:cc:41:a4:fe:c2:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:2d:de:72:c2:08:10:4d:17:75:cb:af:8c:86:50:a9: 8d:0c:fa:05:d0:1d:a0:fe:36:1e:4f:4f:76:dd:f8:24: 51:6d:df:7f:5b:ce:00:62:f1:98:ef:05:4a:43:30:68: 70:c7:a7:1c:0a:0c:44:a6:03:99:6b:a4:8b:54:39:3a: eb:7f:ff:a7:e9:09:fe:ed:2e:a1:09:b6:fe:45:fb:2b: cd:37:b9:ce:29:23:0e:76:b2:d1:6a:4c:ac:ba:45:60: be:c5:fb:b6:d8:f1:96:58:08:e9:20:0d:50:08:90:58: 52:61:2b:7a:f4:e6:5d:9b:43:67:0d:45:ca:d5:2f:f6: cf:47:c0:86:75:20:53:5c:d0:d9:23:00:08:54:bf:8e: 33:7e:37:72:29:a5:5f:2b:cf:32:e9:13:04:ac:be:f8: 41:9c:32:70:7a:2f:53:40:06:20:a3:0a:4c:8d:d5:66: 25:5d:6e:0a:66:81:25:5b:37:87:3d:0b:89:c5:b2:0e: 4d:82:c6:14:22:3e:93:41:ad:00:d7:62:cc:44:b5:89: 54:ab:49:c1:34:a9:f5:70:9a:7a:65:80:96:f7:67:73: 51:38:04:d1:bf:d5:0a:92:34:1d:59:eb:26:b4:98:a4: b2:fc:95:9d:e4:11:28:54:3e:f5:9b:08:4e:ee:1c:c2 Fingerprint (SHA-256): 1A:18:45:A4:36:98:65:6C:F4:3E:0A:5E:C6:55:CE:8A:B5:A4:D2:85:F3:A1:DD:A1:B0:D3:5A:48:BC:0D:D1:4C Fingerprint (SHA1): D4:53:5B:2A:1B:81:AC:15:88:16:B2:1E:20:8A:AA:88:F7:8A:5D:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 18:52:45 2023 Not After : Tue Jun 20 18:52:45 2023 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d9:c2:12:f7:65:cb:c2:45:fa:a1:75:80:ad:a6:02: fd:a3:56:0e:9e:b8:cd:14:fa:fc:56:24:35:cd:91:96: 26:10:96:38:ec:19:56:5e:28:22:09:db:94:90:7d:8a: ca:d9:df:8f:c6:c4:6c:2b:bf:65:14:05:17:11:03:1c: 63:68:e5:3c:50:32:c7:62:18:e9:c9:29:9b:72:8e:14: ff:20:c3:fb:78:1f:ca:0f:f3:e3:af:fc:05:db:b8:ac: d9:98:fb:3b:09:9d:5c:1f:b7:f3:29:66:d3:91:bd:a2: 4c:62:ff:7c:b1:7d:6b:25:57:d5:04:ee:c2:c7:f9:66: b1:38:30:81:28:43:50:f6:60:b0:8b:58:32:41:37:91: f0:45:fb:8a:a6:0b:c0:35:5b:21:a0:e0:42:2f:77:12: 49:8c:ea:9a:73:7b:5d:c2:19:1a:36:1a:ab:45:d1:c6: a5:cc:02:b1:32:60:25:80:e5:ce:32:04:75:36:2d:db: 49:14:94:4e:34:5d:fd:91:30:34:7e:b3:94:70:36:7c: 72:87:df:e0:dc:3c:e8:c6:6b:9b:81:d3:b2:82:cf:70: ce:48:0f:79:fa:d7:b2:29:df:0b:1c:13:53:77:8d:71: f1:8e:36:ef:21:90:bd:94:61:c8:69:17:40:36:b9:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:e9:f8:ef:27:b2:0c:64:20:ab:aa:46:50:96:b1:95: db:d2:b5:48:00:57:07:7b:62:c9:19:76:59:9d:b1:ab: 4c:92:dc:31:16:09:41:dd:28:30:5b:fb:9f:7c:ff:03: 28:52:2f:37:21:9c:a0:9a:81:8c:0b:0b:3f:bf:40:7a: f0:7a:a7:91:e9:04:07:ad:57:0f:9e:4e:76:e5:ef:84: 7f:9b:d5:c2:ad:91:07:f4:8f:7f:92:db:5b:a8:de:ae: 17:c0:f3:bf:d9:99:9d:00:1c:55:c9:d3:6a:97:06:ef: a0:1a:65:3f:d5:f5:47:1f:1f:08:7e:e0:20:7c:49:f5: 1e:47:62:04:8a:12:51:2b:32:72:06:9f:ae:c9:eb:57: 6f:05:ec:26:92:e7:97:98:72:65:17:04:23:9f:e4:4d: c9:94:be:25:1b:85:0f:ac:d6:2f:f6:62:5b:6f:04:f3: 51:fc:39:36:b1:a2:fc:06:b9:af:61:f8:db:d7:e9:61: 5d:75:f1:82:f7:49:6c:54:5c:da:e1:ea:38:3c:6b:f2: 1d:f3:52:c1:67:0c:15:f1:4f:58:c2:5b:f2:f4:33:e1: 80:c3:22:bb:e8:3e:fe:19:1c:a1:96:18:d3:34:80:68: 85:bd:7f:9b:8e:c9:e7:4f:07:de:17:73:a1:da:b9:1f Fingerprint (SHA-256): 59:48:B2:4C:EE:73:D0:BF:FB:BF:5D:30:49:3B:30:BE:03:01:03:EA:D3:F2:5E:08:79:9D:61:2B:0A:29:B3:0C Fingerprint (SHA1): A6:D3:53:EF:E1:BB:54:93:46:1D:B5:B8:DD:AF:71:9F:BC:25:AD:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:d8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 18:52:46 2023 Not After : Tue Jun 20 18:52:46 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:8b:18:6e:2a:53:42:07:cd:f1:89:37:02:75:56:d2: a3:50:bd:be:9d:75:33:f1:0f:f8:72:72:62:8d:a1:9a: 9a:b8:0f:8c:53:af:6b:2d:64:5a:17:3c:8d:26:ac:9b: b7:2f:36:dc:1e:8f:b0:9a:40:79:b2:45:64:05:56:46: 4f:3a:18:b6:b8:9e:ac:66:98:1e:35:2e:52:18:ba:4a: d9:96:bc:1c:cb:ae:f6:84:4b:b2:f6:c9:52:40:7f:04: 28:5d:50:29:3d:55:dd:b2:dd:e3:fe:a6:da:da:2e:28: 2e:d5:e2:4f:bb:36:33:41:75:72:d2:bb:e6:b1:2a:59: 3a:a8:4a:99:03:11:43:b7:da:44:89:77:a6:73:13:e2: 9f:ec:e1:73:ec:d8:c8:bd:aa:94:62:70:b1:27:76:97: cf:41:7c:86:f8:76:32:68:6f:58:cc:39:01:a2:60:5c: c4:f8:fc:ce:40:90:a5:94:c7:02:bc:2f:e9:a2:d8:8b: a1:92:ed:a3:b0:73:fa:24:e2:8c:a6:83:42:41:fc:e9: d0:86:51:58:80:0e:a4:3c:c9:6a:b3:a3:33:76:0c:20: 2b:fd:e5:71:48:02:18:d9:05:29:88:ba:f6:a1:cf:94: 56:6c:1b:35:a2:1d:7e:f4:c4:39:00:a0:2c:69:a2:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:10:3c:f4:93:c3:9d:09:d8:73:3d:7a:aa:89:ef:66: 1e:cb:5e:4c:3a:7d:85:fa:ed:28:4d:99:2c:6a:a9:2a: b1:de:83:a0:f0:53:da:df:c2:68:f3:4c:1a:cd:50:a9: 68:09:75:3a:94:40:de:8a:bc:f1:8c:58:f6:ac:37:ad: 44:6d:a7:2d:73:83:f3:ab:06:c2:1d:a4:4a:dc:94:7b: a7:da:d7:f4:9a:38:4c:b1:ad:38:55:2e:64:b3:79:01: 6e:95:78:1c:b6:df:bf:cc:24:b9:78:00:63:4d:21:cb: 39:32:94:40:51:38:43:ed:fc:61:3f:4b:23:de:9b:67: 13:12:43:f3:1b:7e:b4:d0:f5:59:fd:2b:55:f2:c8:80: aa:c1:8f:0e:89:c0:49:2b:68:bd:42:be:46:a7:e6:8f: d4:22:3a:e5:b4:b3:00:b3:7b:36:b8:56:9b:af:22:c6: cd:21:1e:e8:d1:7f:03:75:a6:d9:56:5f:03:45:97:c2: c5:da:ac:8c:9c:ea:b8:d2:7d:dd:dd:11:cf:0a:b7:fb: 24:03:db:4f:2a:3c:61:82:4e:fe:eb:0c:98:a2:31:fa: d9:76:e0:26:5d:34:a8:2c:a3:8e:17:e2:3b:24:e2:65: 49:cf:3f:7d:9e:59:66:92:09:a8:6d:01:69:0b:45:64 Fingerprint (SHA-256): F2:F1:F4:B1:9D:08:36:94:52:69:89:2A:1C:6E:5F:38:99:80:32:12:2D:12:41:AD:EB:65:2B:3F:EC:EC:64:D0 Fingerprint (SHA1): 2C:30:4A:17:3F:AC:F9:85:D2:1B:AB:26:93:18:61:F4:35:DB:A1:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:2d:dc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 18:52:48 2023 Not After : Tue Jun 20 18:52:48 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:1b:ff:0c:f6:64:aa:d3:2f:da:a6:f8:e4:4c:d1:0e: 4d:55:04:7b:2e:c4:bb:90:84:20:8f:d9:b8:ee:71:ae: 72:91:46:2a:4a:93:88:7d:75:14:da:8b:80:84:ad:f6: e1:9a:15:82:ad:f6:b0:cd:48:60:0f:3b:99:c5:f8:9b: 7f:76:83:08:8e:f5:f5:bf:11:02:28:5c:59:3f:e6:b9: 60:5c:b2:23:40:10:04:8a:b7:29:4b:26:e7:2c:4a:c6: a2:08:bf:b8:d1:4a:70:a2:fc:e2:d1:91:67:2f:18:c5: 18:4c:67:6b:95:f0:a0:02:d0:12:cd:30:a7:4f:14:db: 66:f7:a3:20:28:83:e0:75:a3:35:c3:de:72:02:cd:02: b2:e5:58:0d:69:d9:24:6d:19:b9:9e:2a:38:e6:5f:1d: 7f:92:f0:49:7c:e3:8a:2d:f0:dd:51:32:16:66:76:bc: a6:76:69:62:6e:d3:cf:4d:a8:5f:68:66:09:03:1e:e4: 6f:1a:e7:ba:fa:25:bb:ab:c1:85:73:74:23:21:57:c9: 28:b6:b8:f3:e6:83:51:b9:29:f0:63:d8:9a:3d:79:32: 9d:9a:fc:34:59:b1:69:05:33:f2:a0:14:8f:0b:6a:aa: 55:36:34:cc:4f:36:c8:e4:4f:ec:30:1f:b4:00:6b:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:9e:f9:67:b9:89:da:b5:b6:2f:32:90:c8:85:89:64: 10:c5:8f:9a:a1:23:e8:3c:08:4e:2c:05:94:61:09:6e: 75:d0:66:86:7b:68:80:72:f9:6e:74:9e:98:f4:72:fa: 33:e6:40:ef:e6:c7:16:99:30:9d:a0:4a:9d:37:f0:46: df:75:a6:9e:0b:0a:e9:53:72:b0:bf:26:88:2a:8f:6d: 0d:16:2f:94:ab:15:e5:be:86:c8:64:a9:ce:0b:82:e0: 4c:8b:c3:48:2b:21:79:00:21:ea:ed:24:68:f8:2b:4a: e7:e6:45:8d:ca:0a:8c:c9:3a:e2:cf:d4:7b:60:87:fd: 41:68:ef:76:8e:81:06:fc:df:fd:11:ce:3d:81:4e:41: bb:b1:dd:b6:52:a2:83:2d:e3:2b:7a:f9:d6:16:9d:b8: 48:82:4d:95:5b:eb:8b:0b:a9:b9:fd:5f:ae:2f:c9:07: bd:dd:c8:79:7b:95:ed:69:22:4a:47:31:18:4e:d5:fd: 92:0e:87:60:a0:51:fe:05:ac:67:ca:55:35:10:94:f5: 52:a3:76:11:e8:86:7a:3b:e0:f6:d8:46:33:88:9a:e5: ba:89:da:8c:25:26:e6:28:a8:04:27:77:e7:e6:96:f4: 60:ed:30:28:d8:01:99:ef:f9:3b:b9:95:6d:95:be:69 Fingerprint (SHA-256): 33:B0:3E:7B:37:6F:29:42:3F:7B:62:FF:4F:AC:98:8D:A2:BD:C8:0D:C7:6E:09:DE:7C:95:4B:26:19:6D:6C:44 Fingerprint (SHA1): A3:45:5C:52:CE:F1:C7:7E:2B:7D:C6:16:37:7E:C1:F6:99:A9:67:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> dsa 86f5c0579f6a04b33d0f2ae17bb47675af2d3d8e NSS Certificate DB:localhost.localdomain-dsa < 1> ec 40193c55b7083899eaaf3dd930c078f5f5c9fefb NSS Certificate DB:localhost.localdomain-ecmixed < 2> rsa e22ae5061a5f8da19eee587e2a0144d38b9dc504 (orphan) < 3> dsa 060eff0e831063331db13df6acbe3fe9d8e98d26 NSS Certificate DB:localhost.localdomain-dsamixed < 4> dsa 731c57fbd3dd3aa287c2cddc8356009bda369ac3 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 5> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> ec 4947a33978d91ba9583baae5bcfc5f918df5645a NSS Certificate DB:localhost-sni.localdomain-ec < 7> ec baa3c2d2b564cd51f8b0c9c4c80cc6545614c798 NSS Certificate DB:localhost-sni.localdomain-ecmixed < 8> rsa 02bb08b1459fcad468fcbd8c504eb5080a08cc12 NSS Certificate DB:localhost.localdomain < 9> ec 032eeeca5adecc239d3856387aa1cb1f8e68b9d3 NSS Certificate DB:localhost.localdomain-ec <10> rsa 6fc813fad78e23ff9472ce150ed84400084c6b1f NSS Certificate DB:localhost-sni.localdomain <11> dsa 776da9793a1241839e8854a0bb2dd26fd867a370 NSS Certificate DB:localhost-sni.localdomain-dsa cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 20 18:53:47 UTC 2023 Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Mar 20 18:53:47 UTC 2023 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1226 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1426 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 582 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 360448 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 110592 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 728 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Mar 20 18:53 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:25 2023 Not After : Mon Mar 20 18:52:25 2028 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:e1:de:95:28:48:a4:81:9c:85:64:25:12:b3:91: 0b:c8:09:19:51:97:9c:b3:ca:16:fe:b1:07:32:08:53: 0b:24:19:f7:9c:9d:31:06:32:b6:09:07:f2:41:dd:85: cc:fb:eb:c6:8d:69:a3:28:bc:e5:f7:f8:01:4f:e5:9a: 90:92:df:b6:f5:c1:59:19:48:4f:b2:8f:1b:7a:32:4b: 46:41:92:f5:f9:4b:a6:fd:b1:5c:3b:21:17:21:6f:b3: 30:37:c9:71:0d:48:de:a0:62:fa:72:79:16:d1:9e:0c: 45:9c:11:1b:fb:5b:af:72:a7:21:1c:32:bb:df:37:6a: f8:19:d6:bc:08:a4:56:12:4a:b8:ba:29:a4:51:3d:61: ec:b4:00:ad:2f:bc:9e:78:c4:13:08:12:02:1e:cd:9a: 27:5a:e3:30:bf:8e:33:4f:e5:8b:0b:aa:85:c2:c1:11: 30:7c:01:5e:4d:b6:a0:9f:6d:a5:76:03:c5:7d:a3:79: b2:d7:e8:f7:5a:c2:1c:fc:e0:98:a5:03:a0:5f:38:cd: 7c:1d:38:89:ca:07:e3:39:e3:09:03:5a:a0:cb:40:ae: 5f:87:75:67:08:68:9f:43:10:94:50:ce:ea:bf:9b:4c: 95:77:cd:09:f7:7e:7d:fe:0d:4b:83:a1:43:a3:5d:ef Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:ad:3d:5f:54:fc:34:80:52:3a:d2:94:1e:e7:5b:f6: dc:aa:2a:dd:04:56:c3:95:ef:2c:5a:49:a8:70:05:37: 5c:66:dd:48:9f:8c:77:2b:8a:ef:88:19:f4:f1:37:55: 5a:ca:f1:27:58:1d:19:13:c0:46:85:83:eb:3b:6b:56: fc:2c:eb:98:e2:bf:d7:61:e1:ca:1d:a7:c6:c4:6f:95: 98:d1:83:a4:dc:51:80:08:68:7a:b8:8c:13:c8:de:37: fa:2d:e6:41:ac:32:4d:f4:8e:f7:70:d1:71:77:41:6d: de:92:43:07:06:fd:ef:44:2b:fd:35:03:ad:f6:01:02: ea:df:fa:6a:fa:7e:26:79:6e:bf:3d:1c:7c:1e:9c:1d: b8:22:50:c4:7a:ed:0c:04:86:2d:c6:a0:68:8d:a1:3b: 77:e7:16:59:d8:78:cf:cc:c3:da:8e:c9:80:d5:8e:ac: 17:9d:8a:9a:a5:63:6e:94:e4:1d:4a:eb:81:3d:09:13: 75:ed:02:85:e1:03:77:27:a4:a8:b4:be:be:7c:31:3b: 7f:42:10:e2:cf:75:30:2c:be:c3:fb:47:e9:2b:d1:d8: 44:ff:bf:fa:f0:b6:a2:82:52:9c:ed:a7:c1:f3:9d:45: 26:97:d3:83:11:1f:70:fa:f3:d8:37:3e:f3:b0:34:bb Fingerprint (SHA-256): 9E:C5:10:54:C0:E3:C8:4E:43:B5:07:EE:D7:FD:FD:26:A2:08:30:56:27:02:D8:58:41:81:C7:A8:EB:88:26:43 Fingerprint (SHA1): 79:21:64:11:F4:EE:94:AD:63:EB:41:8F:F3:87:6E:90:FD:0C:4F:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { b7, 70, b6, 7c, 29, 42, 4b, 6f, 18, ef, e6, d8, 8a, 21, b1, 0b 8a, 25, 4c, 5c, a5, 73, 17, c6, 40, 59, 5c, f0, 36, f3, 07, f4 6b, 03, 7f, b5, 33, 13, 51, b4, c2, dd, 86, 54, c0, d0, 9b, 30 2d, a3, 8e, 86, e9, 40, b0, 37, a8, 46, 32, 89, 35, c3, 90, 5f 2a, 48, 8a, 10, d3, b4, 12, e2, 8c, 63, bf, 22, 13, 96, 72, 58 6e, f5, 5b, 34, 9e, 7d, f1, 05, 22, 32, 47, 3d, 98, 48, db, ed 64, c6, 52, 8e, a7, f3, d3, 9e, 8a, a0, 1c, 04, d4, 9b, 3b, 32 96, 3d, 93, 6b, 6a, 32, 9d, c8, ef, 06, 66, 47, 72, 04, 35, ad}; privKey CKA_ID = [20 bytes] { 4f, 76, a7, 51, 7a, 9f, 7b, 28, 17, b6, 6f, e8, 94, 06, 9c, bd e3, 4f, 9f, cd}; pubKey CKA_ID = [20 bytes] { 4f, 76, a7, 51, 7a, 9f, 7b, 28, 17, b6, 6f, e8, 94, 06, 9c, bd e3, 4f, 9f, cd}; matching public key found pubValue = [128 bytes] { 18, 58, 31, 9d, 65, e4, b0, 8f, fb, ea, 93, 9f, b2, 82, 0d, 0b a2, 07, 9e, 6a, ef, e0, 14, 74, 33, 0b, 06, dd, 00, 62, a3, d5 69, c0, fd, 40, df, a0, a6, c0, 51, cb, 51, 7b, 97, 1e, 6d, f4 a8, 7b, f2, 31, c3, cc, 3b, 7b, 90, 2f, b6, f9, 5a, 49, 77, 52 cc, ca, f7, 77, 8f, c6, ca, 98, 40, fc, 01, 18, ae, 99, e4, c9 a6, 6a, 47, 39, cb, 3c, 1b, ef, 51, c4, 75, f9, 16, ea, 58, 9f 0d, 15, 65, cb, db, 5b, 86, db, 0c, 28, 64, b6, 46, 29, 45, 42 77, 13, 33, ea, 32, c1, 73, 2b, 1b, 65, 4e, 2a, 99, 6f, 1e, de}; privKey CKA_ID = [20 bytes] { 48, fa, 3d, e1, a8, 0a, 99, 8c, 87, 7d, 24, d2, a2, f4, 95, 9a 8c, 94, 41, 99}; pubKey CKA_ID = [20 bytes] { 4f, 76, a7, 51, 7a, 9f, 7b, 28, 17, b6, 6f, e8, 94, 06, 9c, bd e3, 4f, 9f, cd}; pubKey CKA_ID = [20 bytes] { 48, fa, 3d, e1, a8, 0a, 99, 8c, 87, 7d, 24, d2, a2, f4, 95, 9a 8c, 94, 41, 99}; matching public key found pubValue = [65 bytes] { 04, 40, a1, 4b, 1c, 82, 76, 7e, 8a, cb, 24, f1, 4f, 7f, 5b, d4 ff, 0e, 5f, df, 20, 09, 97, b5, f2, fc, 0f, 56, 5a, 63, 39, 11 a0, c6, bf, 07, 91, 97, 5e, 76, 7d, 97, e8, 4a, 5b, d5, c5, 0b 14, 15, 20, 8a, 26, 9f, 3c, 32, 34, ec, 16, 2f, 6c, 20, b9, 44 e6}; privKey CKA_ID = [20 bytes] { 0b, 1f, 75, 98, 97, 5e, 5e, 4b, b1, 07, d1, 5e, 37, 0c, bb, 47 b0, 3e, 41, 40}; pubKey CKA_ID = [20 bytes] { 4f, 76, a7, 51, 7a, 9f, 7b, 28, 17, b6, 6f, e8, 94, 06, 9c, bd e3, 4f, 9f, cd}; pubKey CKA_ID = [20 bytes] { 48, fa, 3d, e1, a8, 0a, 99, 8c, 87, 7d, 24, d2, a2, f4, 95, 9a 8c, 94, 41, 99}; pubKey CKA_ID = [20 bytes] { 0b, 1f, 75, 98, 97, 5e, 5e, 4b, b1, 07, d1, 5e, 37, 0c, bb, 47 b0, 3e, 41, 40}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 --------------------------------------------------------------- | skipping key corruption test: requires sql database --------------------------------------------------------------- TIMESTAMP dbtests END: Mon Mar 20 18:53:50 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 20 18:53:50 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:80:0b:b6:d3:f9:4b:e4:ed:29:f1:d1:56:b8:ac:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:f6:8c:81:1a:16:6f:bb:32:98:9a:06:12:aa:39:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:00 2023 Not After : Mon Mar 20 18:52:00 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:8c:e8:51:d8:2f:01:24:fb:9a:56:0a:e7:00:c3: b4:98:9f:dc:ae:f3:dc:96:3e:de:07:59:90:27:10:a3: 7e:a3:fe:8b:aa:38:04:ce:81:8a:ca:96:dd:e1:26:7d: 56:f8:ab:d3:57:9c:0b:c5:81:e9:39:25:00:37:16:43: 22:f9:60:00:d6:f9:19:12:7b:66:fd:28:4b:9c:4f:67: 28:96:af:02:25:1a:5a:2d:76:e8:3d:87:52:99:3f:b3: a4:52:ad:92:19:ee:11:1b:88:fb:a7:c7:95:5b:13:63: 74:54:91:3b:ef:d8:80:44:07:d1:bc:93:fe:18:ac:de: 1e:70:da:27:fe Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:17:92:58:fb:76:52:9b:f9:59:b2: 8a:dd:9a:fe:33:28:68:59:d7:73:88:6b:6e:a8:68:28: 2f:55:d4:41:84:41:81:da:d8:7d:43:a0:2e:a7:78:d8: 7c:2c:bc:27:16:1f:8c:97:6d:5f:2a:d6:82:e6:32:55: 31:7c:96:63:f0:50:bb:02:41:0d:96:a5:39:fb:e3:06: ae:1a:5d:70:43:47:68:f2:da:1b:30:55:bf:67:ed:83: d3:ce:66:c7:cb:fd:69:b1:a4:92:24:b7:0d:bc:f8:9d: fb:40:52:33:36:6d:88:12:50:45:ae:3c:ef:4c:af:2a: b6:26:6f:be:a3:ff:f3:c3:7a:e2 Fingerprint (SHA-256): EF:6C:12:12:91:E6:70:20:1D:39:6A:C3:1F:18:DA:82:49:B7:0A:F1:5D:A7:8D:68:02:2D:59:39:D6:D5:A6:EC Fingerprint (SHA1): 7E:99:AE:D0:14:50:A7:09:AA:0F:14:48:34:CC:CF:F5:3D:89:C2:F0 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:23 2023 Not After : Mon Mar 20 18:52:23 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:48:9c:3f:7d:f8:5c:5b:4f:ce:a9:8d:fe:d4:33:47: cc:81:ca:b6:3e:53:da:2f:eb:93:3e:1c:e0:f4:d5:20: de:a4:4b:79:b1:b4:e4:cb:4e:45:f4:a7:13:79:e5:f4: f7:c4:1b:a4:51:07:06:01:1f:17:7c:5b:d5:48:18:ae: 52:ed:9f:15:34:9d:96:9a:f2:c9:fb:32:fc:0c:5f:46: c6:21:57:c8:2e:da:ee:9c:a6:6e:73:4a:dd:b2:4d:74: 2a Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:a5:b2:7e:ad:d8:34:ce:b4:ee:0b: 18:54:23:88:e9:3a:dd:b5:05:f0:03:da:4e:81:19:40: f9:f2:67:ea:7b:74:65:b0:b2:5e:09:e7:95:0d:59:3b: ba:9d:7c:c6:07:63:00:ed:0a:f0:7f:91:a9:cc:c7:92: fc:ca:60:4e:eb:e4:8d:02:42:00:b3:23:6d:23:07:5e: 52:a2:31:65:00:8d:a1:64:74:6d:12:0d:5d:84:bf:26: 6c:af:64:6d:04:96:49:60:c2:21:a3:41:3e:63:45:51: 61:12:ed:e1:88:a1:a3:1d:75:de:96:48:f8:8a:74:c1: 85:55:77:22:a5:f6:d4:8e:23:d3:a6 Fingerprint (SHA-256): 31:66:AB:9A:98:DF:62:A9:AF:9F:D4:B9:44:9C:80:6F:20:6C:E7:34:65:0B:F9:07:9A:73:EE:D8:B5:6D:E6:96 Fingerprint (SHA1): 5E:07:04:1E:56:77:38:E5:D8:E8:05:B4:A4:BE:5C:D4:48:CD:6E:31 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:34:5c:ce:58:e8:9b:b1:74:8f:06:38:ea:91:a2:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:00 2023 Not After : Mon Mar 20 18:52:00 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:8c:e8:51:d8:2f:01:24:fb:9a:56:0a:e7:00:c3: b4:98:9f:dc:ae:f3:dc:96:3e:de:07:59:90:27:10:a3: 7e:a3:fe:8b:aa:38:04:ce:81:8a:ca:96:dd:e1:26:7d: 56:f8:ab:d3:57:9c:0b:c5:81:e9:39:25:00:37:16:43: 22:f9:60:00:d6:f9:19:12:7b:66:fd:28:4b:9c:4f:67: 28:96:af:02:25:1a:5a:2d:76:e8:3d:87:52:99:3f:b3: a4:52:ad:92:19:ee:11:1b:88:fb:a7:c7:95:5b:13:63: 74:54:91:3b:ef:d8:80:44:07:d1:bc:93:fe:18:ac:de: 1e:70:da:27:fe Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:17:92:58:fb:76:52:9b:f9:59:b2: 8a:dd:9a:fe:33:28:68:59:d7:73:88:6b:6e:a8:68:28: 2f:55:d4:41:84:41:81:da:d8:7d:43:a0:2e:a7:78:d8: 7c:2c:bc:27:16:1f:8c:97:6d:5f:2a:d6:82:e6:32:55: 31:7c:96:63:f0:50:bb:02:41:0d:96:a5:39:fb:e3:06: ae:1a:5d:70:43:47:68:f2:da:1b:30:55:bf:67:ed:83: d3:ce:66:c7:cb:fd:69:b1:a4:92:24:b7:0d:bc:f8:9d: fb:40:52:33:36:6d:88:12:50:45:ae:3c:ef:4c:af:2a: b6:26:6f:be:a3:ff:f3:c3:7a:e2 Fingerprint (SHA-256): EF:6C:12:12:91:E6:70:20:1D:39:6A:C3:1F:18:DA:82:49:B7:0A:F1:5D:A7:8D:68:02:2D:59:39:D6:D5:A6:EC Fingerprint (SHA1): 7E:99:AE:D0:14:50:A7:09:AA:0F:14:48:34:CC:CF:F5:3D:89:C2:F0 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:23 2023 Not After : Mon Mar 20 18:52:23 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:48:9c:3f:7d:f8:5c:5b:4f:ce:a9:8d:fe:d4:33:47: cc:81:ca:b6:3e:53:da:2f:eb:93:3e:1c:e0:f4:d5:20: de:a4:4b:79:b1:b4:e4:cb:4e:45:f4:a7:13:79:e5:f4: f7:c4:1b:a4:51:07:06:01:1f:17:7c:5b:d5:48:18:ae: 52:ed:9f:15:34:9d:96:9a:f2:c9:fb:32:fc:0c:5f:46: c6:21:57:c8:2e:da:ee:9c:a6:6e:73:4a:dd:b2:4d:74: 2a Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:a5:b2:7e:ad:d8:34:ce:b4:ee:0b: 18:54:23:88:e9:3a:dd:b5:05:f0:03:da:4e:81:19:40: f9:f2:67:ea:7b:74:65:b0:b2:5e:09:e7:95:0d:59:3b: ba:9d:7c:c6:07:63:00:ed:0a:f0:7f:91:a9:cc:c7:92: fc:ca:60:4e:eb:e4:8d:02:42:00:b3:23:6d:23:07:5e: 52:a2:31:65:00:8d:a1:64:74:6d:12:0d:5d:84:bf:26: 6c:af:64:6d:04:96:49:60:c2:21:a3:41:3e:63:45:51: 61:12:ed:e1:88:a1:a3:1d:75:de:96:48:f8:8a:74:c1: 85:55:77:22:a5:f6:d4:8e:23:d3:a6 Fingerprint (SHA-256): 31:66:AB:9A:98:DF:62:A9:AF:9F:D4:B9:44:9C:80:6F:20:6C:E7:34:65:0B:F9:07:9A:73:EE:D8:B5:6D:E6:96 Fingerprint (SHA1): 5E:07:04:1E:56:77:38:E5:D8:E8:05:B4:A4:BE:5C:D4:48:CD:6E:31 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 31:48:ad:6b:a2:c4:5f:ea:50:71:b4:58:e0:d2:b2:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 05:94:0e:38:f2:19:20:ba:77:bb:3b:45:2d:9f:7e:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 90:1c:d5:12:7d:ea:d9:c3:91:44:57:dc:e8:c9:87:1b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: af:2f:ef:ef:1a:d7:de:a9:86:ec:35:de:97:f1:17:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 43:e8:5e:4a:f9:d0:7b:87:60:60:9b:ef:71:47:d6:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2c:56:f8:14:a3:bc:9e:58:88:f1:a1:08:12:86: 56:e1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f9:70:44:e9:95:cc:9e:08:b5:81:33:ed:e7:c1:cd:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:70:71:fc:ac:c9:06:08:aa:5f:f7:b6:0b:ad:ab:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 99:48:53:3c:50:5b:13:dc:fc:ea:2a:4c:ae:8a:2c:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: db:78:60:91:db:1e:37:8b:bd:e0:1a:29:4a:40:54:5c Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 69:f5:8f:39:dd:8c:a0:41:b4:32:67:79:84:1e:d1:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 93:59:b6:55:86:86:2c:a5:ca:cb:e9:49:d4:4c:8f:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 17:96:ab:b5:63:2d:3e:fd:4e:c5:85:8b:bf:66:b4:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:48:ca:24:ee:1d:13:d1:92:71:10:fb:2b:8f:6c:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: fd:e3:94:43:47:6b:d2:06:16:d1:d2:e0:e3:5f:85:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e3:78:84:e6:8d:48:bc:99:de:58:c7:aa:55:75:a4:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9b:20:2e:49:ab:56:f7:3d:b6:b7:8d:45:06:9f: d5:91 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: af:4c:50:ff:8c:27:c9:6b:cd:73:3b:c9:e9:6e:ca:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:c9:0a:00:4d:b4:93:30:7d:22:71:ae:d5:d9:05:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a8:54:fc:de:01:6e:91:28:f3:69:af:b1:22:8c:4c:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: de:48:62:fe:a9:24:7e:8f:2f:46:02:60:99:a0:b1:b1 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 47:d0:ac:1d:00:f0:39:91:2c:86:2a:60:23:89:0f:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:90:03:49:9e:ba:a2:30:67:87:34:57:03:83:cf:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0f:2f:7c:c8:7b:ea:fd:6c:a2:16:af:c7:9b:5b:c0:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:27:93:49:a3:c2:20:f1:70:b5:62:a8:31:42:f7:01 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e6:48:cc:07:41:9c:db:38:61:f0:47:19:71:1b: e3:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 95:fb:3b:85:29:f2:d1:5e:c2:aa:5f:e5:d9:19:ce:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:85:c6:80:4d:f3:72:52:a8:17:fd:64:9f:fd:6c:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 41:f0:8f:97:2b:a4:49:17:fb:9b:c1:bd:f1:99:27:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:df:0a:12:8e:a6:de:5c:27:45:9e:e3:95:ab:c3:0c Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f1:32:ee:55:b1:2a:e4:81:c5:bc:9d:a2:1b:89:05:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e5:4b:05:68:90:71:98:2c:8e:be:61:93:f2:0c:d0:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 94:5c:db:e0:cf:b8:e3:2b:88:4d:a7:83:8e:78:bd:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6a:e3:ce:8d:9c:54:c4:1b:cf:51:f4:0a:69:5b:b1:bf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 8e:d8:0e:01:ba:b7:c3:46:aa:da:1d:e3:0e:06:f7:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bd:ca:b3:10:db:31:58:67:63:79:04:6d:37:d9:90:d9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b9:e7:7f:69:97:ca:ef:be:a0:ef:7a:4a:08:83: 58:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ec:fa:00:e4:69:b7:dd:ef:d7:74:d1:af:06:73:e0:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:b7:79:b4:9b:3e:26:1c:60:c6:d6:17:0b:74:70:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 82:7e:c0:9a:6d:e7:31:82:88:08:91:79:8e:74:b2:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 8a:72:87:87:66:27:a5:88:9f:c0:6d:e8:85:6d:4e:50 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a0:df:d9:f6:85:28:48:ba:c1:a0:4b:87:d3:97:7d:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 36:7d:84:27:d7:c9:0e:0b:f1:65:47:fc:b3:d1:65:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a8:ff:f6:ac:d2:9d:85:d3:19:c3:b9:24:cf:d1:c1:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f0:a9:e7:8e:86:dd:14:cc:71:05:0f:90:c7:41:5b:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ae:4b:ae:a8:72:bd:f1:5b:9e:7d:d4:36:16:64:e6:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:24:d5:83:e4:d7:ab:ab:7c:db:22:ce:ca:74:23:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0c:9d:af:1b:44:af:ee:c5:3e:39:80:87:54:0e: 4e:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 56:da:06:fa:b2:18:1f:9d:7c:c1:1f:94:c3:95:19:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:c0:d1:1a:00:67:9a:e8:15:20:21:80:54:4c:11:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 16:9d:f0:2b:09:a8:48:df:6f:57:69:4f:80:55:7b:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 1a:c2:c5:e3:ae:51:14:ee:f9:b3:2c:5f:10:e8:11:bc Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 32:0d:3e:69:7f:14:23:9f:b9:81:ed:82:81:7a:ff:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 58:6c:d4:bc:24:1d:86:04:87:b7:a4:4e:9d:a3:78:f0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4b:75:03:7b:15:11:b7:37:e2:d9:4e:84:ae:00:e8:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ff:1e:56:b4:15:7b:2e:55:b3:5d:8d:df:45:2c:83:41 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:b2:44:f5:d6:bd:e8:9f:3b:0a:3f:0c:fa:0c: 79:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 53:70:e1:b8:62:0a:38:4a:e9:80:62:1e:ea:68:45:80 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:50:20:f9:3c:02:f7:c9:68:69:22:fb:cc:a3:48:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 37:2a:a7:ce:56:05:79:64:31:fe:95:69:e7:7c:9b:ea Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:21:a3:69:c1:6a:5a:cc:6d:63:49:e1:71:63:8f:b8 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 42:cb:0e:b3:2e:85:c9:95:3f:1d:79:b5:e1:08:89:e9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 87:6f:e1:bc:90:8e:1d:49:2f:a7:05:98:b6:2a:3d:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 56:bb:b5:77:64:42:a8:76:e9:23:d8:e6:c4:62:83:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:30:88:04:4b:01:04:03:ac:c0:2b:d8:29:26:c7:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 37:7b:8c:44:dc:a2:79:52:be:5c:9a:4f:97:77:44:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 92:b6:50:ed:a5:65:1e:97:8b:12:53:06:53:ec:8c:a5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ab:28:f6:52:51:87:a2:50:09:84:2d:92:28:b0: 64:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4f:e0:4a:98:a3:dc:5b:2f:9a:cf:3f:86:bc:55:c7:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:6b:2b:d1:60:eb:cb:40:46:0e:81:ae:05:71:90:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5a:ce:b8:44:a3:38:87:ef:62:38:7c:10:d2:ee:c3:cd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 08:6d:59:90:3e:6d:e3:f3:f1:8f:62:e2:c1:e1:c4:ce Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 2e:6b:3f:e1:b7:ad:40:d9:a7:32:c3:90:96:58:53:bc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:fc:eb:26:63:a9:ec:40:fd:40:43:0f:47:1f:cf:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: d1:e8:9e:03:64:27:57:de:84:ef:7c:92:29:0e:f8:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:7a:9a:b6:92:01:71:66:c4:19:83:44:fe:8c:18:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a6:ac:6a:d7:6c:a1:21:27:d1:25:8f:4e:66:38:8e:aa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:f5:1f:96:dc:26:ee:b1:7a:3d:37:93:f3:d0:bf:f6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3f:7f:1c:d4:79:02:56:e0:2f:8e:b8:68:cb:9b: e1:2b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: d7:bf:70:31:aa:16:71:a0:dd:92:62:a0:59:b0:4b:fc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 06:24:98:f8:87:97:aa:25:d4:ac:b7:4d:eb:c3:aa:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 0d:d2:bb:77:20:24:e2:2a:f4:1e:72:14:a4:4f:ef:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 33:f9:3b:b0:04:ae:11:9c:96:ad:85:de:c7:da:ef:79 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 96:9b:0d:54:9c:6e:1f:0a:38:98:79:aa:ad:f9:9d:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 76:a2:3b:4c:61:32:bf:09:99:a4:dd:f5:ff:9e:72:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: dd:d2:53:87:f0:6f:70:4f:f8:4e:9c:ab:01:f3:d0:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:5f:ce:a2:ef:20:98:a6:1e:68:eb:73:58:d1:22:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 93:23:ff:9c:8b:f2:a4:06:ca:c0:42:af:c3:cb:59:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:01:f3:3a:76:d5:01:1d:b5:82:0a:4e:d0:4b:43:25 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2d:9f:84:11:33:d0:72:72:4d:ff:2d:03:49:da: ab:b0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 25:92:4e:9e:c6:e8:ad:be:24:50:79:ac:d0:eb:12:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:b4:53:63:dc:aa:aa:7a:eb:01:c2:0e:0b:96:2c:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 62:6e:e7:78:94:45:72:16:2f:9b:8d:92:9d:e5:ef:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 2b:90:57:4a:db:f5:b8:42:81:6a:7c:a6:bf:8f:b2:05 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5c:5c:b8:34:b6:04:b8:b6:57:fa:56:9e:03:f6:d0:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 67:b6:8e:9a:61:87:d8:74:09:dc:cc:da:9b:56:f2:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:bf:58:be:8d:89:f8:60:9f:75:b5:35:c7:56:52:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:a6:b9:fb:47:32:8c:a5:c6:93:e9:6e:a4:f2:7b:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:e4:e5:44:f8:36:0a:40:1f:57:b5:20:42:b5:7e:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a0:34:94:09:2f:02:b0:88:75:03:8f:ba:e7:21:ee:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:35:d0:43:f4:0d:1b:a0:fc:1e:8d:99:0e:77:5f: 4a:32 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 56:f7:e1:15:99:3b:1b:71:4f:8c:55:22:88:74:f1:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f1:9d:05:1f:ec:70:b2:21:f3:66:4a:14:51:43:3c:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:79:60:d3:18:44:b7:d4:28:25:99:a1:9a:65:c5:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 27:08:e2:6f:54:5a:4c:a2:a7:86:39:c9:11:57:63:50 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:ce:88:d3:99:c7:3e:8b:78:34:4d:e9:67:6c:f3:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d7:75:a2:32:e0:26:b7:d9:8e:a1:02:61:d2:4e:da:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 52:44:de:90:d5:c9:91:25:6e:bf:e9:60:09:16:c7:de Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:44:56:b8:4d:bc:b6:a9:cb:ee:50:83:f5:fb:02: 84:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 05:e5:01:7a:73:f4:1d:4b:a7:d3:86:71:f2:5f:09:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:88:7e:72:2a:90:6a:8e:2d:30:84:31:c6:a7:d4:7f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:77:0e:a2:83:a8:59:1a:c8:96:04:2e:48:d7:54: 50:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1d:42:ca:13:98:83:7f:56:1a:66:3c:4f:21:00:bd:ad Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f6:c1:3b:05:40:8e:30:a5:c1:4d:37:93:55:69: 2b:32 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:25:ca:ed:3a:8b:67:e6:3c:65:b0:2e:93:08:71:7f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:66:39:e5:27:f6:03:db:0b:f2:0d:a9:5f:27:16: 66:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:71:65:f8:68:4c:14:97:5b:e8:5d:d7:e6:a3:27:39 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bc:d8:eb:eb:0f:dd:1d:11:34:ba:d0:b8:d1:71:83:c4 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:11:d1:d3:6e:b5:08:c2:34:d1:c5:8b:59:40:e7: ff:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f5:27:7f:bf:7b:45:31:e5:73:c2:81:a7:d3:8f:97:79 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:ec:7f:75:3a:76:3c:d9:cc:ca:a0:e3:14:78:29: c9:dc tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:2c:7e:a5:3f:9e:5e:d4:f0:a1:3a:b0:16:11:74:18 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:85:b0:49:d9:9f:05:ed:3a:16:ca:d2:a3:0f:94: 7c:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: aa:2a:bd:e5:fd:0b:22:5f:a4:6a:7e:f2:fb:ae:5d:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:66:5d:93:f9:24:9f:52:af:ef:e6:42:a1:e9:d4:9c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:0f:c9:cc:f5:24:15:5a:99:5c:96:92:2e:0b:bd: 95:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:ec:2e:98:75:7e:f1:17:0f:cc:87:8b:2d:f7:2f:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:5f:b9:1c:43:af:27:21:41:06:95:b3:8f:16:2b:40 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:19:10:16:6f:b1:16:fd:5c:fb:ac:64:8f:c2:4e: 1f:ff Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cf:d5:37:2b:b3:75:3f:aa:c6:0b:32:75:3d:0b:57:03 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:39:59:16:b3:07:3c:62:a9:b7:7e:ab:06:86:b0: 32:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:3a:1e:f2:42:39:02:0e:d2:f2:41:16:c1:ef:b4:f3 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:75:ed:e7:9a:de:5d:94:73:65:e1:51:49:f3:3a: 1e:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:85:23:3a:b4:e9:95:4a:05:09:6f:18:6c:62:dc:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:cc:12:33:72:91:f3:ef:56:74:85:49:59:25:b3:4b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:c2:19:c6:bc:d0:0e:78:3d:c7:38:8b:42:98:be: 8d:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:2e:61:4f:5e:ec:7e:a9:7e:d0:0a:79:12:08:dc:a0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:0f:c1:4f:a1:51:8f:90:9c:4f:e8:39:0a:4e:30: 5a:97 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1a:9b:c9:2b:2e:40:96:f6:31:81:7d:0c:2d:50:7e:c2 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:af:d7:a2:30:03:7b:07:fe:c0:a3:51:af:dd:05: 42:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e2:40:6b:b7:99:d9:bb:fb:f9:35:90:18:65:bc:b5:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:98:fe:3f:95:da:67:f6:e0:06:0f:ec:79:b8:7d:53 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:f6:b3:93:db:03:54:0f:f4:90:82:b8:46:6b:cd: 24:4b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: aa:70:4a:f7:6a:7a:dd:75:1f:f6:8b:6f:5d:1e:70:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5f:b0:b8:b8:df:b2:83:56:0f:1c:77:c2:db:cc:92:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:17:f3:8b:8f:fd:c4:fc:57:f1:9c:4c:07:97:37: e7:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:76:55:3c:ad:0f:86:51:ed:82:b5:51:ee:90:c7:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:5a:4c:fd:63:1b:06:68:e1:8c:ec:63:06:ad:fa:80 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:29:75:b1:47:4c:a1:5c:ac:e0:0a:f6:74:4e:46: 33:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 09:8a:44:03:cc:e8:fd:3e:fe:90:8f:29:74:72:d6:59 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:1a:98:47:5d:45:95:65:22:1a:61:ed:48:55:05: 0f:24 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:8d:39:33:57:b3:3f:71:15:5f:da:93:5f:37:a1:a1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:2f:18:b4:5e:95:be:87:4e:05:90:9b:df:46:25: dd:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 70:6a:88:f5:63:5b:1b:8d:f3:69:dc:9c:ab:fa:47:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0c:47:3f:42:e4:a8:04:ce:6a:1e:0a:2d:03:00:d8:01 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:17:bd:96:71:7c:d9:60:9a:f0:94:d5:dd:c3:cd: ee:0b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:58:af:6c:13:3c:de:be:8d:c3:1b:db:c5:c2:e7:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f9:56:78:6d:3f:4c:24:9b:a5:be:69:98:fd:83:a5:e1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:ef:29:87:97:5f:27:40:d3:3f:01:c0:f8:e1:d2: ff:27 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2c:ee:79:a2:d3:b3:b8:b8:78:e9:2a:2d:6b:cb:97:f5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b8:41:2f:6f:b5:65:47:63:9c:7d:01:24:1b:9d: ee:a6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6d:17:03:66:52:05:32:43:e5:9e:f6:c5:83:d8:5b:82 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:e3:8a:c2:75:d1:14:ca:ce:df:f2:14:dd:cf:e1: 57:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 10:c0:0c:46:ac:1d:ab:b8:35:47:2d:f0:b0:6e:53:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f3:98:34:b5:7d:ff:56:58:3f:ba:80:33:49:fe:65:52 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:ef:77:2d:88:e4:f0:a1:14:1c:8c:21:a2:67:02: 3c:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 62:31:b7:ca:88:93:c8:1f:17:6b:cd:62:f4:be:3e:cd Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:fd:a5:c5:8a:86:c3:d0:0a:08:05:27:8f:98:8d: 6d:13 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:df:e4:f5:2a:0f:c1:17:e0:0c:ab:07:2d:a6:32:73 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:76:87:a8:2c:4f:6f:77:06:7f:7c:3d:ad:d6:26: 50:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fc:89:30:22:78:19:97:a8:a6:c4:35:06:87:5a:6f:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:31:45:8e:f1:08:2b:4f:0e:15:7a:7e:98:c8:5e:82 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:aa:00:30:7e:f0:0e:8d:81:d9:5b:64:8e:bb:ed: 6b:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:64:2b:37:56:24:67:4f:a0:b2:c3:7f:67:b2:66:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:4c:6b:73:38:c6:9b:ac:40:07:b4:15:a6:e8:78:a5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:2b:6f:72:5d:77:0c:a5:a3:b9:c7:1f:41:7b:5f: 0b:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:89:dd:72:48:a4:d4:b2:fe:b6:66:95:9f:12:02:21 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fc:27:6b:b9:80:4f:81:4f:78:a2:8c:4a:85:e4: c5:50 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:68:cc:1c:13:c3:31:4c:4d:77:7f:08:4b:ec:ca:b5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:86:d4:37:aa:d8:b1:8d:ec:50:7a:1e:dd:11:3c: 64:37 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4d:1f:04:f4:a0:42:b7:40:71:82:86:03:b9:07:40:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:fe:eb:c4:e8:21:95:62:38:a7:97:05:5d:d5:31:02 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:cb:81:bc:04:f5:d4:33:03:e1:86:cc:95:78:86: 1d:0e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:0b:10:db:b9:a0:03:14:94:78:f4:d7:f8:30:a2:85 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:80:72:f7:f8:a7:32:79:b8:e2:66:9d:c2:70:fe: 9e:ee tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e9:8a:85:54:6d:d4:59:2c:66:ff:40:66:bf:b9:e0:6c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:aa:ea:c8:ea:f1:ff:ec:b0:96:5d:b5:70:cc:13: 77:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e7:6d:b1:e0:11:42:55:07:ae:c5:45:cc:ab:2c:b2:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4a:3d:8c:09:bf:b1:b2:9d:86:91:e6:91:af:36:68:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:eb:17:27:79:60:7d:40:35:67:6e:55:50:25:8a: 56:a7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:76:95:88:97:5f:2e:f4:84:53:6e:81:cb:56:3f:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: aa:fd:9c:6e:80:1a:9a:f1:f0:d7:1c:c4:99:7b:1d:09 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:79:01:e1:f3:0a:21:79:5d:04:e4:31:ab:90:a6: e4:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2d:6e:09:a1:c1:40:a4:41:7a:2b:ae:bc:ea:0b:8f:41 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:11:d9:84:a3:a5:a6:d2:eb:1f:4d:cd:35:14:5d: ee:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:45:ef:c5:31:04:29:23:7c:3c:75:1b:8b:62:56:53 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:c7:9b:1b:8b:d6:c8:36:da:6a:fe:88:6f:36:e1: ab:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:62:26:86:bd:f9:70:e7:ba:bb:9c:e1:fa:2e:b4:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 61:7c:bc:f9:4b:3d:3c:be:f3:ce:ee:d4:3c:85:4c:6c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:14:87:30:b8:19:2d:8b:46:0b:75:36:b5:58:38: 08:5e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:a9:41:48:ce:86:21:64:0c:73:01:07:b5:b5:99:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:3d:d6:df:f8:86:ee:22:2f:fc:0d:c5:d0:b2:b6: 58:d9 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8b:c7:14:7d:32:9c:74:f1:f4:0b:70:9b:b6:e5:c4:64 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:c1:8f:ab:fa:af:20:f6:e9:73:2f:51:33:91:24: 63:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 80:ad:3c:93:e0:e3:16:4b:44:39:39:f2:78:a7:30:77 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a9:1b:a9:6e:a2:b1:a8:bf:f3:e7:05:e3:60:9f:6f:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e6:99:38:38:66:af:af:74:bd:1d:98:2b:e8:ce:29:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ab:c8:d0:b9:72:b1:75:99:ba:b3:31:5a:4f:d6:92:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ca:09:f2:76:fa:4e:ba:5e:5c:cd:67:81:22:08:8c:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ab:02:87:95:01:3e:2f:ff:4d:ae:32:29:1f:38:db:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:9c:19:51:3f:39:8e:9f:16:3e:ff:e1:00:6b:77:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e7:c4:19:29:51:32:55:b2:d2:e2:5e:ed:1a:42:ff:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0f:de:a6:ac:75:41:f8:62:93:c3:c9:2c:32:aa:74:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:92:02:fd:d3:b7:31:10:76:d7:2f:f4:2a:87:1e:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0a:c1:72:83:75:37:34:12:85:57:4a:57:65:ec:51:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1f:16:1a:32:3c:f0:97:9a:df:fe:fa:f4:64:da:0a:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0b:e0:46:bf:c9:9a:79:73:f7:b8:fe:aa:bd:ce:d3:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:65:41:9e:20:aa:39:d2:6d:8d:48:a0:b8:5a:5f: f3:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 71:2e:c1:6a:d4:c7:6d:44:94:11:57:cc:5a:ae:26:59 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:7c:0c:9e:d8:58:bc:75:3c:a2:7a:99:96:e3:ae: a8:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:27:3c:79:c4:d7:87:e3:88:9d:b3:70:c2:db:ce:d6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:a3:64:4c:49:2f:17:04:47:3f:db:90:6e:8a:f3: 20:6d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:c9:ff:76:9b:88:76:94:e8:84:7b:89:13:85:9e:62 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:1b:02:3b:87:38:5d:2f:ad:ac:c4:71:44:69:2d: c0:6d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d1:66:c2:c8:95:fb:bd:6b:44:95:2a:27:6a:86:76:88 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:2b:74:6f:06:43:95:fe:08:cf:06:cb:c0:b1:8d: cd:33 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:0a:d9:d9:2b:8c:c1:78:38:b9:2b:cc:a6:04:59:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e1:c7:57:59:45:19:67:a5:f7:40:1f:1f:e0:2b: fd:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d3:01:3f:72:5c:f4:a4:46:c7:25:bc:3f:dd:e0:23:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:c7:0a:32:5a:08:b9:9c:30:ae:32:ef:ad:b3:3f:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:4b:61:cd:38:b1:1a:84:8e:ad:9e:7e:88:09:59:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ab:69:87:95:42:fb:b4:26:dc:06:e9:74:f6:e5:47:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:63:15:54:d1:a5:40:24:9b:c4:e6:9c:07:9d:50:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:23:fa:86:a3:81:2f:12:78:96:c3:1f:26:b9:e0:7d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Mon Mar 20 19:08:40 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 20 19:08:40 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 220c05089bdcd0a7e842e521894225b7e910445e NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 220c05089bdcd0a7e842e521894225b7e910445e FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 220c05089bdcd0a7e842e521894225b7e910445e FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle Changing byte 0x0005139c (332700): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 20 19:09:02 UTC 2023 Running tests for sdr TIMESTAMP sdr BEGIN: Mon Mar 20 19:09:02 UTC 2023 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v1.30514 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v2.30514 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.30514 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v1.30514 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v2.30514 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.30514 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/combined.30514 -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/decoded.30514 -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/log.30514 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/decoded.30514 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/log.30514 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.13 user 0.13 sys 0.00 0 seconds TIMESTAMP sdr END: Mon Mar 20 19:09:03 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 20 19:09:03 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 20 19:09:03 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 20 19:09:03 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 20 19:09:24 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 20 19:09:24 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2178 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2178 found at Mon Mar 20 19:09:24 UTC 2023 selfserv_9887 with PID 2178 started at Mon Mar 20 19:09:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2178 at Mon Mar 20 19:09:25 UTC 2023 kill -USR1 2178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2178 killed at Mon Mar 20 19:09:25 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2230 found at Mon Mar 20 19:09:25 UTC 2023 selfserv_9887 with PID 2230 started at Mon Mar 20 19:09:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2230 at Mon Mar 20 19:09:25 UTC 2023 kill -USR1 2230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2230 killed at Mon Mar 20 19:09:25 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2282 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2282 found at Mon Mar 20 19:09:26 UTC 2023 selfserv_9887 with PID 2282 started at Mon Mar 20 19:09:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2282 at Mon Mar 20 19:09:26 UTC 2023 kill -USR1 2282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2282 killed at Mon Mar 20 19:09:26 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2348 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2348 found at Mon Mar 20 19:09:26 UTC 2023 selfserv_9887 with PID 2348 started at Mon Mar 20 19:09:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2348 at Mon Mar 20 19:09:27 UTC 2023 kill -USR1 2348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2348 killed at Mon Mar 20 19:09:27 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2400 found at Mon Mar 20 19:09:27 UTC 2023 selfserv_9887 with PID 2400 started at Mon Mar 20 19:09:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2400 at Mon Mar 20 19:09:27 UTC 2023 kill -USR1 2400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2400 killed at Mon Mar 20 19:09:27 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2453 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2453 found at Mon Mar 20 19:09:28 UTC 2023 selfserv_9887 with PID 2453 started at Mon Mar 20 19:09:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2453 at Mon Mar 20 19:09:28 UTC 2023 kill -USR1 2453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2453 killed at Mon Mar 20 19:09:28 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2519 found at Mon Mar 20 19:09:28 UTC 2023 selfserv_9887 with PID 2519 started at Mon Mar 20 19:09:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2519 at Mon Mar 20 19:09:29 UTC 2023 kill -USR1 2519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2519 killed at Mon Mar 20 19:09:29 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2571 found at Mon Mar 20 19:09:29 UTC 2023 selfserv_9887 with PID 2571 started at Mon Mar 20 19:09:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2571 at Mon Mar 20 19:09:29 UTC 2023 kill -USR1 2571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2571 killed at Mon Mar 20 19:09:29 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2623 found at Mon Mar 20 19:09:29 UTC 2023 selfserv_9887 with PID 2623 started at Mon Mar 20 19:09:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2623 at Mon Mar 20 19:09:30 UTC 2023 kill -USR1 2623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2623 killed at Mon Mar 20 19:09:30 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2689 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2689 found at Mon Mar 20 19:09:30 UTC 2023 selfserv_9887 with PID 2689 started at Mon Mar 20 19:09:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2689 at Mon Mar 20 19:09:30 UTC 2023 kill -USR1 2689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2689 killed at Mon Mar 20 19:09:30 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2741 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2741 found at Mon Mar 20 19:09:31 UTC 2023 selfserv_9887 with PID 2741 started at Mon Mar 20 19:09:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2741 at Mon Mar 20 19:09:31 UTC 2023 kill -USR1 2741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2741 killed at Mon Mar 20 19:09:31 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2794 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2794 found at Mon Mar 20 19:09:31 UTC 2023 selfserv_9887 with PID 2794 started at Mon Mar 20 19:09:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2794 at Mon Mar 20 19:09:32 UTC 2023 kill -USR1 2794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2794 killed at Mon Mar 20 19:09:32 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2860 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2860 found at Mon Mar 20 19:09:32 UTC 2023 selfserv_9887 with PID 2860 started at Mon Mar 20 19:09:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2860 at Mon Mar 20 19:09:32 UTC 2023 kill -USR1 2860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2860 killed at Mon Mar 20 19:09:32 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2912 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2912 found at Mon Mar 20 19:09:32 UTC 2023 selfserv_9887 with PID 2912 started at Mon Mar 20 19:09:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2912 at Mon Mar 20 19:09:33 UTC 2023 kill -USR1 2912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2912 killed at Mon Mar 20 19:09:33 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2964 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2964 found at Mon Mar 20 19:09:33 UTC 2023 selfserv_9887 with PID 2964 started at Mon Mar 20 19:09:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2964 at Mon Mar 20 19:09:33 UTC 2023 kill -USR1 2964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2964 killed at Mon Mar 20 19:09:33 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3030 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3030 found at Mon Mar 20 19:09:33 UTC 2023 selfserv_9887 with PID 3030 started at Mon Mar 20 19:09:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3030 at Mon Mar 20 19:09:34 UTC 2023 kill -USR1 3030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3030 killed at Mon Mar 20 19:09:34 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3082 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3082 found at Mon Mar 20 19:09:34 UTC 2023 selfserv_9887 with PID 3082 started at Mon Mar 20 19:09:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3082 at Mon Mar 20 19:09:34 UTC 2023 kill -USR1 3082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3082 killed at Mon Mar 20 19:09:34 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3135 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3135 found at Mon Mar 20 19:09:35 UTC 2023 selfserv_9887 with PID 3135 started at Mon Mar 20 19:09:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3135 at Mon Mar 20 19:09:35 UTC 2023 kill -USR1 3135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3135 killed at Mon Mar 20 19:09:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3201 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3201 found at Mon Mar 20 19:09:35 UTC 2023 selfserv_9887 with PID 3201 started at Mon Mar 20 19:09:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3201 at Mon Mar 20 19:09:35 UTC 2023 kill -USR1 3201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3201 killed at Mon Mar 20 19:09:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3253 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3253 found at Mon Mar 20 19:09:36 UTC 2023 selfserv_9887 with PID 3253 started at Mon Mar 20 19:09:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3253 at Mon Mar 20 19:09:36 UTC 2023 kill -USR1 3253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3253 killed at Mon Mar 20 19:09:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3305 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3305 found at Mon Mar 20 19:09:36 UTC 2023 selfserv_9887 with PID 3305 started at Mon Mar 20 19:09:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3305 at Mon Mar 20 19:09:36 UTC 2023 kill -USR1 3305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3305 killed at Mon Mar 20 19:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3371 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3371 found at Mon Mar 20 19:09:37 UTC 2023 selfserv_9887 with PID 3371 started at Mon Mar 20 19:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3371 at Mon Mar 20 19:09:37 UTC 2023 kill -USR1 3371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3371 killed at Mon Mar 20 19:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3423 found at Mon Mar 20 19:09:37 UTC 2023 selfserv_9887 with PID 3423 started at Mon Mar 20 19:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3423 at Mon Mar 20 19:09:37 UTC 2023 kill -USR1 3423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3423 killed at Mon Mar 20 19:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3476 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3476 found at Mon Mar 20 19:09:38 UTC 2023 selfserv_9887 with PID 3476 started at Mon Mar 20 19:09:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3476 at Mon Mar 20 19:09:38 UTC 2023 kill -USR1 3476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3476 killed at Mon Mar 20 19:09:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3542 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3542 found at Mon Mar 20 19:09:38 UTC 2023 selfserv_9887 with PID 3542 started at Mon Mar 20 19:09:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3542 at Mon Mar 20 19:09:38 UTC 2023 kill -USR1 3542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3542 killed at Mon Mar 20 19:09:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3594 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3594 found at Mon Mar 20 19:09:38 UTC 2023 selfserv_9887 with PID 3594 started at Mon Mar 20 19:09:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3594 at Mon Mar 20 19:09:39 UTC 2023 kill -USR1 3594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3594 killed at Mon Mar 20 19:09:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3646 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3646 found at Mon Mar 20 19:09:39 UTC 2023 selfserv_9887 with PID 3646 started at Mon Mar 20 19:09:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3646 at Mon Mar 20 19:09:39 UTC 2023 kill -USR1 3646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3646 killed at Mon Mar 20 19:09:39 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3720 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3720 found at Mon Mar 20 19:09:39 UTC 2023 selfserv_9887 with PID 3720 started at Mon Mar 20 19:09:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3720 at Mon Mar 20 19:09:40 UTC 2023 kill -USR1 3720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3720 killed at Mon Mar 20 19:09:40 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3773 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3773 found at Mon Mar 20 19:09:40 UTC 2023 selfserv_9887 with PID 3773 started at Mon Mar 20 19:09:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3773 at Mon Mar 20 19:09:40 UTC 2023 kill -USR1 3773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3773 killed at Mon Mar 20 19:09:40 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3825 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3825 found at Mon Mar 20 19:09:40 UTC 2023 selfserv_9887 with PID 3825 started at Mon Mar 20 19:09:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3825 at Mon Mar 20 19:09:40 UTC 2023 kill -USR1 3825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3825 killed at Mon Mar 20 19:09:41 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3918 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3918 found at Mon Mar 20 19:09:41 UTC 2023 selfserv_9887 with PID 3918 started at Mon Mar 20 19:09:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3918 at Mon Mar 20 19:09:41 UTC 2023 kill -USR1 3918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3918 killed at Mon Mar 20 19:09:41 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3970 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3970 found at Mon Mar 20 19:09:41 UTC 2023 selfserv_9887 with PID 3970 started at Mon Mar 20 19:09:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3970 at Mon Mar 20 19:09:41 UTC 2023 kill -USR1 3970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3970 killed at Mon Mar 20 19:09:41 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4023 found at Mon Mar 20 19:09:42 UTC 2023 selfserv_9887 with PID 4023 started at Mon Mar 20 19:09:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 4023 at Mon Mar 20 19:09:42 UTC 2023 kill -USR1 4023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4023 killed at Mon Mar 20 19:09:42 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4089 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4089 found at Mon Mar 20 19:09:42 UTC 2023 selfserv_9887 with PID 4089 started at Mon Mar 20 19:09:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 4089 at Mon Mar 20 19:09:42 UTC 2023 kill -USR1 4089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4089 killed at Mon Mar 20 19:09:42 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4142 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4142 found at Mon Mar 20 19:09:42 UTC 2023 selfserv_9887 with PID 4142 started at Mon Mar 20 19:09:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4142 at Mon Mar 20 19:09:43 UTC 2023 kill -USR1 4142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4142 killed at Mon Mar 20 19:09:43 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4194 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4194 found at Mon Mar 20 19:09:43 UTC 2023 selfserv_9887 with PID 4194 started at Mon Mar 20 19:09:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 4194 at Mon Mar 20 19:09:43 UTC 2023 kill -USR1 4194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4194 killed at Mon Mar 20 19:09:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4261 found at Mon Mar 20 19:09:43 UTC 2023 selfserv_9887 with PID 4261 started at Mon Mar 20 19:09:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4261 at Mon Mar 20 19:09:44 UTC 2023 kill -USR1 4261 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4261 killed at Mon Mar 20 19:09:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4314 found at Mon Mar 20 19:09:44 UTC 2023 selfserv_9887 with PID 4314 started at Mon Mar 20 19:09:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4314 at Mon Mar 20 19:09:45 UTC 2023 kill -USR1 4314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4314 killed at Mon Mar 20 19:09:45 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4367 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4367 found at Mon Mar 20 19:09:45 UTC 2023 selfserv_9887 with PID 4367 started at Mon Mar 20 19:09:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4367 at Mon Mar 20 19:09:46 UTC 2023 kill -USR1 4367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4367 killed at Mon Mar 20 19:09:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4434 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4434 found at Mon Mar 20 19:09:46 UTC 2023 selfserv_9887 with PID 4434 started at Mon Mar 20 19:09:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4434 at Mon Mar 20 19:09:46 UTC 2023 kill -USR1 4434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4434 killed at Mon Mar 20 19:09:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4486 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4486 found at Mon Mar 20 19:09:47 UTC 2023 selfserv_9887 with PID 4486 started at Mon Mar 20 19:09:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4486 at Mon Mar 20 19:09:47 UTC 2023 kill -USR1 4486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4486 killed at Mon Mar 20 19:09:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4538 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4538 found at Mon Mar 20 19:09:48 UTC 2023 selfserv_9887 with PID 4538 started at Mon Mar 20 19:09:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4538 at Mon Mar 20 19:09:48 UTC 2023 kill -USR1 4538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4538 killed at Mon Mar 20 19:09:48 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4604 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4604 found at Mon Mar 20 19:09:48 UTC 2023 selfserv_9887 with PID 4604 started at Mon Mar 20 19:09:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4604 at Mon Mar 20 19:09:49 UTC 2023 kill -USR1 4604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4604 killed at Mon Mar 20 19:09:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4656 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4656 found at Mon Mar 20 19:09:49 UTC 2023 selfserv_9887 with PID 4656 started at Mon Mar 20 19:09:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4656 at Mon Mar 20 19:09:50 UTC 2023 kill -USR1 4656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4656 killed at Mon Mar 20 19:09:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4709 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4709 found at Mon Mar 20 19:09:50 UTC 2023 selfserv_9887 with PID 4709 started at Mon Mar 20 19:09:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4709 at Mon Mar 20 19:09:51 UTC 2023 kill -USR1 4709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4709 killed at Mon Mar 20 19:09:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4775 found at Mon Mar 20 19:09:51 UTC 2023 selfserv_9887 with PID 4775 started at Mon Mar 20 19:09:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4775 at Mon Mar 20 19:09:51 UTC 2023 kill -USR1 4775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4775 killed at Mon Mar 20 19:09:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4827 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4827 found at Mon Mar 20 19:09:52 UTC 2023 selfserv_9887 with PID 4827 started at Mon Mar 20 19:09:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4827 at Mon Mar 20 19:09:52 UTC 2023 kill -USR1 4827 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4827 killed at Mon Mar 20 19:09:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4879 found at Mon Mar 20 19:09:53 UTC 2023 selfserv_9887 with PID 4879 started at Mon Mar 20 19:09:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4879 at Mon Mar 20 19:09:53 UTC 2023 kill -USR1 4879 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4879 killed at Mon Mar 20 19:09:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4946 found at Mon Mar 20 19:09:53 UTC 2023 selfserv_9887 with PID 4946 started at Mon Mar 20 19:09:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4946 at Mon Mar 20 19:09:54 UTC 2023 kill -USR1 4946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4946 killed at Mon Mar 20 19:09:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4998 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4998 found at Mon Mar 20 19:09:54 UTC 2023 selfserv_9887 with PID 4998 started at Mon Mar 20 19:09:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4998 at Mon Mar 20 19:09:55 UTC 2023 kill -USR1 4998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4998 killed at Mon Mar 20 19:09:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:09:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5050 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5050 found at Mon Mar 20 19:09:55 UTC 2023 selfserv_9887 with PID 5050 started at Mon Mar 20 19:09:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5050 at Mon Mar 20 19:09:56 UTC 2023 kill -USR1 5050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5050 killed at Mon Mar 20 19:09:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5116 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5116 found at Mon Mar 20 19:09:56 UTC 2023 selfserv_9887 with PID 5116 started at Mon Mar 20 19:09:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5116 at Mon Mar 20 19:09:56 UTC 2023 kill -USR1 5116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5116 killed at Mon Mar 20 19:09:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5168 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5168 found at Mon Mar 20 19:09:57 UTC 2023 selfserv_9887 with PID 5168 started at Mon Mar 20 19:09:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5168 at Mon Mar 20 19:09:57 UTC 2023 kill -USR1 5168 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5168 killed at Mon Mar 20 19:09:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5220 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5220 found at Mon Mar 20 19:09:58 UTC 2023 selfserv_9887 with PID 5220 started at Mon Mar 20 19:09:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5220 at Mon Mar 20 19:09:58 UTC 2023 kill -USR1 5220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5220 killed at Mon Mar 20 19:09:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5286 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5286 found at Mon Mar 20 19:09:58 UTC 2023 selfserv_9887 with PID 5286 started at Mon Mar 20 19:09:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5286 at Mon Mar 20 19:09:59 UTC 2023 kill -USR1 5286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5286 killed at Mon Mar 20 19:09:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:09:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:09:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5339 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5339 found at Mon Mar 20 19:09:59 UTC 2023 selfserv_9887 with PID 5339 started at Mon Mar 20 19:09:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5339 at Mon Mar 20 19:10:00 UTC 2023 kill -USR1 5339 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5339 killed at Mon Mar 20 19:10:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5393 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5393 found at Mon Mar 20 19:10:00 UTC 2023 selfserv_9887 with PID 5393 started at Mon Mar 20 19:10:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5393 at Mon Mar 20 19:10:01 UTC 2023 kill -USR1 5393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5393 killed at Mon Mar 20 19:10:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5459 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5459 found at Mon Mar 20 19:10:01 UTC 2023 selfserv_9887 with PID 5459 started at Mon Mar 20 19:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5459 at Mon Mar 20 19:10:02 UTC 2023 kill -USR1 5459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5459 killed at Mon Mar 20 19:10:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5511 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5511 found at Mon Mar 20 19:10:02 UTC 2023 selfserv_9887 with PID 5511 started at Mon Mar 20 19:10:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5511 at Mon Mar 20 19:10:02 UTC 2023 kill -USR1 5511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5511 killed at Mon Mar 20 19:10:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5563 found at Mon Mar 20 19:10:03 UTC 2023 selfserv_9887 with PID 5563 started at Mon Mar 20 19:10:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5563 at Mon Mar 20 19:10:03 UTC 2023 kill -USR1 5563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5563 killed at Mon Mar 20 19:10:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5629 found at Mon Mar 20 19:10:04 UTC 2023 selfserv_9887 with PID 5629 started at Mon Mar 20 19:10:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5629 at Mon Mar 20 19:10:04 UTC 2023 kill -USR1 5629 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5629 killed at Mon Mar 20 19:10:04 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5681 found at Mon Mar 20 19:10:04 UTC 2023 selfserv_9887 with PID 5681 started at Mon Mar 20 19:10:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5681 at Mon Mar 20 19:10:05 UTC 2023 kill -USR1 5681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5681 killed at Mon Mar 20 19:10:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5733 found at Mon Mar 20 19:10:05 UTC 2023 selfserv_9887 with PID 5733 started at Mon Mar 20 19:10:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5733 at Mon Mar 20 19:10:06 UTC 2023 kill -USR1 5733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5733 killed at Mon Mar 20 19:10:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5799 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5799 found at Mon Mar 20 19:10:06 UTC 2023 selfserv_9887 with PID 5799 started at Mon Mar 20 19:10:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5799 at Mon Mar 20 19:10:07 UTC 2023 kill -USR1 5799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5799 killed at Mon Mar 20 19:10:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5851 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5851 found at Mon Mar 20 19:10:07 UTC 2023 selfserv_9887 with PID 5851 started at Mon Mar 20 19:10:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5851 at Mon Mar 20 19:10:08 UTC 2023 kill -USR1 5851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5851 killed at Mon Mar 20 19:10:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5903 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5903 found at Mon Mar 20 19:10:08 UTC 2023 selfserv_9887 with PID 5903 started at Mon Mar 20 19:10:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5903 at Mon Mar 20 19:10:08 UTC 2023 kill -USR1 5903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5903 killed at Mon Mar 20 19:10:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5969 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5969 found at Mon Mar 20 19:10:09 UTC 2023 selfserv_9887 with PID 5969 started at Mon Mar 20 19:10:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5969 at Mon Mar 20 19:10:09 UTC 2023 kill -USR1 5969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5969 killed at Mon Mar 20 19:10:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6021 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6021 found at Mon Mar 20 19:10:09 UTC 2023 selfserv_9887 with PID 6021 started at Mon Mar 20 19:10:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6021 at Mon Mar 20 19:10:10 UTC 2023 kill -USR1 6021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6021 killed at Mon Mar 20 19:10:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6073 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6073 found at Mon Mar 20 19:10:10 UTC 2023 selfserv_9887 with PID 6073 started at Mon Mar 20 19:10:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6073 at Mon Mar 20 19:10:11 UTC 2023 kill -USR1 6073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6073 killed at Mon Mar 20 19:10:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6139 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6139 found at Mon Mar 20 19:10:11 UTC 2023 selfserv_9887 with PID 6139 started at Mon Mar 20 19:10:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6139 at Mon Mar 20 19:10:12 UTC 2023 kill -USR1 6139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6139 killed at Mon Mar 20 19:10:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6191 found at Mon Mar 20 19:10:12 UTC 2023 selfserv_9887 with PID 6191 started at Mon Mar 20 19:10:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6191 at Mon Mar 20 19:10:12 UTC 2023 kill -USR1 6191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6191 killed at Mon Mar 20 19:10:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6253 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6253 found at Mon Mar 20 19:10:13 UTC 2023 selfserv_9887 with PID 6253 started at Mon Mar 20 19:10:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6253 at Mon Mar 20 19:10:13 UTC 2023 kill -USR1 6253 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6253 killed at Mon Mar 20 19:10:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6322 found at Mon Mar 20 19:10:14 UTC 2023 selfserv_9887 with PID 6322 started at Mon Mar 20 19:10:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6322 at Mon Mar 20 19:10:14 UTC 2023 kill -USR1 6322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6322 killed at Mon Mar 20 19:10:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6376 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6376 found at Mon Mar 20 19:10:14 UTC 2023 selfserv_9887 with PID 6376 started at Mon Mar 20 19:10:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6376 at Mon Mar 20 19:10:14 UTC 2023 kill -USR1 6376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6376 killed at Mon Mar 20 19:10:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6428 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6428 found at Mon Mar 20 19:10:15 UTC 2023 selfserv_9887 with PID 6428 started at Mon Mar 20 19:10:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6428 at Mon Mar 20 19:10:15 UTC 2023 kill -USR1 6428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6428 killed at Mon Mar 20 19:10:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6504 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6504 found at Mon Mar 20 19:10:15 UTC 2023 selfserv_9887 with PID 6504 started at Mon Mar 20 19:10:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6504 at Mon Mar 20 19:10:15 UTC 2023 kill -USR1 6504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6504 killed at Mon Mar 20 19:10:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6558 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6558 found at Mon Mar 20 19:10:16 UTC 2023 selfserv_9887 with PID 6558 started at Mon Mar 20 19:10:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6558 at Mon Mar 20 19:10:16 UTC 2023 kill -USR1 6558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6558 killed at Mon Mar 20 19:10:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6615 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6615 found at Mon Mar 20 19:10:16 UTC 2023 selfserv_9887 with PID 6615 started at Mon Mar 20 19:10:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6615 at Mon Mar 20 19:10:16 UTC 2023 kill -USR1 6615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6615 killed at Mon Mar 20 19:10:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6690 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6690 found at Mon Mar 20 19:10:17 UTC 2023 selfserv_9887 with PID 6690 started at Mon Mar 20 19:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6690 at Mon Mar 20 19:10:17 UTC 2023 kill -USR1 6690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6690 killed at Mon Mar 20 19:10:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6744 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6744 found at Mon Mar 20 19:10:17 UTC 2023 selfserv_9887 with PID 6744 started at Mon Mar 20 19:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6744 at Mon Mar 20 19:10:17 UTC 2023 kill -USR1 6744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6744 killed at Mon Mar 20 19:10:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6797 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6797 found at Mon Mar 20 19:10:17 UTC 2023 selfserv_9887 with PID 6797 started at Mon Mar 20 19:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6797 at Mon Mar 20 19:10:18 UTC 2023 kill -USR1 6797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6797 killed at Mon Mar 20 19:10:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6864 found at Mon Mar 20 19:10:18 UTC 2023 selfserv_9887 with PID 6864 started at Mon Mar 20 19:10:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6864 at Mon Mar 20 19:10:18 UTC 2023 kill -USR1 6864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6864 killed at Mon Mar 20 19:10:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6916 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6916 found at Mon Mar 20 19:10:18 UTC 2023 selfserv_9887 with PID 6916 started at Mon Mar 20 19:10:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6916 at Mon Mar 20 19:10:19 UTC 2023 kill -USR1 6916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6916 killed at Mon Mar 20 19:10:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6970 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6970 found at Mon Mar 20 19:10:19 UTC 2023 selfserv_9887 with PID 6970 started at Mon Mar 20 19:10:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6970 at Mon Mar 20 19:10:19 UTC 2023 kill -USR1 6970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6970 killed at Mon Mar 20 19:10:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7037 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7037 found at Mon Mar 20 19:10:20 UTC 2023 selfserv_9887 with PID 7037 started at Mon Mar 20 19:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7037 at Mon Mar 20 19:10:20 UTC 2023 kill -USR1 7037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7037 killed at Mon Mar 20 19:10:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7091 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7091 found at Mon Mar 20 19:10:20 UTC 2023 selfserv_9887 with PID 7091 started at Mon Mar 20 19:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7091 at Mon Mar 20 19:10:20 UTC 2023 kill -USR1 7091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7091 killed at Mon Mar 20 19:10:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7143 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7143 found at Mon Mar 20 19:10:20 UTC 2023 selfserv_9887 with PID 7143 started at Mon Mar 20 19:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7143 at Mon Mar 20 19:10:21 UTC 2023 kill -USR1 7143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7143 killed at Mon Mar 20 19:10:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7209 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7209 found at Mon Mar 20 19:10:21 UTC 2023 selfserv_9887 with PID 7209 started at Mon Mar 20 19:10:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7209 at Mon Mar 20 19:10:21 UTC 2023 kill -USR1 7209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7209 killed at Mon Mar 20 19:10:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7261 found at Mon Mar 20 19:10:21 UTC 2023 selfserv_9887 with PID 7261 started at Mon Mar 20 19:10:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7261 at Mon Mar 20 19:10:22 UTC 2023 kill -USR1 7261 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7261 killed at Mon Mar 20 19:10:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7313 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7313 found at Mon Mar 20 19:10:22 UTC 2023 selfserv_9887 with PID 7313 started at Mon Mar 20 19:10:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7313 at Mon Mar 20 19:10:22 UTC 2023 kill -USR1 7313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7313 killed at Mon Mar 20 19:10:22 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7379 found at Mon Mar 20 19:10:22 UTC 2023 selfserv_9887 with PID 7379 started at Mon Mar 20 19:10:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7379 at Mon Mar 20 19:10:23 UTC 2023 kill -USR1 7379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7379 killed at Mon Mar 20 19:10:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7431 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7431 found at Mon Mar 20 19:10:23 UTC 2023 selfserv_9887 with PID 7431 started at Mon Mar 20 19:10:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7431 at Mon Mar 20 19:10:23 UTC 2023 kill -USR1 7431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7431 killed at Mon Mar 20 19:10:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7484 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7484 found at Mon Mar 20 19:10:23 UTC 2023 selfserv_9887 with PID 7484 started at Mon Mar 20 19:10:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7484 at Mon Mar 20 19:10:23 UTC 2023 kill -USR1 7484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7484 killed at Mon Mar 20 19:10:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7552 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7552 found at Mon Mar 20 19:10:24 UTC 2023 selfserv_9887 with PID 7552 started at Mon Mar 20 19:10:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7552 at Mon Mar 20 19:10:24 UTC 2023 kill -USR1 7552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7552 killed at Mon Mar 20 19:10:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7605 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7605 found at Mon Mar 20 19:10:24 UTC 2023 selfserv_9887 with PID 7605 started at Mon Mar 20 19:10:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7605 at Mon Mar 20 19:10:24 UTC 2023 kill -USR1 7605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7605 killed at Mon Mar 20 19:10:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7657 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7657 found at Mon Mar 20 19:10:25 UTC 2023 selfserv_9887 with PID 7657 started at Mon Mar 20 19:10:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7657 at Mon Mar 20 19:10:25 UTC 2023 kill -USR1 7657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7657 killed at Mon Mar 20 19:10:25 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7724 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7724 found at Mon Mar 20 19:10:25 UTC 2023 selfserv_9887 with PID 7724 started at Mon Mar 20 19:10:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7724 at Mon Mar 20 19:10:25 UTC 2023 kill -USR1 7724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7724 killed at Mon Mar 20 19:10:25 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7777 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7777 found at Mon Mar 20 19:10:26 UTC 2023 selfserv_9887 with PID 7777 started at Mon Mar 20 19:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7777 at Mon Mar 20 19:10:26 UTC 2023 kill -USR1 7777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7777 killed at Mon Mar 20 19:10:26 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7831 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7831 found at Mon Mar 20 19:10:26 UTC 2023 selfserv_9887 with PID 7831 started at Mon Mar 20 19:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7831 at Mon Mar 20 19:10:26 UTC 2023 kill -USR1 7831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7831 killed at Mon Mar 20 19:10:26 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7898 found at Mon Mar 20 19:10:27 UTC 2023 selfserv_9887 with PID 7898 started at Mon Mar 20 19:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7898 at Mon Mar 20 19:10:27 UTC 2023 kill -USR1 7898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7898 killed at Mon Mar 20 19:10:27 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7953 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7953 found at Mon Mar 20 19:10:27 UTC 2023 selfserv_9887 with PID 7953 started at Mon Mar 20 19:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7953 at Mon Mar 20 19:10:27 UTC 2023 kill -USR1 7953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7953 killed at Mon Mar 20 19:10:27 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8006 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8006 found at Mon Mar 20 19:10:27 UTC 2023 selfserv_9887 with PID 8006 started at Mon Mar 20 19:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8006 at Mon Mar 20 19:10:28 UTC 2023 kill -USR1 8006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8006 killed at Mon Mar 20 19:10:28 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8073 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8073 found at Mon Mar 20 19:10:28 UTC 2023 selfserv_9887 with PID 8073 started at Mon Mar 20 19:10:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8073 at Mon Mar 20 19:10:28 UTC 2023 kill -USR1 8073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8073 killed at Mon Mar 20 19:10:28 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8126 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8126 found at Mon Mar 20 19:10:28 UTC 2023 selfserv_9887 with PID 8126 started at Mon Mar 20 19:10:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8126 at Mon Mar 20 19:10:29 UTC 2023 kill -USR1 8126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8126 killed at Mon Mar 20 19:10:29 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8178 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8178 found at Mon Mar 20 19:10:29 UTC 2023 selfserv_9887 with PID 8178 started at Mon Mar 20 19:10:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8178 at Mon Mar 20 19:10:29 UTC 2023 kill -USR1 8178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8178 killed at Mon Mar 20 19:10:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8245 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8245 found at Mon Mar 20 19:10:29 UTC 2023 selfserv_9887 with PID 8245 started at Mon Mar 20 19:10:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8245 at Mon Mar 20 19:10:29 UTC 2023 kill -USR1 8245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8245 killed at Mon Mar 20 19:10:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8298 found at Mon Mar 20 19:10:30 UTC 2023 selfserv_9887 with PID 8298 started at Mon Mar 20 19:10:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8298 at Mon Mar 20 19:10:30 UTC 2023 kill -USR1 8298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8298 killed at Mon Mar 20 19:10:30 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8351 found at Mon Mar 20 19:10:30 UTC 2023 selfserv_9887 with PID 8351 started at Mon Mar 20 19:10:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8351 at Mon Mar 20 19:10:30 UTC 2023 kill -USR1 8351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8351 killed at Mon Mar 20 19:10:30 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8417 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8417 found at Mon Mar 20 19:10:31 UTC 2023 selfserv_9887 with PID 8417 started at Mon Mar 20 19:10:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8417 at Mon Mar 20 19:10:31 UTC 2023 kill -USR1 8417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8417 killed at Mon Mar 20 19:10:31 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8469 found at Mon Mar 20 19:10:31 UTC 2023 selfserv_9887 with PID 8469 started at Mon Mar 20 19:10:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8469 at Mon Mar 20 19:10:32 UTC 2023 kill -USR1 8469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8469 killed at Mon Mar 20 19:10:32 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8521 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8521 found at Mon Mar 20 19:10:32 UTC 2023 selfserv_9887 with PID 8521 started at Mon Mar 20 19:10:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8521 at Mon Mar 20 19:10:32 UTC 2023 kill -USR1 8521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8521 killed at Mon Mar 20 19:10:32 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8587 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8587 found at Mon Mar 20 19:10:33 UTC 2023 selfserv_9887 with PID 8587 started at Mon Mar 20 19:10:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8587 at Mon Mar 20 19:10:33 UTC 2023 kill -USR1 8587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8587 killed at Mon Mar 20 19:10:33 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8639 found at Mon Mar 20 19:10:33 UTC 2023 selfserv_9887 with PID 8639 started at Mon Mar 20 19:10:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8639 at Mon Mar 20 19:10:34 UTC 2023 kill -USR1 8639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8639 killed at Mon Mar 20 19:10:34 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8691 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8691 found at Mon Mar 20 19:10:34 UTC 2023 selfserv_9887 with PID 8691 started at Mon Mar 20 19:10:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8691 at Mon Mar 20 19:10:34 UTC 2023 kill -USR1 8691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8691 killed at Mon Mar 20 19:10:34 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8757 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8757 found at Mon Mar 20 19:10:34 UTC 2023 selfserv_9887 with PID 8757 started at Mon Mar 20 19:10:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8757 at Mon Mar 20 19:10:35 UTC 2023 kill -USR1 8757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8757 killed at Mon Mar 20 19:10:35 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8809 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8809 found at Mon Mar 20 19:10:35 UTC 2023 selfserv_9887 with PID 8809 started at Mon Mar 20 19:10:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8809 at Mon Mar 20 19:10:35 UTC 2023 kill -USR1 8809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8809 killed at Mon Mar 20 19:10:35 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8861 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8861 found at Mon Mar 20 19:10:35 UTC 2023 selfserv_9887 with PID 8861 started at Mon Mar 20 19:10:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8861 at Mon Mar 20 19:10:36 UTC 2023 kill -USR1 8861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8861 killed at Mon Mar 20 19:10:36 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8927 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8927 found at Mon Mar 20 19:10:36 UTC 2023 selfserv_9887 with PID 8927 started at Mon Mar 20 19:10:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8927 at Mon Mar 20 19:10:36 UTC 2023 kill -USR1 8927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8927 killed at Mon Mar 20 19:10:36 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8980 found at Mon Mar 20 19:10:37 UTC 2023 selfserv_9887 with PID 8980 started at Mon Mar 20 19:10:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8980 at Mon Mar 20 19:10:37 UTC 2023 kill -USR1 8980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8980 killed at Mon Mar 20 19:10:37 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9032 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9032 found at Mon Mar 20 19:10:37 UTC 2023 selfserv_9887 with PID 9032 started at Mon Mar 20 19:10:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9032 at Mon Mar 20 19:10:38 UTC 2023 kill -USR1 9032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9032 killed at Mon Mar 20 19:10:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9098 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9098 found at Mon Mar 20 19:10:38 UTC 2023 selfserv_9887 with PID 9098 started at Mon Mar 20 19:10:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9098 at Mon Mar 20 19:10:38 UTC 2023 kill -USR1 9098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9098 killed at Mon Mar 20 19:10:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9150 found at Mon Mar 20 19:10:38 UTC 2023 selfserv_9887 with PID 9150 started at Mon Mar 20 19:10:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9150 at Mon Mar 20 19:10:39 UTC 2023 kill -USR1 9150 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9150 killed at Mon Mar 20 19:10:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9202 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9202 found at Mon Mar 20 19:10:39 UTC 2023 selfserv_9887 with PID 9202 started at Mon Mar 20 19:10:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9202 at Mon Mar 20 19:10:39 UTC 2023 kill -USR1 9202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9202 killed at Mon Mar 20 19:10:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9268 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9268 found at Mon Mar 20 19:10:39 UTC 2023 selfserv_9887 with PID 9268 started at Mon Mar 20 19:10:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9268 at Mon Mar 20 19:10:39 UTC 2023 kill -USR1 9268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9268 killed at Mon Mar 20 19:10:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9320 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9320 found at Mon Mar 20 19:10:40 UTC 2023 selfserv_9887 with PID 9320 started at Mon Mar 20 19:10:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9320 at Mon Mar 20 19:10:40 UTC 2023 kill -USR1 9320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9320 killed at Mon Mar 20 19:10:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9373 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9373 found at Mon Mar 20 19:10:40 UTC 2023 selfserv_9887 with PID 9373 started at Mon Mar 20 19:10:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9373 at Mon Mar 20 19:10:40 UTC 2023 kill -USR1 9373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9373 killed at Mon Mar 20 19:10:40 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9439 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9439 found at Mon Mar 20 19:10:41 UTC 2023 selfserv_9887 with PID 9439 started at Mon Mar 20 19:10:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9439 at Mon Mar 20 19:10:41 UTC 2023 kill -USR1 9439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9439 killed at Mon Mar 20 19:10:41 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9506 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9506 found at Mon Mar 20 19:10:41 UTC 2023 selfserv_9887 with PID 9506 started at Mon Mar 20 19:10:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9506 at Mon Mar 20 19:10:41 UTC 2023 kill -USR1 9506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9506 killed at Mon Mar 20 19:10:41 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9558 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9558 found at Mon Mar 20 19:10:41 UTC 2023 selfserv_9887 with PID 9558 started at Mon Mar 20 19:10:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9558 at Mon Mar 20 19:10:41 UTC 2023 kill -USR1 9558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9558 killed at Mon Mar 20 19:10:42 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9624 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9624 found at Mon Mar 20 19:10:42 UTC 2023 selfserv_9887 with PID 9624 started at Mon Mar 20 19:10:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9624 at Mon Mar 20 19:10:42 UTC 2023 kill -USR1 9624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9624 killed at Mon Mar 20 19:10:42 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9676 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9676 found at Mon Mar 20 19:10:42 UTC 2023 selfserv_9887 with PID 9676 started at Mon Mar 20 19:10:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9676 at Mon Mar 20 19:10:42 UTC 2023 kill -USR1 9676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9676 killed at Mon Mar 20 19:10:42 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9728 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9728 found at Mon Mar 20 19:10:43 UTC 2023 selfserv_9887 with PID 9728 started at Mon Mar 20 19:10:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9728 at Mon Mar 20 19:10:43 UTC 2023 kill -USR1 9728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9728 killed at Mon Mar 20 19:10:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9794 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9794 found at Mon Mar 20 19:10:43 UTC 2023 selfserv_9887 with PID 9794 started at Mon Mar 20 19:10:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9794 at Mon Mar 20 19:10:44 UTC 2023 kill -USR1 9794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9794 killed at Mon Mar 20 19:10:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9847 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9847 found at Mon Mar 20 19:10:44 UTC 2023 selfserv_9887 with PID 9847 started at Mon Mar 20 19:10:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9847 at Mon Mar 20 19:10:44 UTC 2023 kill -USR1 9847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9847 killed at Mon Mar 20 19:10:45 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9899 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9899 found at Mon Mar 20 19:10:45 UTC 2023 selfserv_9887 with PID 9899 started at Mon Mar 20 19:10:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9899 at Mon Mar 20 19:10:45 UTC 2023 kill -USR1 9899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9899 killed at Mon Mar 20 19:10:45 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9965 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9965 found at Mon Mar 20 19:10:46 UTC 2023 selfserv_9887 with PID 9965 started at Mon Mar 20 19:10:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9965 at Mon Mar 20 19:10:46 UTC 2023 kill -USR1 9965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9965 killed at Mon Mar 20 19:10:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10017 found at Mon Mar 20 19:10:46 UTC 2023 selfserv_9887 with PID 10017 started at Mon Mar 20 19:10:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10017 at Mon Mar 20 19:10:47 UTC 2023 kill -USR1 10017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10017 killed at Mon Mar 20 19:10:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10069 found at Mon Mar 20 19:10:47 UTC 2023 selfserv_9887 with PID 10069 started at Mon Mar 20 19:10:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10069 at Mon Mar 20 19:10:48 UTC 2023 kill -USR1 10069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10069 killed at Mon Mar 20 19:10:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10136 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10136 found at Mon Mar 20 19:10:48 UTC 2023 selfserv_9887 with PID 10136 started at Mon Mar 20 19:10:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10136 at Mon Mar 20 19:10:49 UTC 2023 kill -USR1 10136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10136 killed at Mon Mar 20 19:10:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10188 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10188 found at Mon Mar 20 19:10:49 UTC 2023 selfserv_9887 with PID 10188 started at Mon Mar 20 19:10:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10188 at Mon Mar 20 19:10:49 UTC 2023 kill -USR1 10188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10188 killed at Mon Mar 20 19:10:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10240 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10240 found at Mon Mar 20 19:10:50 UTC 2023 selfserv_9887 with PID 10240 started at Mon Mar 20 19:10:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10240 at Mon Mar 20 19:10:50 UTC 2023 kill -USR1 10240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10240 killed at Mon Mar 20 19:10:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10306 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10306 found at Mon Mar 20 19:10:51 UTC 2023 selfserv_9887 with PID 10306 started at Mon Mar 20 19:10:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10306 at Mon Mar 20 19:10:51 UTC 2023 kill -USR1 10306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10306 killed at Mon Mar 20 19:10:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10358 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10358 found at Mon Mar 20 19:10:51 UTC 2023 selfserv_9887 with PID 10358 started at Mon Mar 20 19:10:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10358 at Mon Mar 20 19:10:52 UTC 2023 kill -USR1 10358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10358 killed at Mon Mar 20 19:10:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10410 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10410 found at Mon Mar 20 19:10:52 UTC 2023 selfserv_9887 with PID 10410 started at Mon Mar 20 19:10:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10410 at Mon Mar 20 19:10:53 UTC 2023 kill -USR1 10410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10410 killed at Mon Mar 20 19:10:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10476 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10476 found at Mon Mar 20 19:10:53 UTC 2023 selfserv_9887 with PID 10476 started at Mon Mar 20 19:10:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10476 at Mon Mar 20 19:10:54 UTC 2023 kill -USR1 10476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10476 killed at Mon Mar 20 19:10:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10528 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10528 found at Mon Mar 20 19:10:54 UTC 2023 selfserv_9887 with PID 10528 started at Mon Mar 20 19:10:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10528 at Mon Mar 20 19:10:54 UTC 2023 kill -USR1 10528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10528 killed at Mon Mar 20 19:10:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10580 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10580 found at Mon Mar 20 19:10:55 UTC 2023 selfserv_9887 with PID 10580 started at Mon Mar 20 19:10:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10580 at Mon Mar 20 19:10:55 UTC 2023 kill -USR1 10580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10580 killed at Mon Mar 20 19:10:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10646 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10646 found at Mon Mar 20 19:10:56 UTC 2023 selfserv_9887 with PID 10646 started at Mon Mar 20 19:10:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10646 at Mon Mar 20 19:10:56 UTC 2023 kill -USR1 10646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10646 killed at Mon Mar 20 19:10:56 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10699 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10699 found at Mon Mar 20 19:10:56 UTC 2023 selfserv_9887 with PID 10699 started at Mon Mar 20 19:10:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10699 at Mon Mar 20 19:10:57 UTC 2023 kill -USR1 10699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10699 killed at Mon Mar 20 19:10:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:10:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10751 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10751 found at Mon Mar 20 19:10:57 UTC 2023 selfserv_9887 with PID 10751 started at Mon Mar 20 19:10:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10751 at Mon Mar 20 19:10:58 UTC 2023 kill -USR1 10751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10751 killed at Mon Mar 20 19:10:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10817 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10817 found at Mon Mar 20 19:10:58 UTC 2023 selfserv_9887 with PID 10817 started at Mon Mar 20 19:10:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10817 at Mon Mar 20 19:10:59 UTC 2023 kill -USR1 10817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10817 killed at Mon Mar 20 19:10:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:10:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:10:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10869 found at Mon Mar 20 19:10:59 UTC 2023 selfserv_9887 with PID 10869 started at Mon Mar 20 19:10:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10869 at Mon Mar 20 19:11:00 UTC 2023 kill -USR1 10869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10869 killed at Mon Mar 20 19:11:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10921 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10921 found at Mon Mar 20 19:11:00 UTC 2023 selfserv_9887 with PID 10921 started at Mon Mar 20 19:11:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10921 at Mon Mar 20 19:11:00 UTC 2023 kill -USR1 10921 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10921 killed at Mon Mar 20 19:11:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10987 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10987 found at Mon Mar 20 19:11:01 UTC 2023 selfserv_9887 with PID 10987 started at Mon Mar 20 19:11:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10987 at Mon Mar 20 19:11:01 UTC 2023 kill -USR1 10987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10987 killed at Mon Mar 20 19:11:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11039 found at Mon Mar 20 19:11:01 UTC 2023 selfserv_9887 with PID 11039 started at Mon Mar 20 19:11:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11039 at Mon Mar 20 19:11:02 UTC 2023 kill -USR1 11039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11039 killed at Mon Mar 20 19:11:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11091 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11091 found at Mon Mar 20 19:11:02 UTC 2023 selfserv_9887 with PID 11091 started at Mon Mar 20 19:11:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11091 at Mon Mar 20 19:11:03 UTC 2023 kill -USR1 11091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11091 killed at Mon Mar 20 19:11:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11157 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11157 found at Mon Mar 20 19:11:03 UTC 2023 selfserv_9887 with PID 11157 started at Mon Mar 20 19:11:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11157 at Mon Mar 20 19:11:03 UTC 2023 kill -USR1 11157 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11157 killed at Mon Mar 20 19:11:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11209 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11209 found at Mon Mar 20 19:11:04 UTC 2023 selfserv_9887 with PID 11209 started at Mon Mar 20 19:11:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11209 at Mon Mar 20 19:11:04 UTC 2023 kill -USR1 11209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11209 killed at Mon Mar 20 19:11:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11261 found at Mon Mar 20 19:11:04 UTC 2023 selfserv_9887 with PID 11261 started at Mon Mar 20 19:11:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11261 at Mon Mar 20 19:11:04 UTC 2023 kill -USR1 11261 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11261 killed at Mon Mar 20 19:11:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11327 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11327 found at Mon Mar 20 19:11:05 UTC 2023 selfserv_9887 with PID 11327 started at Mon Mar 20 19:11:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11327 at Mon Mar 20 19:11:05 UTC 2023 kill -USR1 11327 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11327 killed at Mon Mar 20 19:11:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11379 found at Mon Mar 20 19:11:05 UTC 2023 selfserv_9887 with PID 11379 started at Mon Mar 20 19:11:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11379 at Mon Mar 20 19:11:05 UTC 2023 kill -USR1 11379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11379 killed at Mon Mar 20 19:11:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11431 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11431 found at Mon Mar 20 19:11:06 UTC 2023 selfserv_9887 with PID 11431 started at Mon Mar 20 19:11:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11431 at Mon Mar 20 19:11:06 UTC 2023 kill -USR1 11431 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11431 killed at Mon Mar 20 19:11:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11498 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11498 found at Mon Mar 20 19:11:06 UTC 2023 selfserv_9887 with PID 11498 started at Mon Mar 20 19:11:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11498 at Mon Mar 20 19:11:06 UTC 2023 kill -USR1 11498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11498 killed at Mon Mar 20 19:11:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11550 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11550 found at Mon Mar 20 19:11:07 UTC 2023 selfserv_9887 with PID 11550 started at Mon Mar 20 19:11:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11550 at Mon Mar 20 19:11:07 UTC 2023 kill -USR1 11550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11550 killed at Mon Mar 20 19:11:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:11:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11602 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11602 found at Mon Mar 20 19:11:07 UTC 2023 selfserv_9887 with PID 11602 started at Mon Mar 20 19:11:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11602 at Mon Mar 20 19:11:07 UTC 2023 kill -USR1 11602 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11602 killed at Mon Mar 20 19:11:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11668 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11668 found at Mon Mar 20 19:11:07 UTC 2023 selfserv_9887 with PID 11668 started at Mon Mar 20 19:11:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11668 at Mon Mar 20 19:11:08 UTC 2023 kill -USR1 11668 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11668 killed at Mon Mar 20 19:11:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11720 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11720 found at Mon Mar 20 19:11:08 UTC 2023 selfserv_9887 with PID 11720 started at Mon Mar 20 19:11:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11720 at Mon Mar 20 19:11:08 UTC 2023 kill -USR1 11720 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11720 killed at Mon Mar 20 19:11:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11773 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11773 found at Mon Mar 20 19:11:08 UTC 2023 selfserv_9887 with PID 11773 started at Mon Mar 20 19:11:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11773 at Mon Mar 20 19:11:09 UTC 2023 kill -USR1 11773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11773 killed at Mon Mar 20 19:11:09 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11839 found at Mon Mar 20 19:11:09 UTC 2023 selfserv_9887 with PID 11839 started at Mon Mar 20 19:11:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11839 at Mon Mar 20 19:11:09 UTC 2023 kill -USR1 11839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11839 killed at Mon Mar 20 19:11:10 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11891 found at Mon Mar 20 19:11:10 UTC 2023 selfserv_9887 with PID 11891 started at Mon Mar 20 19:11:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11891 at Mon Mar 20 19:11:10 UTC 2023 kill -USR1 11891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11891 killed at Mon Mar 20 19:11:10 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11943 found at Mon Mar 20 19:11:10 UTC 2023 selfserv_9887 with PID 11943 started at Mon Mar 20 19:11:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11943 at Mon Mar 20 19:11:11 UTC 2023 kill -USR1 11943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11943 killed at Mon Mar 20 19:11:11 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12009 found at Mon Mar 20 19:11:11 UTC 2023 selfserv_9887 with PID 12009 started at Mon Mar 20 19:11:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12009 at Mon Mar 20 19:11:11 UTC 2023 kill -USR1 12009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12009 killed at Mon Mar 20 19:11:12 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12061 found at Mon Mar 20 19:11:12 UTC 2023 selfserv_9887 with PID 12061 started at Mon Mar 20 19:11:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12061 at Mon Mar 20 19:11:12 UTC 2023 kill -USR1 12061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12061 killed at Mon Mar 20 19:11:12 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12113 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12113 found at Mon Mar 20 19:11:12 UTC 2023 selfserv_9887 with PID 12113 started at Mon Mar 20 19:11:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12113 at Mon Mar 20 19:11:13 UTC 2023 kill -USR1 12113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12113 killed at Mon Mar 20 19:11:13 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9887 starting at Mon Mar 20 19:11:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:13 UTC 2023 selfserv_9887 with PID 12184 started at Mon Mar 20 19:11:13 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:13 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:13 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:14 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:14 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:14 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:15 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:15 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:15 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:16 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:16 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:16 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:17 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:17 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:18 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:18 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:18 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:18 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:19 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:19 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:19 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:20 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:20 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:20 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:21 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:21 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:21 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:22 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:22 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:22 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:23 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:23 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:23 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:24 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:24 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:24 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:24 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:25 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:25 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12184 found at Mon Mar 20 19:11:25 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12184 at Mon Mar 20 19:11:25 UTC 2023 kill -USR1 12184 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12184 killed at Mon Mar 20 19:11:25 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:26 UTC 2023 selfserv_9887 with PID 13455 started at Mon Mar 20 19:11:26 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:26 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:26 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:26 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:26 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:26 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:27 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:27 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:27 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:27 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:27 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:28 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:28 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:28 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:28 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:29 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:30 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:30 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:30 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:30 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:30 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:31 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:32 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:32 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:32 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:32 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:32 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:32 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13455 found at Mon Mar 20 19:11:33 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 13455 at Mon Mar 20 19:11:33 UTC 2023 kill -USR1 13455 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13455 killed at Mon Mar 20 19:11:33 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:33 UTC 2023 selfserv_9887 with PID 14716 started at Mon Mar 20 19:11:33 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:33 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:34 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:34 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:34 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:35 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:35 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:35 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:36 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:36 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:36 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:37 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:37 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:37 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:38 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:38 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:39 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:39 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:39 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:40 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:40 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:40 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:40 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:41 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:41 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:42 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:42 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:42 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:43 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:43 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:43 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:43 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:44 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:44 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:44 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:45 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:45 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:45 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:46 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:46 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14716 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14716 found at Mon Mar 20 19:11:46 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 14716 at Mon Mar 20 19:11:46 UTC 2023 kill -USR1 14716 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14716 killed at Mon Mar 20 19:11:46 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:47 UTC 2023 selfserv_9887 with PID 15992 started at Mon Mar 20 19:11:47 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:47 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:47 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:47 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:47 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:47 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:48 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:48 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:48 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:48 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:48 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:48 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:49 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:49 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:49 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:50 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:51 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:51 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:51 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:51 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:51 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:52 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:53 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:53 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:53 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:53 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:53 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:53 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15992 found at Mon Mar 20 19:11:54 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 15992 at Mon Mar 20 19:11:54 UTC 2023 kill -USR1 15992 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15992 killed at Mon Mar 20 19:11:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:11:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17254 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17254 found at Mon Mar 20 19:11:54 UTC 2023 selfserv_9887 with PID 17254 started at Mon Mar 20 19:11:54 UTC 2023 trying to kill selfserv_9887 with PID 17254 at Mon Mar 20 19:11:54 UTC 2023 kill -USR1 17254 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17254 killed at Mon Mar 20 19:11:54 UTC 2023 selfserv_9887 starting at Mon Mar 20 19:11:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:11:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:54 UTC 2023 selfserv_9887 with PID 17296 started at Mon Mar 20 19:11:54 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:55 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:55 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:56 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:56 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:57 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:57 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:58 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:58 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:59 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:11:59 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:00 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:00 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:01 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:02 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:02 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:03 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:03 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:04 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:04 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:05 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:05 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:05 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:06 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:07 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:07 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:08 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:08 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:09 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:09 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:10 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:10 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:11 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:11 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:12 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:12 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:13 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:13 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:14 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17296 found at Mon Mar 20 19:12:14 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17296 at Mon Mar 20 19:12:14 UTC 2023 kill -USR1 17296 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17296 killed at Mon Mar 20 19:12:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:12:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:12:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:15 UTC 2023 selfserv_9887 with PID 18563 started at Mon Mar 20 19:12:15 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:15 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:16 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:16 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:17 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:17 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:18 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:18 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:19 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:19 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:20 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:20 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:21 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:22 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:23 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:23 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:24 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:24 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:25 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:25 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:26 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:26 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:27 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:27 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:28 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:28 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:29 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:30 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:30 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:31 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:32 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:32 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:33 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:33 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:34 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:34 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:35 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:35 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:36 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18563 found at Mon Mar 20 19:12:36 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18563 at Mon Mar 20 19:12:36 UTC 2023 kill -USR1 18563 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18563 killed at Mon Mar 20 19:12:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:12:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:12:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:37 UTC 2023 selfserv_9887 with PID 19828 started at Mon Mar 20 19:12:37 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:37 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:37 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:37 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:37 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:38 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:38 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:38 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:38 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:38 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:39 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:39 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:39 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:39 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:40 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:40 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:40 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:41 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:41 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:41 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:41 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:42 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:42 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:42 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:42 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:42 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:43 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:43 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:43 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:44 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:44 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:44 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:44 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:44 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:45 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:45 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:45 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:45 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:46 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19828 found at Mon Mar 20 19:12:46 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19828 at Mon Mar 20 19:12:46 UTC 2023 kill -USR1 19828 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19828 killed at Mon Mar 20 19:12:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:12:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:12:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:46 UTC 2023 selfserv_9887 with PID 21104 started at Mon Mar 20 19:12:46 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:47 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:47 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:48 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:48 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:49 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:49 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:50 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:50 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:51 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:51 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:52 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:52 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:53 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:54 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:55 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:55 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:55 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:56 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:56 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:57 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:57 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:58 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:58 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:12:59 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:00 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:00 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:01 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:02 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:02 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:03 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:03 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:04 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:04 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:05 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:05 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:06 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:06 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:07 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21104 found at Mon Mar 20 19:13:07 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21104 at Mon Mar 20 19:13:07 UTC 2023 kill -USR1 21104 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21104 killed at Mon Mar 20 19:13:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:13:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:13:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:07 UTC 2023 selfserv_9887 with PID 22366 started at Mon Mar 20 19:13:07 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:08 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:08 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:09 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:10 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:10 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:11 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:11 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:12 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:12 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:13 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:14 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:14 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:15 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:16 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:16 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:17 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:17 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:18 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:18 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:19 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:20 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:20 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:21 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:21 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:22 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:22 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:23 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:24 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:25 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:25 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:26 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:26 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:27 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:27 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:28 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:28 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:29 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:29 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22366 found at Mon Mar 20 19:13:30 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22366 at Mon Mar 20 19:13:30 UTC 2023 kill -USR1 22366 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22366 killed at Mon Mar 20 19:13:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:13:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:13:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:30 UTC 2023 selfserv_9887 with PID 23630 started at Mon Mar 20 19:13:30 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:30 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:31 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:31 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:31 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:31 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:32 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:32 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:32 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:32 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:32 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:33 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:33 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:33 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:34 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:34 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:34 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:35 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:35 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:35 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:35 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:36 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:36 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:36 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:36 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:37 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:37 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:37 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:38 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:38 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:38 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:38 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:38 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:39 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:39 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:39 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:39 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:40 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:40 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:40 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23630 found at Mon Mar 20 19:13:40 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23630 at Mon Mar 20 19:13:40 UTC 2023 kill -USR1 23630 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23630 killed at Mon Mar 20 19:13:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:13:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:13:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24909 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24909 found at Mon Mar 20 19:13:40 UTC 2023 selfserv_9887 with PID 24909 started at Mon Mar 20 19:13:40 UTC 2023 trying to kill selfserv_9887 with PID 24909 at Mon Mar 20 19:13:40 UTC 2023 kill -USR1 24909 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24909 killed at Mon Mar 20 19:13:41 UTC 2023 selfserv_9887 starting at Mon Mar 20 19:13:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:13:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:41 UTC 2023 selfserv_9887 with PID 24951 started at Mon Mar 20 19:13:41 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:41 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:42 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:42 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:43 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:43 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:44 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:44 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:45 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:45 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:46 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:46 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:47 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:47 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:48 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:48 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:49 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:49 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:50 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:50 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:51 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:51 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:52 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:52 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:53 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:53 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:54 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:54 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:55 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:55 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:56 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:56 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:57 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:57 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:58 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:58 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:59 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:59 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:13:59 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:14:00 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:14:00 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24951 found at Mon Mar 20 19:14:01 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24951 at Mon Mar 20 19:14:01 UTC 2023 kill -USR1 24951 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24951 killed at Mon Mar 20 19:14:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:14:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:14:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:01 UTC 2023 selfserv_9887 with PID 26213 started at Mon Mar 20 19:14:01 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:02 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:02 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:03 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:03 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:04 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:04 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:05 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:06 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:06 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:07 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:07 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:08 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:08 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:09 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:10 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:10 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:11 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:11 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:12 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:12 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:13 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:13 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:14 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:15 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:15 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:16 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:17 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:17 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:18 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:18 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:19 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:19 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:20 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:20 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:21 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:21 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:22 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:22 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26213 found at Mon Mar 20 19:14:23 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26213 at Mon Mar 20 19:14:23 UTC 2023 kill -USR1 26213 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26213 killed at Mon Mar 20 19:14:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:14:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:14:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:23 UTC 2023 selfserv_9887 with PID 27475 started at Mon Mar 20 19:14:23 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:23 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:24 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:24 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:24 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:24 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:24 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:25 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:25 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:25 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:25 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:26 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:26 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:26 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:26 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:27 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:27 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:27 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:27 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:28 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:28 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:28 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:28 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:28 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:29 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:29 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:29 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:29 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:30 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:30 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:30 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:30 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:31 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:31 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:31 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:31 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:31 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:32 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:32 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:32 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27475 found at Mon Mar 20 19:14:32 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27475 at Mon Mar 20 19:14:32 UTC 2023 kill -USR1 27475 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27475 killed at Mon Mar 20 19:14:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:14:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:14:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:33 UTC 2023 selfserv_9887 with PID 28740 started at Mon Mar 20 19:14:33 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:33 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:34 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:34 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:35 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:35 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:36 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:36 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:37 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:37 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:38 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:38 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:39 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:40 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:41 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:41 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:42 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:42 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:43 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:43 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:44 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:44 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:45 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:45 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:46 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:46 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:47 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:48 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:48 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:49 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:49 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:50 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:50 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:51 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:51 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:52 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:52 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:53 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:53 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28740 found at Mon Mar 20 19:14:54 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28740 at Mon Mar 20 19:14:54 UTC 2023 kill -USR1 28740 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28740 killed at Mon Mar 20 19:14:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:14:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:14:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:54 UTC 2023 selfserv_9887 with PID 30017 started at Mon Mar 20 19:14:54 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:55 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:55 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:56 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:56 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:57 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:57 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:58 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:59 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:14:59 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:00 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:00 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:01 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:01 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:02 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:03 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:04 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:04 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:05 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:05 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:06 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:06 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:07 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:07 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:08 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:08 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:09 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:10 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:11 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:11 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:12 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:12 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:13 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:13 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:14 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:14 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:15 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:15 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:16 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30017 found at Mon Mar 20 19:15:17 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30017 at Mon Mar 20 19:15:17 UTC 2023 kill -USR1 30017 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30017 killed at Mon Mar 20 19:15:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:17 UTC 2023 selfserv_9887 with PID 31283 started at Mon Mar 20 19:15:17 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:17 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:17 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:17 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:18 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:18 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:18 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:18 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:19 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:19 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:19 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:19 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:20 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:20 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:21 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:21 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:21 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:21 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:22 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:22 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:22 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:22 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:22 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:23 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:23 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:23 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:23 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:24 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:24 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:25 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:25 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:25 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:25 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:25 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:26 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:26 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:26 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:26 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:27 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31283 found at Mon Mar 20 19:15:27 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31283 at Mon Mar 20 19:15:27 UTC 2023 kill -USR1 31283 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31283 killed at Mon Mar 20 19:15:27 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32544 found at Mon Mar 20 19:15:27 UTC 2023 selfserv_9887 with PID 32544 started at Mon Mar 20 19:15:27 UTC 2023 trying to kill selfserv_9887 with PID 32544 at Mon Mar 20 19:15:27 UTC 2023 kill -USR1 32544 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32544 killed at Mon Mar 20 19:15:27 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 19:15:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 32589 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32589 found at Mon Mar 20 19:15:27 UTC 2023 selfserv_9887 with PID 32589 started at Mon Mar 20 19:15:27 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 32589 at Mon Mar 20 19:15:33 UTC 2023 kill -USR1 32589 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32589 killed at Mon Mar 20 19:15:33 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 19:15:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 33147 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33147 found at Mon Mar 20 19:15:33 UTC 2023 selfserv_9887 with PID 33147 started at Mon Mar 20 19:15:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33147 at Mon Mar 20 19:15:46 UTC 2023 kill -USR1 33147 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33147 killed at Mon Mar 20 19:15:46 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 19:15:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33960 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33960 found at Mon Mar 20 19:15:47 UTC 2023 selfserv_9887 with PID 33960 started at Mon Mar 20 19:15:47 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33960 at Mon Mar 20 19:15:47 UTC 2023 kill -USR1 33960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33960 killed at Mon Mar 20 19:15:47 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34026 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34026 found at Mon Mar 20 19:15:47 UTC 2023 selfserv_9887 with PID 34026 started at Mon Mar 20 19:15:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34026 at Mon Mar 20 19:15:48 UTC 2023 kill -USR1 34026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34026 killed at Mon Mar 20 19:15:48 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34078 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34078 found at Mon Mar 20 19:15:48 UTC 2023 selfserv_9887 with PID 34078 started at Mon Mar 20 19:15:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34078 at Mon Mar 20 19:15:48 UTC 2023 kill -USR1 34078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34078 killed at Mon Mar 20 19:15:48 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34130 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34130 found at Mon Mar 20 19:15:48 UTC 2023 selfserv_9887 with PID 34130 started at Mon Mar 20 19:15:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34130 at Mon Mar 20 19:15:49 UTC 2023 kill -USR1 34130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34130 killed at Mon Mar 20 19:15:49 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34197 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34197 found at Mon Mar 20 19:15:49 UTC 2023 selfserv_9887 with PID 34197 started at Mon Mar 20 19:15:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34197 at Mon Mar 20 19:15:49 UTC 2023 kill -USR1 34197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34197 killed at Mon Mar 20 19:15:50 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34258 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34258 found at Mon Mar 20 19:15:50 UTC 2023 selfserv_9887 with PID 34258 started at Mon Mar 20 19:15:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34258 at Mon Mar 20 19:15:50 UTC 2023 kill -USR1 34258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34258 killed at Mon Mar 20 19:15:50 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34310 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34310 found at Mon Mar 20 19:15:50 UTC 2023 selfserv_9887 with PID 34310 started at Mon Mar 20 19:15:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34310 at Mon Mar 20 19:15:51 UTC 2023 kill -USR1 34310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34310 killed at Mon Mar 20 19:15:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34362 found at Mon Mar 20 19:15:51 UTC 2023 selfserv_9887 with PID 34362 started at Mon Mar 20 19:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34362 at Mon Mar 20 19:15:51 UTC 2023 kill -USR1 34362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34362 killed at Mon Mar 20 19:15:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34414 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34414 found at Mon Mar 20 19:15:51 UTC 2023 selfserv_9887 with PID 34414 started at Mon Mar 20 19:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34414 at Mon Mar 20 19:15:52 UTC 2023 kill -USR1 34414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34414 killed at Mon Mar 20 19:15:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34466 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34466 found at Mon Mar 20 19:15:52 UTC 2023 selfserv_9887 with PID 34466 started at Mon Mar 20 19:15:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34466 at Mon Mar 20 19:15:52 UTC 2023 kill -USR1 34466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34466 killed at Mon Mar 20 19:15:52 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34519 found at Mon Mar 20 19:15:52 UTC 2023 selfserv_9887 with PID 34519 started at Mon Mar 20 19:15:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34519 at Mon Mar 20 19:15:53 UTC 2023 kill -USR1 34519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34519 killed at Mon Mar 20 19:15:53 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34571 found at Mon Mar 20 19:15:53 UTC 2023 selfserv_9887 with PID 34571 started at Mon Mar 20 19:15:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34571 at Mon Mar 20 19:15:53 UTC 2023 kill -USR1 34571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34571 killed at Mon Mar 20 19:15:53 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34623 found at Mon Mar 20 19:15:53 UTC 2023 selfserv_9887 with PID 34623 started at Mon Mar 20 19:15:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34623 at Mon Mar 20 19:15:53 UTC 2023 kill -USR1 34623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34623 killed at Mon Mar 20 19:15:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34675 found at Mon Mar 20 19:15:54 UTC 2023 selfserv_9887 with PID 34675 started at Mon Mar 20 19:15:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34675 at Mon Mar 20 19:15:54 UTC 2023 kill -USR1 34675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34675 killed at Mon Mar 20 19:15:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34727 found at Mon Mar 20 19:15:55 UTC 2023 selfserv_9887 with PID 34727 started at Mon Mar 20 19:15:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34727 at Mon Mar 20 19:15:55 UTC 2023 kill -USR1 34727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34727 killed at Mon Mar 20 19:15:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34780 found at Mon Mar 20 19:15:55 UTC 2023 selfserv_9887 with PID 34780 started at Mon Mar 20 19:15:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34780 at Mon Mar 20 19:15:56 UTC 2023 kill -USR1 34780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34780 killed at Mon Mar 20 19:15:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34832 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34832 found at Mon Mar 20 19:15:56 UTC 2023 selfserv_9887 with PID 34832 started at Mon Mar 20 19:15:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34832 at Mon Mar 20 19:15:57 UTC 2023 kill -USR1 34832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34832 killed at Mon Mar 20 19:15:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34884 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34884 found at Mon Mar 20 19:15:57 UTC 2023 selfserv_9887 with PID 34884 started at Mon Mar 20 19:15:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34884 at Mon Mar 20 19:15:58 UTC 2023 kill -USR1 34884 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34884 killed at Mon Mar 20 19:15:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34936 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34936 found at Mon Mar 20 19:15:58 UTC 2023 selfserv_9887 with PID 34936 started at Mon Mar 20 19:15:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34936 at Mon Mar 20 19:15:58 UTC 2023 kill -USR1 34936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34936 killed at Mon Mar 20 19:15:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:15:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34988 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34988 found at Mon Mar 20 19:15:59 UTC 2023 selfserv_9887 with PID 34988 started at Mon Mar 20 19:15:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34988 at Mon Mar 20 19:15:59 UTC 2023 kill -USR1 34988 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34988 killed at Mon Mar 20 19:15:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:15:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:15:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35138 found at Mon Mar 20 19:16:00 UTC 2023 selfserv_9887 with PID 35138 started at Mon Mar 20 19:16:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35138 at Mon Mar 20 19:16:00 UTC 2023 kill -USR1 35138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35138 killed at Mon Mar 20 19:16:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35191 found at Mon Mar 20 19:16:01 UTC 2023 selfserv_9887 with PID 35191 started at Mon Mar 20 19:16:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35191 at Mon Mar 20 19:16:01 UTC 2023 kill -USR1 35191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35191 killed at Mon Mar 20 19:16:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35244 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35244 found at Mon Mar 20 19:16:01 UTC 2023 selfserv_9887 with PID 35244 started at Mon Mar 20 19:16:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35244 at Mon Mar 20 19:16:02 UTC 2023 kill -USR1 35244 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35244 killed at Mon Mar 20 19:16:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35296 found at Mon Mar 20 19:16:02 UTC 2023 selfserv_9887 with PID 35296 started at Mon Mar 20 19:16:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35296 at Mon Mar 20 19:16:03 UTC 2023 kill -USR1 35296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35296 killed at Mon Mar 20 19:16:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35348 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35348 found at Mon Mar 20 19:16:03 UTC 2023 selfserv_9887 with PID 35348 started at Mon Mar 20 19:16:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35348 at Mon Mar 20 19:16:04 UTC 2023 kill -USR1 35348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35348 killed at Mon Mar 20 19:16:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35400 found at Mon Mar 20 19:16:04 UTC 2023 selfserv_9887 with PID 35400 started at Mon Mar 20 19:16:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35400 at Mon Mar 20 19:16:04 UTC 2023 kill -USR1 35400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35400 killed at Mon Mar 20 19:16:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35452 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35452 found at Mon Mar 20 19:16:04 UTC 2023 selfserv_9887 with PID 35452 started at Mon Mar 20 19:16:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35452 at Mon Mar 20 19:16:05 UTC 2023 kill -USR1 35452 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35452 killed at Mon Mar 20 19:16:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35504 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35504 found at Mon Mar 20 19:16:05 UTC 2023 selfserv_9887 with PID 35504 started at Mon Mar 20 19:16:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35504 at Mon Mar 20 19:16:05 UTC 2023 kill -USR1 35504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35504 killed at Mon Mar 20 19:16:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35556 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35556 found at Mon Mar 20 19:16:05 UTC 2023 selfserv_9887 with PID 35556 started at Mon Mar 20 19:16:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35556 at Mon Mar 20 19:16:06 UTC 2023 kill -USR1 35556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35556 killed at Mon Mar 20 19:16:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35608 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35608 found at Mon Mar 20 19:16:06 UTC 2023 selfserv_9887 with PID 35608 started at Mon Mar 20 19:16:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35608 at Mon Mar 20 19:16:06 UTC 2023 kill -USR1 35608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35608 killed at Mon Mar 20 19:16:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35660 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35660 found at Mon Mar 20 19:16:06 UTC 2023 selfserv_9887 with PID 35660 started at Mon Mar 20 19:16:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35660 at Mon Mar 20 19:16:07 UTC 2023 kill -USR1 35660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35660 killed at Mon Mar 20 19:16:07 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35712 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35712 found at Mon Mar 20 19:16:07 UTC 2023 selfserv_9887 with PID 35712 started at Mon Mar 20 19:16:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35712 at Mon Mar 20 19:16:07 UTC 2023 kill -USR1 35712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35712 killed at Mon Mar 20 19:16:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35764 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35764 found at Mon Mar 20 19:16:07 UTC 2023 selfserv_9887 with PID 35764 started at Mon Mar 20 19:16:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35764 at Mon Mar 20 19:16:07 UTC 2023 kill -USR1 35764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35764 killed at Mon Mar 20 19:16:07 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35816 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35816 found at Mon Mar 20 19:16:08 UTC 2023 selfserv_9887 with PID 35816 started at Mon Mar 20 19:16:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35816 at Mon Mar 20 19:16:08 UTC 2023 kill -USR1 35816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35816 killed at Mon Mar 20 19:16:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35868 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35868 found at Mon Mar 20 19:16:08 UTC 2023 selfserv_9887 with PID 35868 started at Mon Mar 20 19:16:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35868 at Mon Mar 20 19:16:08 UTC 2023 kill -USR1 35868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35868 killed at Mon Mar 20 19:16:08 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35920 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35920 found at Mon Mar 20 19:16:09 UTC 2023 selfserv_9887 with PID 35920 started at Mon Mar 20 19:16:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35920 at Mon Mar 20 19:16:09 UTC 2023 kill -USR1 35920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35920 killed at Mon Mar 20 19:16:09 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35973 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35973 found at Mon Mar 20 19:16:09 UTC 2023 selfserv_9887 with PID 35973 started at Mon Mar 20 19:16:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35973 at Mon Mar 20 19:16:09 UTC 2023 kill -USR1 35973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35973 killed at Mon Mar 20 19:16:09 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36026 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36026 found at Mon Mar 20 19:16:10 UTC 2023 selfserv_9887 with PID 36026 started at Mon Mar 20 19:16:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36026 at Mon Mar 20 19:16:10 UTC 2023 kill -USR1 36026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36026 killed at Mon Mar 20 19:16:10 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36078 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36078 found at Mon Mar 20 19:16:10 UTC 2023 selfserv_9887 with PID 36078 started at Mon Mar 20 19:16:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36078 at Mon Mar 20 19:16:11 UTC 2023 kill -USR1 36078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36078 killed at Mon Mar 20 19:16:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36130 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36130 found at Mon Mar 20 19:16:11 UTC 2023 selfserv_9887 with PID 36130 started at Mon Mar 20 19:16:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36130 at Mon Mar 20 19:16:11 UTC 2023 kill -USR1 36130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36130 killed at Mon Mar 20 19:16:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36182 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36182 found at Mon Mar 20 19:16:11 UTC 2023 selfserv_9887 with PID 36182 started at Mon Mar 20 19:16:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36182 at Mon Mar 20 19:16:12 UTC 2023 kill -USR1 36182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36182 killed at Mon Mar 20 19:16:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36234 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36234 found at Mon Mar 20 19:16:12 UTC 2023 selfserv_9887 with PID 36234 started at Mon Mar 20 19:16:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36234 at Mon Mar 20 19:16:12 UTC 2023 kill -USR1 36234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36234 killed at Mon Mar 20 19:16:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36286 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36286 found at Mon Mar 20 19:16:13 UTC 2023 selfserv_9887 with PID 36286 started at Mon Mar 20 19:16:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36286 at Mon Mar 20 19:16:13 UTC 2023 kill -USR1 36286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36286 killed at Mon Mar 20 19:16:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36338 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36338 found at Mon Mar 20 19:16:13 UTC 2023 selfserv_9887 with PID 36338 started at Mon Mar 20 19:16:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36338 at Mon Mar 20 19:16:13 UTC 2023 kill -USR1 36338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36338 killed at Mon Mar 20 19:16:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36390 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36390 found at Mon Mar 20 19:16:13 UTC 2023 selfserv_9887 with PID 36390 started at Mon Mar 20 19:16:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36390 at Mon Mar 20 19:16:14 UTC 2023 kill -USR1 36390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36390 killed at Mon Mar 20 19:16:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36442 found at Mon Mar 20 19:16:14 UTC 2023 selfserv_9887 with PID 36442 started at Mon Mar 20 19:16:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36442 at Mon Mar 20 19:16:14 UTC 2023 kill -USR1 36442 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36442 killed at Mon Mar 20 19:16:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36494 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36494 found at Mon Mar 20 19:16:15 UTC 2023 selfserv_9887 with PID 36494 started at Mon Mar 20 19:16:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36494 at Mon Mar 20 19:16:15 UTC 2023 kill -USR1 36494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36494 killed at Mon Mar 20 19:16:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36546 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36546 found at Mon Mar 20 19:16:16 UTC 2023 selfserv_9887 with PID 36546 started at Mon Mar 20 19:16:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36546 at Mon Mar 20 19:16:16 UTC 2023 kill -USR1 36546 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36546 killed at Mon Mar 20 19:16:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36598 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36598 found at Mon Mar 20 19:16:16 UTC 2023 selfserv_9887 with PID 36598 started at Mon Mar 20 19:16:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36598 at Mon Mar 20 19:16:17 UTC 2023 kill -USR1 36598 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36598 killed at Mon Mar 20 19:16:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36651 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36651 found at Mon Mar 20 19:16:17 UTC 2023 selfserv_9887 with PID 36651 started at Mon Mar 20 19:16:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36651 at Mon Mar 20 19:16:18 UTC 2023 kill -USR1 36651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36651 killed at Mon Mar 20 19:16:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36703 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36703 found at Mon Mar 20 19:16:18 UTC 2023 selfserv_9887 with PID 36703 started at Mon Mar 20 19:16:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36703 at Mon Mar 20 19:16:19 UTC 2023 kill -USR1 36703 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36703 killed at Mon Mar 20 19:16:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36755 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36755 found at Mon Mar 20 19:16:19 UTC 2023 selfserv_9887 with PID 36755 started at Mon Mar 20 19:16:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36755 at Mon Mar 20 19:16:20 UTC 2023 kill -USR1 36755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36755 killed at Mon Mar 20 19:16:20 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36807 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36807 found at Mon Mar 20 19:16:20 UTC 2023 selfserv_9887 with PID 36807 started at Mon Mar 20 19:16:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36807 at Mon Mar 20 19:16:20 UTC 2023 kill -USR1 36807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36807 killed at Mon Mar 20 19:16:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36859 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36859 found at Mon Mar 20 19:16:21 UTC 2023 selfserv_9887 with PID 36859 started at Mon Mar 20 19:16:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36859 at Mon Mar 20 19:16:21 UTC 2023 kill -USR1 36859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36859 killed at Mon Mar 20 19:16:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36911 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36911 found at Mon Mar 20 19:16:21 UTC 2023 selfserv_9887 with PID 36911 started at Mon Mar 20 19:16:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36911 at Mon Mar 20 19:16:21 UTC 2023 kill -USR1 36911 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36911 killed at Mon Mar 20 19:16:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:16:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36963 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36963 found at Mon Mar 20 19:16:22 UTC 2023 selfserv_9887 with PID 36963 started at Mon Mar 20 19:16:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36963 at Mon Mar 20 19:16:22 UTC 2023 kill -USR1 36963 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36963 killed at Mon Mar 20 19:16:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37015 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37015 found at Mon Mar 20 19:16:22 UTC 2023 selfserv_9887 with PID 37015 started at Mon Mar 20 19:16:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37015 at Mon Mar 20 19:16:22 UTC 2023 kill -USR1 37015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37015 killed at Mon Mar 20 19:16:23 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37067 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37067 found at Mon Mar 20 19:16:23 UTC 2023 selfserv_9887 with PID 37067 started at Mon Mar 20 19:16:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37067 at Mon Mar 20 19:16:23 UTC 2023 kill -USR1 37067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37067 killed at Mon Mar 20 19:16:23 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:16:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37119 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37119 found at Mon Mar 20 19:16:23 UTC 2023 selfserv_9887 with PID 37119 started at Mon Mar 20 19:16:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37119 at Mon Mar 20 19:16:24 UTC 2023 kill -USR1 37119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37119 killed at Mon Mar 20 19:16:24 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:16:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37177 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37177 found at Mon Mar 20 19:16:24 UTC 2023 selfserv_9887 with PID 37177 started at Mon Mar 20 19:16:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37177 at Mon Mar 20 19:16:24 UTC 2023 kill -USR1 37177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37177 killed at Mon Mar 20 19:16:24 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 19:16:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37235 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37235 found at Mon Mar 20 19:16:24 UTC 2023 selfserv_9887 with PID 37235 started at Mon Mar 20 19:16:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37235 at Mon Mar 20 19:16:25 UTC 2023 kill -USR1 37235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37235 killed at Mon Mar 20 19:16:25 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 19:16:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37293 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37293 found at Mon Mar 20 19:16:25 UTC 2023 selfserv_9887 with PID 37293 started at Mon Mar 20 19:16:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37293 at Mon Mar 20 19:16:25 UTC 2023 kill -USR1 37293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37293 killed at Mon Mar 20 19:16:25 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:16:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37351 found at Mon Mar 20 19:16:25 UTC 2023 selfserv_9887 with PID 37351 started at Mon Mar 20 19:16:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37351 at Mon Mar 20 19:16:25 UTC 2023 kill -USR1 37351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37351 killed at Mon Mar 20 19:16:25 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 19:16:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37409 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37409 found at Mon Mar 20 19:16:26 UTC 2023 selfserv_9887 with PID 37409 started at Mon Mar 20 19:16:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37409 at Mon Mar 20 19:16:26 UTC 2023 kill -USR1 37409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37409 killed at Mon Mar 20 19:16:26 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:16:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37467 found at Mon Mar 20 19:16:26 UTC 2023 selfserv_9887 with PID 37467 started at Mon Mar 20 19:16:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37467 at Mon Mar 20 19:16:26 UTC 2023 kill -USR1 37467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37467 killed at Mon Mar 20 19:16:26 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 19:16:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37525 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37525 found at Mon Mar 20 19:16:26 UTC 2023 selfserv_9887 with PID 37525 started at Mon Mar 20 19:16:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37525 at Mon Mar 20 19:16:27 UTC 2023 kill -USR1 37525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37525 killed at Mon Mar 20 19:16:27 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 19:16:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37583 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37583 found at Mon Mar 20 19:16:27 UTC 2023 selfserv_9887 with PID 37583 started at Mon Mar 20 19:16:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37583 at Mon Mar 20 19:16:27 UTC 2023 kill -USR1 37583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37583 killed at Mon Mar 20 19:16:27 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 19:16:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37642 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37642 found at Mon Mar 20 19:16:27 UTC 2023 selfserv_9887 with PID 37642 started at Mon Mar 20 19:16:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37642 at Mon Mar 20 19:16:27 UTC 2023 kill -USR1 37642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37642 killed at Mon Mar 20 19:16:27 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 19:16:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37700 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37700 found at Mon Mar 20 19:16:28 UTC 2023 selfserv_9887 with PID 37700 started at Mon Mar 20 19:16:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37700 at Mon Mar 20 19:16:28 UTC 2023 kill -USR1 37700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37700 killed at Mon Mar 20 19:16:28 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 19:16:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37742 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37742 found at Mon Mar 20 19:16:28 UTC 2023 selfserv_9887 with PID 37742 started at Mon Mar 20 19:16:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37742 at Mon Mar 20 19:16:28 UTC 2023 kill -USR1 37742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37742 killed at Mon Mar 20 19:16:28 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 19:16:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37784 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37784 found at Mon Mar 20 19:16:28 UTC 2023 selfserv_9887 with PID 37784 started at Mon Mar 20 19:16:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 37784 at Mon Mar 20 19:16:28 UTC 2023 kill -USR1 37784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37784 killed at Mon Mar 20 19:16:28 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 19:16:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37826 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37826 found at Mon Mar 20 19:16:29 UTC 2023 selfserv_9887 with PID 37826 started at Mon Mar 20 19:16:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37826 at Mon Mar 20 19:16:29 UTC 2023 kill -USR1 37826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37826 killed at Mon Mar 20 19:16:29 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 19:16:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37868 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37868 found at Mon Mar 20 19:16:29 UTC 2023 selfserv_9887 with PID 37868 started at Mon Mar 20 19:16:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37868 at Mon Mar 20 19:16:29 UTC 2023 kill -USR1 37868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37868 killed at Mon Mar 20 19:16:29 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 19:16:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37910 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37910 found at Mon Mar 20 19:16:29 UTC 2023 selfserv_9887 with PID 37910 started at Mon Mar 20 19:16:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37910 at Mon Mar 20 19:16:29 UTC 2023 kill -USR1 37910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37910 killed at Mon Mar 20 19:16:30 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 19:16:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37953 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37953 found at Mon Mar 20 19:16:30 UTC 2023 selfserv_9887 with PID 37953 started at Mon Mar 20 19:16:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37953 at Mon Mar 20 19:16:30 UTC 2023 kill -USR1 37953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37953 killed at Mon Mar 20 19:16:30 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 19:16:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37995 found at Mon Mar 20 19:16:30 UTC 2023 selfserv_9887 with PID 37995 started at Mon Mar 20 19:16:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37995 at Mon Mar 20 19:16:30 UTC 2023 kill -USR1 37995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37995 killed at Mon Mar 20 19:16:30 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 19:16:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:16:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38038 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38038 found at Mon Mar 20 19:16:30 UTC 2023 selfserv_9887 with PID 38038 started at Mon Mar 20 19:16:30 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 19:16:30 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 19:17:42 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 38038 at Mon Mar 20 19:17:42 UTC 2023 kill -USR1 38038 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38038 killed at Mon Mar 20 19:17:42 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 19:17:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38119 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38119 found at Mon Mar 20 19:17:42 UTC 2023 selfserv_9887 with PID 38119 started at Mon Mar 20 19:17:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38119 at Mon Mar 20 19:17:42 UTC 2023 kill -USR1 38119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38119 killed at Mon Mar 20 19:17:43 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38161 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38161 found at Mon Mar 20 19:17:43 UTC 2023 selfserv_9887 with PID 38161 started at Mon Mar 20 19:17:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38161 at Mon Mar 20 19:17:43 UTC 2023 kill -USR1 38161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38161 killed at Mon Mar 20 19:17:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38200 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38200 found at Mon Mar 20 19:17:43 UTC 2023 selfserv_9887 with PID 38200 started at Mon Mar 20 19:17:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38200 at Mon Mar 20 19:17:43 UTC 2023 kill -USR1 38200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38200 killed at Mon Mar 20 19:17:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38239 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38239 found at Mon Mar 20 19:17:43 UTC 2023 selfserv_9887 with PID 38239 started at Mon Mar 20 19:17:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38239 at Mon Mar 20 19:17:44 UTC 2023 kill -USR1 38239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38239 killed at Mon Mar 20 19:17:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38278 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38278 found at Mon Mar 20 19:17:44 UTC 2023 selfserv_9887 with PID 38278 started at Mon Mar 20 19:17:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38278 at Mon Mar 20 19:17:44 UTC 2023 kill -USR1 38278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38278 killed at Mon Mar 20 19:17:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38317 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38317 found at Mon Mar 20 19:17:44 UTC 2023 selfserv_9887 with PID 38317 started at Mon Mar 20 19:17:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38317 at Mon Mar 20 19:17:44 UTC 2023 kill -USR1 38317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38317 killed at Mon Mar 20 19:17:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38356 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38356 found at Mon Mar 20 19:17:44 UTC 2023 selfserv_9887 with PID 38356 started at Mon Mar 20 19:17:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38356 at Mon Mar 20 19:17:45 UTC 2023 kill -USR1 38356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38356 killed at Mon Mar 20 19:17:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38395 found at Mon Mar 20 19:17:45 UTC 2023 selfserv_9887 with PID 38395 started at Mon Mar 20 19:17:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38395 at Mon Mar 20 19:17:45 UTC 2023 kill -USR1 38395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38395 killed at Mon Mar 20 19:17:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38434 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38434 found at Mon Mar 20 19:17:45 UTC 2023 selfserv_9887 with PID 38434 started at Mon Mar 20 19:17:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38434 at Mon Mar 20 19:17:45 UTC 2023 kill -USR1 38434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38434 killed at Mon Mar 20 19:17:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38473 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38473 found at Mon Mar 20 19:17:46 UTC 2023 selfserv_9887 with PID 38473 started at Mon Mar 20 19:17:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38473 at Mon Mar 20 19:17:46 UTC 2023 kill -USR1 38473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38473 killed at Mon Mar 20 19:17:46 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38512 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38512 found at Mon Mar 20 19:17:46 UTC 2023 selfserv_9887 with PID 38512 started at Mon Mar 20 19:17:46 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38512 at Mon Mar 20 19:17:46 UTC 2023 kill -USR1 38512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38512 killed at Mon Mar 20 19:17:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38552 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38552 found at Mon Mar 20 19:17:46 UTC 2023 selfserv_9887 with PID 38552 started at Mon Mar 20 19:17:46 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38552 at Mon Mar 20 19:17:46 UTC 2023 kill -USR1 38552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38552 killed at Mon Mar 20 19:17:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38592 found at Mon Mar 20 19:17:47 UTC 2023 selfserv_9887 with PID 38592 started at Mon Mar 20 19:17:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38592 at Mon Mar 20 19:17:47 UTC 2023 kill -USR1 38592 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38592 killed at Mon Mar 20 19:17:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38632 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38632 found at Mon Mar 20 19:17:47 UTC 2023 selfserv_9887 with PID 38632 started at Mon Mar 20 19:17:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38632 at Mon Mar 20 19:17:47 UTC 2023 kill -USR1 38632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38632 killed at Mon Mar 20 19:17:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38672 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38672 found at Mon Mar 20 19:17:47 UTC 2023 selfserv_9887 with PID 38672 started at Mon Mar 20 19:17:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38672 at Mon Mar 20 19:17:47 UTC 2023 kill -USR1 38672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38672 killed at Mon Mar 20 19:17:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38712 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38712 found at Mon Mar 20 19:17:48 UTC 2023 selfserv_9887 with PID 38712 started at Mon Mar 20 19:17:48 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38712 at Mon Mar 20 19:17:48 UTC 2023 kill -USR1 38712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38712 killed at Mon Mar 20 19:17:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38752 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38752 found at Mon Mar 20 19:17:48 UTC 2023 selfserv_9887 with PID 38752 started at Mon Mar 20 19:17:48 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38752 at Mon Mar 20 19:17:48 UTC 2023 kill -USR1 38752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38752 killed at Mon Mar 20 19:17:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38792 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38792 found at Mon Mar 20 19:17:48 UTC 2023 selfserv_9887 with PID 38792 started at Mon Mar 20 19:17:48 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38792 at Mon Mar 20 19:17:49 UTC 2023 kill -USR1 38792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38792 killed at Mon Mar 20 19:17:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:17:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38832 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38832 found at Mon Mar 20 19:17:49 UTC 2023 selfserv_9887 with PID 38832 started at Mon Mar 20 19:17:49 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38832 at Mon Mar 20 19:17:49 UTC 2023 kill -USR1 38832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38832 killed at Mon Mar 20 19:17:49 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 19:17:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 38872 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38872 found at Mon Mar 20 19:17:49 UTC 2023 selfserv_9887 with PID 38872 started at Mon Mar 20 19:17:49 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 38872 at Mon Mar 20 19:17:55 UTC 2023 kill -USR1 38872 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38872 killed at Mon Mar 20 19:17:55 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 19:17:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:17:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 39425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39425 found at Mon Mar 20 19:17:55 UTC 2023 selfserv_9887 with PID 39425 started at Mon Mar 20 19:17:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39425 at Mon Mar 20 19:18:04 UTC 2023 kill -USR1 39425 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39425 killed at Mon Mar 20 19:18:05 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40242 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40242 found at Mon Mar 20 19:18:05 UTC 2023 selfserv_9887 with PID 40242 started at Mon Mar 20 19:18:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40242 at Mon Mar 20 19:18:05 UTC 2023 kill -USR1 40242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40242 killed at Mon Mar 20 19:18:05 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40294 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40294 found at Mon Mar 20 19:18:05 UTC 2023 selfserv_9887 with PID 40294 started at Mon Mar 20 19:18:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40294 at Mon Mar 20 19:18:05 UTC 2023 kill -USR1 40294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40294 killed at Mon Mar 20 19:18:05 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40346 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40346 found at Mon Mar 20 19:18:06 UTC 2023 selfserv_9887 with PID 40346 started at Mon Mar 20 19:18:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40346 at Mon Mar 20 19:18:06 UTC 2023 kill -USR1 40346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40346 killed at Mon Mar 20 19:18:06 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40398 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40398 found at Mon Mar 20 19:18:06 UTC 2023 selfserv_9887 with PID 40398 started at Mon Mar 20 19:18:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40398 at Mon Mar 20 19:18:06 UTC 2023 kill -USR1 40398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40398 killed at Mon Mar 20 19:18:06 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40450 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40450 found at Mon Mar 20 19:18:06 UTC 2023 selfserv_9887 with PID 40450 started at Mon Mar 20 19:18:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40450 at Mon Mar 20 19:18:07 UTC 2023 kill -USR1 40450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40450 killed at Mon Mar 20 19:18:07 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40502 found at Mon Mar 20 19:18:07 UTC 2023 selfserv_9887 with PID 40502 started at Mon Mar 20 19:18:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40502 at Mon Mar 20 19:18:07 UTC 2023 kill -USR1 40502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40502 killed at Mon Mar 20 19:18:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40554 found at Mon Mar 20 19:18:07 UTC 2023 selfserv_9887 with PID 40554 started at Mon Mar 20 19:18:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40554 at Mon Mar 20 19:18:08 UTC 2023 kill -USR1 40554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40554 killed at Mon Mar 20 19:18:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40606 found at Mon Mar 20 19:18:08 UTC 2023 selfserv_9887 with PID 40606 started at Mon Mar 20 19:18:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40606 at Mon Mar 20 19:18:08 UTC 2023 kill -USR1 40606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40606 killed at Mon Mar 20 19:18:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40658 found at Mon Mar 20 19:18:08 UTC 2023 selfserv_9887 with PID 40658 started at Mon Mar 20 19:18:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40658 at Mon Mar 20 19:18:08 UTC 2023 kill -USR1 40658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40658 killed at Mon Mar 20 19:18:09 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40710 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40710 found at Mon Mar 20 19:18:09 UTC 2023 selfserv_9887 with PID 40710 started at Mon Mar 20 19:18:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40710 at Mon Mar 20 19:18:09 UTC 2023 kill -USR1 40710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40710 killed at Mon Mar 20 19:18:09 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40762 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40762 found at Mon Mar 20 19:18:09 UTC 2023 selfserv_9887 with PID 40762 started at Mon Mar 20 19:18:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40762 at Mon Mar 20 19:18:09 UTC 2023 kill -USR1 40762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40762 killed at Mon Mar 20 19:18:09 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40814 found at Mon Mar 20 19:18:10 UTC 2023 selfserv_9887 with PID 40814 started at Mon Mar 20 19:18:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40814 at Mon Mar 20 19:18:10 UTC 2023 kill -USR1 40814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40814 killed at Mon Mar 20 19:18:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40866 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40866 found at Mon Mar 20 19:18:10 UTC 2023 selfserv_9887 with PID 40866 started at Mon Mar 20 19:18:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40866 at Mon Mar 20 19:18:10 UTC 2023 kill -USR1 40866 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40866 killed at Mon Mar 20 19:18:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40918 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40918 found at Mon Mar 20 19:18:10 UTC 2023 selfserv_9887 with PID 40918 started at Mon Mar 20 19:18:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40918 at Mon Mar 20 19:18:11 UTC 2023 kill -USR1 40918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40918 killed at Mon Mar 20 19:18:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 311 found at Mon Mar 20 19:18:11 UTC 2023 selfserv_9887 with PID 311 started at Mon Mar 20 19:18:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 311 at Mon Mar 20 19:18:11 UTC 2023 kill -USR1 311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 311 killed at Mon Mar 20 19:18:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 363 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 363 found at Mon Mar 20 19:18:11 UTC 2023 selfserv_9887 with PID 363 started at Mon Mar 20 19:18:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 363 at Mon Mar 20 19:18:12 UTC 2023 kill -USR1 363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 363 killed at Mon Mar 20 19:18:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 415 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 415 found at Mon Mar 20 19:18:12 UTC 2023 selfserv_9887 with PID 415 started at Mon Mar 20 19:18:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 415 at Mon Mar 20 19:18:12 UTC 2023 kill -USR1 415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 415 killed at Mon Mar 20 19:18:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 467 found at Mon Mar 20 19:18:12 UTC 2023 selfserv_9887 with PID 467 started at Mon Mar 20 19:18:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 467 at Mon Mar 20 19:18:13 UTC 2023 kill -USR1 467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 467 killed at Mon Mar 20 19:18:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 519 found at Mon Mar 20 19:18:13 UTC 2023 selfserv_9887 with PID 519 started at Mon Mar 20 19:18:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 519 at Mon Mar 20 19:18:13 UTC 2023 kill -USR1 519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 519 killed at Mon Mar 20 19:18:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 571 found at Mon Mar 20 19:18:13 UTC 2023 selfserv_9887 with PID 571 started at Mon Mar 20 19:18:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 571 at Mon Mar 20 19:18:14 UTC 2023 kill -USR1 571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 571 killed at Mon Mar 20 19:18:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 623 found at Mon Mar 20 19:18:14 UTC 2023 selfserv_9887 with PID 623 started at Mon Mar 20 19:18:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 623 at Mon Mar 20 19:18:14 UTC 2023 kill -USR1 623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 623 killed at Mon Mar 20 19:18:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 675 found at Mon Mar 20 19:18:14 UTC 2023 selfserv_9887 with PID 675 started at Mon Mar 20 19:18:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 675 at Mon Mar 20 19:18:15 UTC 2023 kill -USR1 675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 675 killed at Mon Mar 20 19:18:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 727 found at Mon Mar 20 19:18:15 UTC 2023 selfserv_9887 with PID 727 started at Mon Mar 20 19:18:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 727 at Mon Mar 20 19:18:15 UTC 2023 kill -USR1 727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 727 killed at Mon Mar 20 19:18:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 779 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 779 found at Mon Mar 20 19:18:15 UTC 2023 selfserv_9887 with PID 779 started at Mon Mar 20 19:18:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 779 at Mon Mar 20 19:18:16 UTC 2023 kill -USR1 779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 779 killed at Mon Mar 20 19:18:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 832 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 832 found at Mon Mar 20 19:18:16 UTC 2023 selfserv_9887 with PID 832 started at Mon Mar 20 19:18:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 832 at Mon Mar 20 19:18:16 UTC 2023 kill -USR1 832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 832 killed at Mon Mar 20 19:18:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 884 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 884 found at Mon Mar 20 19:18:16 UTC 2023 selfserv_9887 with PID 884 started at Mon Mar 20 19:18:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 884 at Mon Mar 20 19:18:17 UTC 2023 kill -USR1 884 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 884 killed at Mon Mar 20 19:18:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 936 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 936 found at Mon Mar 20 19:18:17 UTC 2023 selfserv_9887 with PID 936 started at Mon Mar 20 19:18:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 936 at Mon Mar 20 19:18:17 UTC 2023 kill -USR1 936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 936 killed at Mon Mar 20 19:18:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 990 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 990 found at Mon Mar 20 19:18:17 UTC 2023 selfserv_9887 with PID 990 started at Mon Mar 20 19:18:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 990 at Mon Mar 20 19:18:18 UTC 2023 kill -USR1 990 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 990 killed at Mon Mar 20 19:18:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1042 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1042 found at Mon Mar 20 19:18:18 UTC 2023 selfserv_9887 with PID 1042 started at Mon Mar 20 19:18:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1042 at Mon Mar 20 19:18:18 UTC 2023 kill -USR1 1042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1042 killed at Mon Mar 20 19:18:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1094 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1094 found at Mon Mar 20 19:18:18 UTC 2023 selfserv_9887 with PID 1094 started at Mon Mar 20 19:18:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1094 at Mon Mar 20 19:18:19 UTC 2023 kill -USR1 1094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1094 killed at Mon Mar 20 19:18:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1146 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1146 found at Mon Mar 20 19:18:19 UTC 2023 selfserv_9887 with PID 1146 started at Mon Mar 20 19:18:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1146 at Mon Mar 20 19:18:19 UTC 2023 kill -USR1 1146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1146 killed at Mon Mar 20 19:18:19 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1199 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1199 found at Mon Mar 20 19:18:19 UTC 2023 selfserv_9887 with PID 1199 started at Mon Mar 20 19:18:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1199 at Mon Mar 20 19:18:19 UTC 2023 kill -USR1 1199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1199 killed at Mon Mar 20 19:18:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1251 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1251 found at Mon Mar 20 19:18:20 UTC 2023 selfserv_9887 with PID 1251 started at Mon Mar 20 19:18:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1251 at Mon Mar 20 19:18:20 UTC 2023 kill -USR1 1251 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1251 killed at Mon Mar 20 19:18:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1303 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1303 found at Mon Mar 20 19:18:20 UTC 2023 selfserv_9887 with PID 1303 started at Mon Mar 20 19:18:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1303 at Mon Mar 20 19:18:20 UTC 2023 kill -USR1 1303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1303 killed at Mon Mar 20 19:18:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1355 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1355 found at Mon Mar 20 19:18:21 UTC 2023 selfserv_9887 with PID 1355 started at Mon Mar 20 19:18:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1355 at Mon Mar 20 19:18:21 UTC 2023 kill -USR1 1355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1355 killed at Mon Mar 20 19:18:21 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1407 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1407 found at Mon Mar 20 19:18:21 UTC 2023 selfserv_9887 with PID 1407 started at Mon Mar 20 19:18:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1407 at Mon Mar 20 19:18:21 UTC 2023 kill -USR1 1407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1407 killed at Mon Mar 20 19:18:21 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1459 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1459 found at Mon Mar 20 19:18:21 UTC 2023 selfserv_9887 with PID 1459 started at Mon Mar 20 19:18:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1459 at Mon Mar 20 19:18:22 UTC 2023 kill -USR1 1459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1459 killed at Mon Mar 20 19:18:22 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1511 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1511 found at Mon Mar 20 19:18:22 UTC 2023 selfserv_9887 with PID 1511 started at Mon Mar 20 19:18:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1511 at Mon Mar 20 19:18:22 UTC 2023 kill -USR1 1511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1511 killed at Mon Mar 20 19:18:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1563 found at Mon Mar 20 19:18:22 UTC 2023 selfserv_9887 with PID 1563 started at Mon Mar 20 19:18:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1563 at Mon Mar 20 19:18:22 UTC 2023 kill -USR1 1563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1563 killed at Mon Mar 20 19:18:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1615 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1615 found at Mon Mar 20 19:18:23 UTC 2023 selfserv_9887 with PID 1615 started at Mon Mar 20 19:18:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1615 at Mon Mar 20 19:18:23 UTC 2023 kill -USR1 1615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1615 killed at Mon Mar 20 19:18:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1667 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1667 found at Mon Mar 20 19:18:23 UTC 2023 selfserv_9887 with PID 1667 started at Mon Mar 20 19:18:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1667 at Mon Mar 20 19:18:23 UTC 2023 kill -USR1 1667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1667 killed at Mon Mar 20 19:18:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1719 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1719 found at Mon Mar 20 19:18:24 UTC 2023 selfserv_9887 with PID 1719 started at Mon Mar 20 19:18:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1719 at Mon Mar 20 19:18:24 UTC 2023 kill -USR1 1719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1719 killed at Mon Mar 20 19:18:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1771 found at Mon Mar 20 19:18:24 UTC 2023 selfserv_9887 with PID 1771 started at Mon Mar 20 19:18:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1771 at Mon Mar 20 19:18:24 UTC 2023 kill -USR1 1771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1771 killed at Mon Mar 20 19:18:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1823 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1823 found at Mon Mar 20 19:18:24 UTC 2023 selfserv_9887 with PID 1823 started at Mon Mar 20 19:18:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1823 at Mon Mar 20 19:18:25 UTC 2023 kill -USR1 1823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1823 killed at Mon Mar 20 19:18:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1875 found at Mon Mar 20 19:18:25 UTC 2023 selfserv_9887 with PID 1875 started at Mon Mar 20 19:18:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1875 at Mon Mar 20 19:18:25 UTC 2023 kill -USR1 1875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1875 killed at Mon Mar 20 19:18:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1927 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1927 found at Mon Mar 20 19:18:25 UTC 2023 selfserv_9887 with PID 1927 started at Mon Mar 20 19:18:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1927 at Mon Mar 20 19:18:26 UTC 2023 kill -USR1 1927 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1927 killed at Mon Mar 20 19:18:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1979 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1979 found at Mon Mar 20 19:18:26 UTC 2023 selfserv_9887 with PID 1979 started at Mon Mar 20 19:18:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1979 at Mon Mar 20 19:18:26 UTC 2023 kill -USR1 1979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1979 killed at Mon Mar 20 19:18:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2032 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2032 found at Mon Mar 20 19:18:26 UTC 2023 selfserv_9887 with PID 2032 started at Mon Mar 20 19:18:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2032 at Mon Mar 20 19:18:27 UTC 2023 kill -USR1 2032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2032 killed at Mon Mar 20 19:18:27 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2084 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2084 found at Mon Mar 20 19:18:27 UTC 2023 selfserv_9887 with PID 2084 started at Mon Mar 20 19:18:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2084 at Mon Mar 20 19:18:27 UTC 2023 kill -USR1 2084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2084 killed at Mon Mar 20 19:18:27 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2136 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2136 found at Mon Mar 20 19:18:27 UTC 2023 selfserv_9887 with PID 2136 started at Mon Mar 20 19:18:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2136 at Mon Mar 20 19:18:28 UTC 2023 kill -USR1 2136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2136 killed at Mon Mar 20 19:18:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2189 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2189 found at Mon Mar 20 19:18:28 UTC 2023 selfserv_9887 with PID 2189 started at Mon Mar 20 19:18:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2189 at Mon Mar 20 19:18:28 UTC 2023 kill -USR1 2189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2189 killed at Mon Mar 20 19:18:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2241 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2241 found at Mon Mar 20 19:18:28 UTC 2023 selfserv_9887 with PID 2241 started at Mon Mar 20 19:18:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2241 at Mon Mar 20 19:18:29 UTC 2023 kill -USR1 2241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2241 killed at Mon Mar 20 19:18:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2293 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2293 found at Mon Mar 20 19:18:29 UTC 2023 selfserv_9887 with PID 2293 started at Mon Mar 20 19:18:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2293 at Mon Mar 20 19:18:29 UTC 2023 kill -USR1 2293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2293 killed at Mon Mar 20 19:18:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2345 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2345 found at Mon Mar 20 19:18:30 UTC 2023 selfserv_9887 with PID 2345 started at Mon Mar 20 19:18:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2345 at Mon Mar 20 19:18:30 UTC 2023 kill -USR1 2345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2345 killed at Mon Mar 20 19:18:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:18:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2397 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2397 found at Mon Mar 20 19:18:30 UTC 2023 selfserv_9887 with PID 2397 started at Mon Mar 20 19:18:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2397 at Mon Mar 20 19:18:30 UTC 2023 kill -USR1 2397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2397 killed at Mon Mar 20 19:18:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2450 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2450 found at Mon Mar 20 19:18:30 UTC 2023 selfserv_9887 with PID 2450 started at Mon Mar 20 19:18:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2450 at Mon Mar 20 19:18:31 UTC 2023 kill -USR1 2450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2450 killed at Mon Mar 20 19:18:31 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2502 found at Mon Mar 20 19:18:31 UTC 2023 selfserv_9887 with PID 2502 started at Mon Mar 20 19:18:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2502 at Mon Mar 20 19:18:31 UTC 2023 kill -USR1 2502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2502 killed at Mon Mar 20 19:18:31 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2554 found at Mon Mar 20 19:18:31 UTC 2023 selfserv_9887 with PID 2554 started at Mon Mar 20 19:18:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2554 at Mon Mar 20 19:18:32 UTC 2023 kill -USR1 2554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2554 killed at Mon Mar 20 19:18:32 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 19:18:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2636 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2636 found at Mon Mar 20 19:18:32 UTC 2023 selfserv_9887 with PID 2636 started at Mon Mar 20 19:18:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2636 at Mon Mar 20 19:18:32 UTC 2023 kill -USR1 2636 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2636 killed at Mon Mar 20 19:18:32 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2678 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2678 found at Mon Mar 20 19:18:32 UTC 2023 selfserv_9887 with PID 2678 started at Mon Mar 20 19:18:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2678 at Mon Mar 20 19:18:32 UTC 2023 kill -USR1 2678 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2678 killed at Mon Mar 20 19:18:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2717 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2717 found at Mon Mar 20 19:18:33 UTC 2023 selfserv_9887 with PID 2717 started at Mon Mar 20 19:18:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2717 at Mon Mar 20 19:18:33 UTC 2023 kill -USR1 2717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2717 killed at Mon Mar 20 19:18:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2757 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2757 found at Mon Mar 20 19:18:33 UTC 2023 selfserv_9887 with PID 2757 started at Mon Mar 20 19:18:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2757 at Mon Mar 20 19:18:33 UTC 2023 kill -USR1 2757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2757 killed at Mon Mar 20 19:18:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2796 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2796 found at Mon Mar 20 19:18:33 UTC 2023 selfserv_9887 with PID 2796 started at Mon Mar 20 19:18:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2796 at Mon Mar 20 19:18:33 UTC 2023 kill -USR1 2796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2796 killed at Mon Mar 20 19:18:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2835 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2835 found at Mon Mar 20 19:18:34 UTC 2023 selfserv_9887 with PID 2835 started at Mon Mar 20 19:18:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2835 at Mon Mar 20 19:18:34 UTC 2023 kill -USR1 2835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2835 killed at Mon Mar 20 19:18:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2874 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2874 found at Mon Mar 20 19:18:34 UTC 2023 selfserv_9887 with PID 2874 started at Mon Mar 20 19:18:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2874 at Mon Mar 20 19:18:34 UTC 2023 kill -USR1 2874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2874 killed at Mon Mar 20 19:18:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2913 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2913 found at Mon Mar 20 19:18:34 UTC 2023 selfserv_9887 with PID 2913 started at Mon Mar 20 19:18:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2913 at Mon Mar 20 19:18:34 UTC 2023 kill -USR1 2913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2913 killed at Mon Mar 20 19:18:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2952 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2952 found at Mon Mar 20 19:18:35 UTC 2023 selfserv_9887 with PID 2952 started at Mon Mar 20 19:18:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2952 at Mon Mar 20 19:18:35 UTC 2023 kill -USR1 2952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2952 killed at Mon Mar 20 19:18:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2991 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2991 found at Mon Mar 20 19:18:35 UTC 2023 selfserv_9887 with PID 2991 started at Mon Mar 20 19:18:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2991 at Mon Mar 20 19:18:35 UTC 2023 kill -USR1 2991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2991 killed at Mon Mar 20 19:18:35 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3030 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3030 found at Mon Mar 20 19:18:35 UTC 2023 selfserv_9887 with PID 3030 started at Mon Mar 20 19:18:35 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3030 at Mon Mar 20 19:18:36 UTC 2023 kill -USR1 3030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3030 killed at Mon Mar 20 19:18:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3070 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3070 found at Mon Mar 20 19:18:36 UTC 2023 selfserv_9887 with PID 3070 started at Mon Mar 20 19:18:36 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3070 at Mon Mar 20 19:18:36 UTC 2023 kill -USR1 3070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3070 killed at Mon Mar 20 19:18:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3110 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3110 found at Mon Mar 20 19:18:36 UTC 2023 selfserv_9887 with PID 3110 started at Mon Mar 20 19:18:36 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3110 at Mon Mar 20 19:18:36 UTC 2023 kill -USR1 3110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3110 killed at Mon Mar 20 19:18:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3151 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3151 found at Mon Mar 20 19:18:37 UTC 2023 selfserv_9887 with PID 3151 started at Mon Mar 20 19:18:37 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3151 at Mon Mar 20 19:18:37 UTC 2023 kill -USR1 3151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3151 killed at Mon Mar 20 19:18:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3191 found at Mon Mar 20 19:18:37 UTC 2023 selfserv_9887 with PID 3191 started at Mon Mar 20 19:18:37 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3191 at Mon Mar 20 19:18:37 UTC 2023 kill -USR1 3191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3191 killed at Mon Mar 20 19:18:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3231 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3231 found at Mon Mar 20 19:18:37 UTC 2023 selfserv_9887 with PID 3231 started at Mon Mar 20 19:18:37 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3231 at Mon Mar 20 19:18:37 UTC 2023 kill -USR1 3231 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3231 killed at Mon Mar 20 19:18:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3271 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3271 found at Mon Mar 20 19:18:38 UTC 2023 selfserv_9887 with PID 3271 started at Mon Mar 20 19:18:38 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3271 at Mon Mar 20 19:18:38 UTC 2023 kill -USR1 3271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3271 killed at Mon Mar 20 19:18:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3311 found at Mon Mar 20 19:18:38 UTC 2023 selfserv_9887 with PID 3311 started at Mon Mar 20 19:18:38 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3311 at Mon Mar 20 19:18:38 UTC 2023 kill -USR1 3311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3311 killed at Mon Mar 20 19:18:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:18:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3351 found at Mon Mar 20 19:18:38 UTC 2023 selfserv_9887 with PID 3351 started at Mon Mar 20 19:18:38 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3351 at Mon Mar 20 19:18:38 UTC 2023 kill -USR1 3351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3351 killed at Mon Mar 20 19:18:39 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 19:18:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 3435 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3435 found at Mon Mar 20 19:18:39 UTC 2023 selfserv_9887 with PID 3435 started at Mon Mar 20 19:18:39 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 3435 at Mon Mar 20 19:18:45 UTC 2023 kill -USR1 3435 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3435 killed at Mon Mar 20 19:18:45 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 19:18:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 4022 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4022 found at Mon Mar 20 19:18:45 UTC 2023 selfserv_9887 with PID 4022 started at Mon Mar 20 19:18:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4022 at Mon Mar 20 19:18:59 UTC 2023 kill -USR1 4022 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4022 killed at Mon Mar 20 19:18:59 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 19:18:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4825 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4825 found at Mon Mar 20 19:18:59 UTC 2023 selfserv_9887 with PID 4825 started at Mon Mar 20 19:18:59 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4825 at Mon Mar 20 19:18:59 UTC 2023 kill -USR1 4825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4825 killed at Mon Mar 20 19:18:59 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:18:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:18:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4891 found at Mon Mar 20 19:18:59 UTC 2023 selfserv_9887 with PID 4891 started at Mon Mar 20 19:18:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4891 at Mon Mar 20 19:19:00 UTC 2023 kill -USR1 4891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4891 killed at Mon Mar 20 19:19:00 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4944 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4944 found at Mon Mar 20 19:19:00 UTC 2023 selfserv_9887 with PID 4944 started at Mon Mar 20 19:19:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4944 at Mon Mar 20 19:19:00 UTC 2023 kill -USR1 4944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4944 killed at Mon Mar 20 19:19:01 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4996 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4996 found at Mon Mar 20 19:19:01 UTC 2023 selfserv_9887 with PID 4996 started at Mon Mar 20 19:19:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4996 at Mon Mar 20 19:19:01 UTC 2023 kill -USR1 4996 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4996 killed at Mon Mar 20 19:19:01 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5048 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5048 found at Mon Mar 20 19:19:01 UTC 2023 selfserv_9887 with PID 5048 started at Mon Mar 20 19:19:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5048 at Mon Mar 20 19:19:02 UTC 2023 kill -USR1 5048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5048 killed at Mon Mar 20 19:19:02 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5100 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5100 found at Mon Mar 20 19:19:02 UTC 2023 selfserv_9887 with PID 5100 started at Mon Mar 20 19:19:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5100 at Mon Mar 20 19:19:02 UTC 2023 kill -USR1 5100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5100 killed at Mon Mar 20 19:19:02 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5152 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5152 found at Mon Mar 20 19:19:03 UTC 2023 selfserv_9887 with PID 5152 started at Mon Mar 20 19:19:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5152 at Mon Mar 20 19:19:03 UTC 2023 kill -USR1 5152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5152 killed at Mon Mar 20 19:19:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5204 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5204 found at Mon Mar 20 19:19:03 UTC 2023 selfserv_9887 with PID 5204 started at Mon Mar 20 19:19:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5204 at Mon Mar 20 19:19:03 UTC 2023 kill -USR1 5204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5204 killed at Mon Mar 20 19:19:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5256 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5256 found at Mon Mar 20 19:19:04 UTC 2023 selfserv_9887 with PID 5256 started at Mon Mar 20 19:19:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5256 at Mon Mar 20 19:19:04 UTC 2023 kill -USR1 5256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5256 killed at Mon Mar 20 19:19:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5308 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5308 found at Mon Mar 20 19:19:04 UTC 2023 selfserv_9887 with PID 5308 started at Mon Mar 20 19:19:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5308 at Mon Mar 20 19:19:04 UTC 2023 kill -USR1 5308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5308 killed at Mon Mar 20 19:19:04 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5362 found at Mon Mar 20 19:19:05 UTC 2023 selfserv_9887 with PID 5362 started at Mon Mar 20 19:19:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5362 at Mon Mar 20 19:19:05 UTC 2023 kill -USR1 5362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5362 killed at Mon Mar 20 19:19:05 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5415 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5415 found at Mon Mar 20 19:19:05 UTC 2023 selfserv_9887 with PID 5415 started at Mon Mar 20 19:19:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5415 at Mon Mar 20 19:19:05 UTC 2023 kill -USR1 5415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5415 killed at Mon Mar 20 19:19:05 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5467 found at Mon Mar 20 19:19:06 UTC 2023 selfserv_9887 with PID 5467 started at Mon Mar 20 19:19:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5467 at Mon Mar 20 19:19:06 UTC 2023 kill -USR1 5467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5467 killed at Mon Mar 20 19:19:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5519 found at Mon Mar 20 19:19:06 UTC 2023 selfserv_9887 with PID 5519 started at Mon Mar 20 19:19:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5519 at Mon Mar 20 19:19:07 UTC 2023 kill -USR1 5519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5519 killed at Mon Mar 20 19:19:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5571 found at Mon Mar 20 19:19:07 UTC 2023 selfserv_9887 with PID 5571 started at Mon Mar 20 19:19:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5571 at Mon Mar 20 19:19:07 UTC 2023 kill -USR1 5571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5571 killed at Mon Mar 20 19:19:08 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5623 found at Mon Mar 20 19:19:08 UTC 2023 selfserv_9887 with PID 5623 started at Mon Mar 20 19:19:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5623 at Mon Mar 20 19:19:08 UTC 2023 kill -USR1 5623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5623 killed at Mon Mar 20 19:19:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5675 found at Mon Mar 20 19:19:09 UTC 2023 selfserv_9887 with PID 5675 started at Mon Mar 20 19:19:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5675 at Mon Mar 20 19:19:09 UTC 2023 kill -USR1 5675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5675 killed at Mon Mar 20 19:19:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5727 found at Mon Mar 20 19:19:09 UTC 2023 selfserv_9887 with PID 5727 started at Mon Mar 20 19:19:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5727 at Mon Mar 20 19:19:10 UTC 2023 kill -USR1 5727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5727 killed at Mon Mar 20 19:19:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5779 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5779 found at Mon Mar 20 19:19:10 UTC 2023 selfserv_9887 with PID 5779 started at Mon Mar 20 19:19:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5779 at Mon Mar 20 19:19:11 UTC 2023 kill -USR1 5779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5779 killed at Mon Mar 20 19:19:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5831 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5831 found at Mon Mar 20 19:19:11 UTC 2023 selfserv_9887 with PID 5831 started at Mon Mar 20 19:19:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5831 at Mon Mar 20 19:19:12 UTC 2023 kill -USR1 5831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5831 killed at Mon Mar 20 19:19:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5883 found at Mon Mar 20 19:19:12 UTC 2023 selfserv_9887 with PID 5883 started at Mon Mar 20 19:19:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5883 at Mon Mar 20 19:19:13 UTC 2023 kill -USR1 5883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5883 killed at Mon Mar 20 19:19:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5935 found at Mon Mar 20 19:19:13 UTC 2023 selfserv_9887 with PID 5935 started at Mon Mar 20 19:19:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5935 at Mon Mar 20 19:19:13 UTC 2023 kill -USR1 5935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5935 killed at Mon Mar 20 19:19:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5987 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5987 found at Mon Mar 20 19:19:14 UTC 2023 selfserv_9887 with PID 5987 started at Mon Mar 20 19:19:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5987 at Mon Mar 20 19:19:14 UTC 2023 kill -USR1 5987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5987 killed at Mon Mar 20 19:19:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6039 found at Mon Mar 20 19:19:15 UTC 2023 selfserv_9887 with PID 6039 started at Mon Mar 20 19:19:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6039 at Mon Mar 20 19:19:15 UTC 2023 kill -USR1 6039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6039 killed at Mon Mar 20 19:19:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6091 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6091 found at Mon Mar 20 19:19:15 UTC 2023 selfserv_9887 with PID 6091 started at Mon Mar 20 19:19:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6091 at Mon Mar 20 19:19:16 UTC 2023 kill -USR1 6091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6091 killed at Mon Mar 20 19:19:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6143 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6143 found at Mon Mar 20 19:19:16 UTC 2023 selfserv_9887 with PID 6143 started at Mon Mar 20 19:19:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6143 at Mon Mar 20 19:19:16 UTC 2023 kill -USR1 6143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6143 killed at Mon Mar 20 19:19:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6195 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6195 found at Mon Mar 20 19:19:17 UTC 2023 selfserv_9887 with PID 6195 started at Mon Mar 20 19:19:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6195 at Mon Mar 20 19:19:17 UTC 2023 kill -USR1 6195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6195 killed at Mon Mar 20 19:19:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6258 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6258 found at Mon Mar 20 19:19:17 UTC 2023 selfserv_9887 with PID 6258 started at Mon Mar 20 19:19:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6258 at Mon Mar 20 19:19:18 UTC 2023 kill -USR1 6258 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6258 killed at Mon Mar 20 19:19:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6311 found at Mon Mar 20 19:19:18 UTC 2023 selfserv_9887 with PID 6311 started at Mon Mar 20 19:19:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6311 at Mon Mar 20 19:19:18 UTC 2023 kill -USR1 6311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6311 killed at Mon Mar 20 19:19:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6366 found at Mon Mar 20 19:19:18 UTC 2023 selfserv_9887 with PID 6366 started at Mon Mar 20 19:19:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6366 at Mon Mar 20 19:19:19 UTC 2023 kill -USR1 6366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6366 killed at Mon Mar 20 19:19:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6418 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6418 found at Mon Mar 20 19:19:19 UTC 2023 selfserv_9887 with PID 6418 started at Mon Mar 20 19:19:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6418 at Mon Mar 20 19:19:19 UTC 2023 kill -USR1 6418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6418 killed at Mon Mar 20 19:19:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6475 found at Mon Mar 20 19:19:19 UTC 2023 selfserv_9887 with PID 6475 started at Mon Mar 20 19:19:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6475 at Mon Mar 20 19:19:20 UTC 2023 kill -USR1 6475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6475 killed at Mon Mar 20 19:19:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6532 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6532 found at Mon Mar 20 19:19:20 UTC 2023 selfserv_9887 with PID 6532 started at Mon Mar 20 19:19:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6532 at Mon Mar 20 19:19:20 UTC 2023 kill -USR1 6532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6532 killed at Mon Mar 20 19:19:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6586 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6586 found at Mon Mar 20 19:19:20 UTC 2023 selfserv_9887 with PID 6586 started at Mon Mar 20 19:19:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6586 at Mon Mar 20 19:19:20 UTC 2023 kill -USR1 6586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6586 killed at Mon Mar 20 19:19:21 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6649 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6649 found at Mon Mar 20 19:19:21 UTC 2023 selfserv_9887 with PID 6649 started at Mon Mar 20 19:19:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6649 at Mon Mar 20 19:19:21 UTC 2023 kill -USR1 6649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6649 killed at Mon Mar 20 19:19:21 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6704 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6704 found at Mon Mar 20 19:19:21 UTC 2023 selfserv_9887 with PID 6704 started at Mon Mar 20 19:19:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6704 at Mon Mar 20 19:19:21 UTC 2023 kill -USR1 6704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6704 killed at Mon Mar 20 19:19:21 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6758 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6758 found at Mon Mar 20 19:19:22 UTC 2023 selfserv_9887 with PID 6758 started at Mon Mar 20 19:19:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6758 at Mon Mar 20 19:19:22 UTC 2023 kill -USR1 6758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6758 killed at Mon Mar 20 19:19:22 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6811 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6811 found at Mon Mar 20 19:19:22 UTC 2023 selfserv_9887 with PID 6811 started at Mon Mar 20 19:19:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6811 at Mon Mar 20 19:19:22 UTC 2023 kill -USR1 6811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6811 killed at Mon Mar 20 19:19:23 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6864 found at Mon Mar 20 19:19:23 UTC 2023 selfserv_9887 with PID 6864 started at Mon Mar 20 19:19:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6864 at Mon Mar 20 19:19:23 UTC 2023 kill -USR1 6864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6864 killed at Mon Mar 20 19:19:23 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6916 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6916 found at Mon Mar 20 19:19:23 UTC 2023 selfserv_9887 with PID 6916 started at Mon Mar 20 19:19:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6916 at Mon Mar 20 19:19:24 UTC 2023 kill -USR1 6916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6916 killed at Mon Mar 20 19:19:24 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6970 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6970 found at Mon Mar 20 19:19:24 UTC 2023 selfserv_9887 with PID 6970 started at Mon Mar 20 19:19:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6970 at Mon Mar 20 19:19:24 UTC 2023 kill -USR1 6970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6970 killed at Mon Mar 20 19:19:25 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7023 found at Mon Mar 20 19:19:25 UTC 2023 selfserv_9887 with PID 7023 started at Mon Mar 20 19:19:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7023 at Mon Mar 20 19:19:25 UTC 2023 kill -USR1 7023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7023 killed at Mon Mar 20 19:19:25 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7077 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7077 found at Mon Mar 20 19:19:25 UTC 2023 selfserv_9887 with PID 7077 started at Mon Mar 20 19:19:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7077 at Mon Mar 20 19:19:25 UTC 2023 kill -USR1 7077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7077 killed at Mon Mar 20 19:19:25 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7129 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7129 found at Mon Mar 20 19:19:26 UTC 2023 selfserv_9887 with PID 7129 started at Mon Mar 20 19:19:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7129 at Mon Mar 20 19:19:26 UTC 2023 kill -USR1 7129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7129 killed at Mon Mar 20 19:19:26 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7181 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7181 found at Mon Mar 20 19:19:26 UTC 2023 selfserv_9887 with PID 7181 started at Mon Mar 20 19:19:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7181 at Mon Mar 20 19:19:26 UTC 2023 kill -USR1 7181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7181 killed at Mon Mar 20 19:19:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7233 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7233 found at Mon Mar 20 19:19:27 UTC 2023 selfserv_9887 with PID 7233 started at Mon Mar 20 19:19:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7233 at Mon Mar 20 19:19:27 UTC 2023 kill -USR1 7233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7233 killed at Mon Mar 20 19:19:27 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7285 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7285 found at Mon Mar 20 19:19:27 UTC 2023 selfserv_9887 with PID 7285 started at Mon Mar 20 19:19:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7285 at Mon Mar 20 19:19:28 UTC 2023 kill -USR1 7285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7285 killed at Mon Mar 20 19:19:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7337 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7337 found at Mon Mar 20 19:19:28 UTC 2023 selfserv_9887 with PID 7337 started at Mon Mar 20 19:19:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7337 at Mon Mar 20 19:19:29 UTC 2023 kill -USR1 7337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7337 killed at Mon Mar 20 19:19:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7389 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7389 found at Mon Mar 20 19:19:29 UTC 2023 selfserv_9887 with PID 7389 started at Mon Mar 20 19:19:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7389 at Mon Mar 20 19:19:30 UTC 2023 kill -USR1 7389 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7389 killed at Mon Mar 20 19:19:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7441 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7441 found at Mon Mar 20 19:19:30 UTC 2023 selfserv_9887 with PID 7441 started at Mon Mar 20 19:19:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7441 at Mon Mar 20 19:19:31 UTC 2023 kill -USR1 7441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7441 killed at Mon Mar 20 19:19:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7494 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7494 found at Mon Mar 20 19:19:31 UTC 2023 selfserv_9887 with PID 7494 started at Mon Mar 20 19:19:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7494 at Mon Mar 20 19:19:31 UTC 2023 kill -USR1 7494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7494 killed at Mon Mar 20 19:19:32 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7547 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7547 found at Mon Mar 20 19:19:32 UTC 2023 selfserv_9887 with PID 7547 started at Mon Mar 20 19:19:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7547 at Mon Mar 20 19:19:32 UTC 2023 kill -USR1 7547 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7547 killed at Mon Mar 20 19:19:32 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7601 found at Mon Mar 20 19:19:32 UTC 2023 selfserv_9887 with PID 7601 started at Mon Mar 20 19:19:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7601 at Mon Mar 20 19:19:33 UTC 2023 kill -USR1 7601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7601 killed at Mon Mar 20 19:19:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7653 found at Mon Mar 20 19:19:33 UTC 2023 selfserv_9887 with PID 7653 started at Mon Mar 20 19:19:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7653 at Mon Mar 20 19:19:34 UTC 2023 kill -USR1 7653 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7653 killed at Mon Mar 20 19:19:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7705 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7705 found at Mon Mar 20 19:19:34 UTC 2023 selfserv_9887 with PID 7705 started at Mon Mar 20 19:19:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7705 at Mon Mar 20 19:19:34 UTC 2023 kill -USR1 7705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7705 killed at Mon Mar 20 19:19:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:19:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7759 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7759 found at Mon Mar 20 19:19:34 UTC 2023 selfserv_9887 with PID 7759 started at Mon Mar 20 19:19:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7759 at Mon Mar 20 19:19:35 UTC 2023 kill -USR1 7759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7759 killed at Mon Mar 20 19:19:35 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7813 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7813 found at Mon Mar 20 19:19:35 UTC 2023 selfserv_9887 with PID 7813 started at Mon Mar 20 19:19:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7813 at Mon Mar 20 19:19:35 UTC 2023 kill -USR1 7813 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7813 killed at Mon Mar 20 19:19:35 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7866 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7866 found at Mon Mar 20 19:19:36 UTC 2023 selfserv_9887 with PID 7866 started at Mon Mar 20 19:19:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7866 at Mon Mar 20 19:19:36 UTC 2023 kill -USR1 7866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7866 killed at Mon Mar 20 19:19:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:19:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7919 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7919 found at Mon Mar 20 19:19:36 UTC 2023 selfserv_9887 with PID 7919 started at Mon Mar 20 19:19:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7919 at Mon Mar 20 19:19:37 UTC 2023 kill -USR1 7919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7919 killed at Mon Mar 20 19:19:37 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:19:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7979 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7979 found at Mon Mar 20 19:19:37 UTC 2023 selfserv_9887 with PID 7979 started at Mon Mar 20 19:19:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7979 at Mon Mar 20 19:19:37 UTC 2023 kill -USR1 7979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7979 killed at Mon Mar 20 19:19:37 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 19:19:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8038 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8038 found at Mon Mar 20 19:19:37 UTC 2023 selfserv_9887 with PID 8038 started at Mon Mar 20 19:19:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8038 at Mon Mar 20 19:19:37 UTC 2023 kill -USR1 8038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8038 killed at Mon Mar 20 19:19:37 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 19:19:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8098 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8098 found at Mon Mar 20 19:19:38 UTC 2023 selfserv_9887 with PID 8098 started at Mon Mar 20 19:19:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8098 at Mon Mar 20 19:19:38 UTC 2023 kill -USR1 8098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8098 killed at Mon Mar 20 19:19:38 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:19:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8156 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8156 found at Mon Mar 20 19:19:38 UTC 2023 selfserv_9887 with PID 8156 started at Mon Mar 20 19:19:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8156 at Mon Mar 20 19:19:38 UTC 2023 kill -USR1 8156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8156 killed at Mon Mar 20 19:19:38 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 19:19:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8215 found at Mon Mar 20 19:19:38 UTC 2023 selfserv_9887 with PID 8215 started at Mon Mar 20 19:19:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8215 at Mon Mar 20 19:19:39 UTC 2023 kill -USR1 8215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8215 killed at Mon Mar 20 19:19:39 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:19:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8273 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8273 found at Mon Mar 20 19:19:39 UTC 2023 selfserv_9887 with PID 8273 started at Mon Mar 20 19:19:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8273 at Mon Mar 20 19:19:39 UTC 2023 kill -USR1 8273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8273 killed at Mon Mar 20 19:19:39 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 19:19:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8333 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8333 found at Mon Mar 20 19:19:39 UTC 2023 selfserv_9887 with PID 8333 started at Mon Mar 20 19:19:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8333 at Mon Mar 20 19:19:39 UTC 2023 kill -USR1 8333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8333 killed at Mon Mar 20 19:19:39 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 19:19:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8391 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8391 found at Mon Mar 20 19:19:40 UTC 2023 selfserv_9887 with PID 8391 started at Mon Mar 20 19:19:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8391 at Mon Mar 20 19:19:40 UTC 2023 kill -USR1 8391 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8391 killed at Mon Mar 20 19:19:40 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 19:19:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8449 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8449 found at Mon Mar 20 19:19:40 UTC 2023 selfserv_9887 with PID 8449 started at Mon Mar 20 19:19:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8449 at Mon Mar 20 19:19:40 UTC 2023 kill -USR1 8449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8449 killed at Mon Mar 20 19:19:40 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 19:19:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8522 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8522 found at Mon Mar 20 19:19:40 UTC 2023 selfserv_9887 with PID 8522 started at Mon Mar 20 19:19:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8522 at Mon Mar 20 19:19:40 UTC 2023 kill -USR1 8522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8522 killed at Mon Mar 20 19:19:41 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 19:19:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8564 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8564 found at Mon Mar 20 19:19:41 UTC 2023 selfserv_9887 with PID 8564 started at Mon Mar 20 19:19:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8564 at Mon Mar 20 19:19:41 UTC 2023 kill -USR1 8564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8564 killed at Mon Mar 20 19:19:41 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 19:19:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8606 found at Mon Mar 20 19:19:41 UTC 2023 selfserv_9887 with PID 8606 started at Mon Mar 20 19:19:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 8606 at Mon Mar 20 19:19:41 UTC 2023 kill -USR1 8606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8606 killed at Mon Mar 20 19:19:41 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 19:19:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8648 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8648 found at Mon Mar 20 19:19:41 UTC 2023 selfserv_9887 with PID 8648 started at Mon Mar 20 19:19:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 8648 at Mon Mar 20 19:19:42 UTC 2023 kill -USR1 8648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8648 killed at Mon Mar 20 19:19:42 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 19:19:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8690 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8690 found at Mon Mar 20 19:19:42 UTC 2023 selfserv_9887 with PID 8690 started at Mon Mar 20 19:19:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 8690 at Mon Mar 20 19:19:42 UTC 2023 kill -USR1 8690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8690 killed at Mon Mar 20 19:19:42 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 19:19:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8732 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8732 found at Mon Mar 20 19:19:42 UTC 2023 selfserv_9887 with PID 8732 started at Mon Mar 20 19:19:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 8732 at Mon Mar 20 19:19:42 UTC 2023 kill -USR1 8732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8732 killed at Mon Mar 20 19:19:42 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 19:19:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8774 found at Mon Mar 20 19:19:43 UTC 2023 selfserv_9887 with PID 8774 started at Mon Mar 20 19:19:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 8774 at Mon Mar 20 19:19:43 UTC 2023 kill -USR1 8774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8774 killed at Mon Mar 20 19:19:43 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 19:19:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8816 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8816 found at Mon Mar 20 19:19:43 UTC 2023 selfserv_9887 with PID 8816 started at Mon Mar 20 19:19:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 8816 at Mon Mar 20 19:19:43 UTC 2023 kill -USR1 8816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8816 killed at Mon Mar 20 19:19:43 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 19:19:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:19:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8858 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8858 found at Mon Mar 20 19:19:43 UTC 2023 selfserv_9887 with PID 8858 started at Mon Mar 20 19:19:43 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 19:19:43 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 19:20:55 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 8858 at Mon Mar 20 19:20:55 UTC 2023 kill -USR1 8858 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8858 killed at Mon Mar 20 19:20:55 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 19:20:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8924 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8924 found at Mon Mar 20 19:20:55 UTC 2023 selfserv_9887 with PID 8924 started at Mon Mar 20 19:20:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8924 at Mon Mar 20 19:20:55 UTC 2023 kill -USR1 8924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8924 killed at Mon Mar 20 19:20:55 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8967 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8967 found at Mon Mar 20 19:20:56 UTC 2023 selfserv_9887 with PID 8967 started at Mon Mar 20 19:20:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8967 at Mon Mar 20 19:20:56 UTC 2023 kill -USR1 8967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8967 killed at Mon Mar 20 19:20:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9006 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9006 found at Mon Mar 20 19:20:56 UTC 2023 selfserv_9887 with PID 9006 started at Mon Mar 20 19:20:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9006 at Mon Mar 20 19:20:56 UTC 2023 kill -USR1 9006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9006 killed at Mon Mar 20 19:20:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9045 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9045 found at Mon Mar 20 19:20:56 UTC 2023 selfserv_9887 with PID 9045 started at Mon Mar 20 19:20:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9045 at Mon Mar 20 19:20:56 UTC 2023 kill -USR1 9045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9045 killed at Mon Mar 20 19:20:56 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9084 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9084 found at Mon Mar 20 19:20:57 UTC 2023 selfserv_9887 with PID 9084 started at Mon Mar 20 19:20:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 9084 at Mon Mar 20 19:20:57 UTC 2023 kill -USR1 9084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9084 killed at Mon Mar 20 19:20:57 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9123 found at Mon Mar 20 19:20:57 UTC 2023 selfserv_9887 with PID 9123 started at Mon Mar 20 19:20:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9123 at Mon Mar 20 19:20:57 UTC 2023 kill -USR1 9123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9123 killed at Mon Mar 20 19:20:57 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9162 found at Mon Mar 20 19:20:57 UTC 2023 selfserv_9887 with PID 9162 started at Mon Mar 20 19:20:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9162 at Mon Mar 20 19:20:57 UTC 2023 kill -USR1 9162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9162 killed at Mon Mar 20 19:20:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9201 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9201 found at Mon Mar 20 19:20:58 UTC 2023 selfserv_9887 with PID 9201 started at Mon Mar 20 19:20:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9201 at Mon Mar 20 19:20:58 UTC 2023 kill -USR1 9201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9201 killed at Mon Mar 20 19:20:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9240 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9240 found at Mon Mar 20 19:20:58 UTC 2023 selfserv_9887 with PID 9240 started at Mon Mar 20 19:20:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9240 at Mon Mar 20 19:20:58 UTC 2023 kill -USR1 9240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9240 killed at Mon Mar 20 19:20:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9279 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9279 found at Mon Mar 20 19:20:58 UTC 2023 selfserv_9887 with PID 9279 started at Mon Mar 20 19:20:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9279 at Mon Mar 20 19:20:59 UTC 2023 kill -USR1 9279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9279 killed at Mon Mar 20 19:20:59 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9318 found at Mon Mar 20 19:20:59 UTC 2023 selfserv_9887 with PID 9318 started at Mon Mar 20 19:20:59 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9318 at Mon Mar 20 19:20:59 UTC 2023 kill -USR1 9318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9318 killed at Mon Mar 20 19:20:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9359 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9359 found at Mon Mar 20 19:20:59 UTC 2023 selfserv_9887 with PID 9359 started at Mon Mar 20 19:20:59 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9359 at Mon Mar 20 19:20:59 UTC 2023 kill -USR1 9359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9359 killed at Mon Mar 20 19:20:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:20:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:20:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9399 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9399 found at Mon Mar 20 19:21:00 UTC 2023 selfserv_9887 with PID 9399 started at Mon Mar 20 19:21:00 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9399 at Mon Mar 20 19:21:00 UTC 2023 kill -USR1 9399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9399 killed at Mon Mar 20 19:21:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9439 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9439 found at Mon Mar 20 19:21:00 UTC 2023 selfserv_9887 with PID 9439 started at Mon Mar 20 19:21:00 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9439 at Mon Mar 20 19:21:00 UTC 2023 kill -USR1 9439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9439 killed at Mon Mar 20 19:21:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9479 found at Mon Mar 20 19:21:00 UTC 2023 selfserv_9887 with PID 9479 started at Mon Mar 20 19:21:00 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9479 at Mon Mar 20 19:21:00 UTC 2023 kill -USR1 9479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9479 killed at Mon Mar 20 19:21:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9519 found at Mon Mar 20 19:21:01 UTC 2023 selfserv_9887 with PID 9519 started at Mon Mar 20 19:21:01 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9519 at Mon Mar 20 19:21:01 UTC 2023 kill -USR1 9519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9519 killed at Mon Mar 20 19:21:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9559 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9559 found at Mon Mar 20 19:21:01 UTC 2023 selfserv_9887 with PID 9559 started at Mon Mar 20 19:21:01 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9559 at Mon Mar 20 19:21:01 UTC 2023 kill -USR1 9559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9559 killed at Mon Mar 20 19:21:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9599 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9599 found at Mon Mar 20 19:21:01 UTC 2023 selfserv_9887 with PID 9599 started at Mon Mar 20 19:21:01 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9599 at Mon Mar 20 19:21:01 UTC 2023 kill -USR1 9599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9599 killed at Mon Mar 20 19:21:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9639 found at Mon Mar 20 19:21:02 UTC 2023 selfserv_9887 with PID 9639 started at Mon Mar 20 19:21:02 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9639 at Mon Mar 20 19:21:02 UTC 2023 kill -USR1 9639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9639 killed at Mon Mar 20 19:21:02 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 19:21:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 9679 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9679 found at Mon Mar 20 19:21:02 UTC 2023 selfserv_9887 with PID 9679 started at Mon Mar 20 19:21:02 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 9679 at Mon Mar 20 19:21:08 UTC 2023 kill -USR1 9679 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9679 killed at Mon Mar 20 19:21:08 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 19:21:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 10230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10230 found at Mon Mar 20 19:21:08 UTC 2023 selfserv_9887 with PID 10230 started at Mon Mar 20 19:21:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10230 at Mon Mar 20 19:21:18 UTC 2023 kill -USR1 10230 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10230 killed at Mon Mar 20 19:21:18 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11041 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11041 found at Mon Mar 20 19:21:18 UTC 2023 selfserv_9887 with PID 11041 started at Mon Mar 20 19:21:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11041 at Mon Mar 20 19:21:18 UTC 2023 kill -USR1 11041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11041 killed at Mon Mar 20 19:21:19 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11093 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11093 found at Mon Mar 20 19:21:19 UTC 2023 selfserv_9887 with PID 11093 started at Mon Mar 20 19:21:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11093 at Mon Mar 20 19:21:19 UTC 2023 kill -USR1 11093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11093 killed at Mon Mar 20 19:21:19 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11145 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11145 found at Mon Mar 20 19:21:19 UTC 2023 selfserv_9887 with PID 11145 started at Mon Mar 20 19:21:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11145 at Mon Mar 20 19:21:19 UTC 2023 kill -USR1 11145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11145 killed at Mon Mar 20 19:21:19 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11197 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11197 found at Mon Mar 20 19:21:20 UTC 2023 selfserv_9887 with PID 11197 started at Mon Mar 20 19:21:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11197 at Mon Mar 20 19:21:20 UTC 2023 kill -USR1 11197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11197 killed at Mon Mar 20 19:21:20 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11249 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11249 found at Mon Mar 20 19:21:20 UTC 2023 selfserv_9887 with PID 11249 started at Mon Mar 20 19:21:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11249 at Mon Mar 20 19:21:20 UTC 2023 kill -USR1 11249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11249 killed at Mon Mar 20 19:21:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11301 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11301 found at Mon Mar 20 19:21:20 UTC 2023 selfserv_9887 with PID 11301 started at Mon Mar 20 19:21:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11301 at Mon Mar 20 19:21:21 UTC 2023 kill -USR1 11301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11301 killed at Mon Mar 20 19:21:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11353 found at Mon Mar 20 19:21:21 UTC 2023 selfserv_9887 with PID 11353 started at Mon Mar 20 19:21:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11353 at Mon Mar 20 19:21:21 UTC 2023 kill -USR1 11353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11353 killed at Mon Mar 20 19:21:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11405 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11405 found at Mon Mar 20 19:21:21 UTC 2023 selfserv_9887 with PID 11405 started at Mon Mar 20 19:21:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11405 at Mon Mar 20 19:21:22 UTC 2023 kill -USR1 11405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11405 killed at Mon Mar 20 19:21:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11457 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11457 found at Mon Mar 20 19:21:22 UTC 2023 selfserv_9887 with PID 11457 started at Mon Mar 20 19:21:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11457 at Mon Mar 20 19:21:22 UTC 2023 kill -USR1 11457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11457 killed at Mon Mar 20 19:21:22 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11510 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11510 found at Mon Mar 20 19:21:22 UTC 2023 selfserv_9887 with PID 11510 started at Mon Mar 20 19:21:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11510 at Mon Mar 20 19:21:22 UTC 2023 kill -USR1 11510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11510 killed at Mon Mar 20 19:21:23 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11562 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11562 found at Mon Mar 20 19:21:23 UTC 2023 selfserv_9887 with PID 11562 started at Mon Mar 20 19:21:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11562 at Mon Mar 20 19:21:23 UTC 2023 kill -USR1 11562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11562 killed at Mon Mar 20 19:21:23 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11614 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11614 found at Mon Mar 20 19:21:23 UTC 2023 selfserv_9887 with PID 11614 started at Mon Mar 20 19:21:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11614 at Mon Mar 20 19:21:23 UTC 2023 kill -USR1 11614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11614 killed at Mon Mar 20 19:21:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11666 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11666 found at Mon Mar 20 19:21:24 UTC 2023 selfserv_9887 with PID 11666 started at Mon Mar 20 19:21:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11666 at Mon Mar 20 19:21:24 UTC 2023 kill -USR1 11666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11666 killed at Mon Mar 20 19:21:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11718 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11718 found at Mon Mar 20 19:21:24 UTC 2023 selfserv_9887 with PID 11718 started at Mon Mar 20 19:21:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11718 at Mon Mar 20 19:21:24 UTC 2023 kill -USR1 11718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11718 killed at Mon Mar 20 19:21:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11771 found at Mon Mar 20 19:21:25 UTC 2023 selfserv_9887 with PID 11771 started at Mon Mar 20 19:21:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11771 at Mon Mar 20 19:21:25 UTC 2023 kill -USR1 11771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11771 killed at Mon Mar 20 19:21:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11823 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11823 found at Mon Mar 20 19:21:25 UTC 2023 selfserv_9887 with PID 11823 started at Mon Mar 20 19:21:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11823 at Mon Mar 20 19:21:25 UTC 2023 kill -USR1 11823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11823 killed at Mon Mar 20 19:21:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11875 found at Mon Mar 20 19:21:26 UTC 2023 selfserv_9887 with PID 11875 started at Mon Mar 20 19:21:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11875 at Mon Mar 20 19:21:26 UTC 2023 kill -USR1 11875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11875 killed at Mon Mar 20 19:21:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11927 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11927 found at Mon Mar 20 19:21:26 UTC 2023 selfserv_9887 with PID 11927 started at Mon Mar 20 19:21:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11927 at Mon Mar 20 19:21:26 UTC 2023 kill -USR1 11927 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11927 killed at Mon Mar 20 19:21:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11979 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11979 found at Mon Mar 20 19:21:27 UTC 2023 selfserv_9887 with PID 11979 started at Mon Mar 20 19:21:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11979 at Mon Mar 20 19:21:27 UTC 2023 kill -USR1 11979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11979 killed at Mon Mar 20 19:21:27 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12031 found at Mon Mar 20 19:21:27 UTC 2023 selfserv_9887 with PID 12031 started at Mon Mar 20 19:21:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12031 at Mon Mar 20 19:21:27 UTC 2023 kill -USR1 12031 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12031 killed at Mon Mar 20 19:21:27 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12083 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12083 found at Mon Mar 20 19:21:28 UTC 2023 selfserv_9887 with PID 12083 started at Mon Mar 20 19:21:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12083 at Mon Mar 20 19:21:28 UTC 2023 kill -USR1 12083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12083 killed at Mon Mar 20 19:21:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12135 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12135 found at Mon Mar 20 19:21:28 UTC 2023 selfserv_9887 with PID 12135 started at Mon Mar 20 19:21:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12135 at Mon Mar 20 19:21:28 UTC 2023 kill -USR1 12135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12135 killed at Mon Mar 20 19:21:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12187 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12187 found at Mon Mar 20 19:21:29 UTC 2023 selfserv_9887 with PID 12187 started at Mon Mar 20 19:21:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12187 at Mon Mar 20 19:21:29 UTC 2023 kill -USR1 12187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12187 killed at Mon Mar 20 19:21:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12239 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12239 found at Mon Mar 20 19:21:29 UTC 2023 selfserv_9887 with PID 12239 started at Mon Mar 20 19:21:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12239 at Mon Mar 20 19:21:29 UTC 2023 kill -USR1 12239 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12239 killed at Mon Mar 20 19:21:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12291 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12291 found at Mon Mar 20 19:21:30 UTC 2023 selfserv_9887 with PID 12291 started at Mon Mar 20 19:21:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12291 at Mon Mar 20 19:21:30 UTC 2023 kill -USR1 12291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12291 killed at Mon Mar 20 19:21:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12343 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12343 found at Mon Mar 20 19:21:30 UTC 2023 selfserv_9887 with PID 12343 started at Mon Mar 20 19:21:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12343 at Mon Mar 20 19:21:30 UTC 2023 kill -USR1 12343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12343 killed at Mon Mar 20 19:21:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12395 found at Mon Mar 20 19:21:31 UTC 2023 selfserv_9887 with PID 12395 started at Mon Mar 20 19:21:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12395 at Mon Mar 20 19:21:31 UTC 2023 kill -USR1 12395 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12395 killed at Mon Mar 20 19:21:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12447 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12447 found at Mon Mar 20 19:21:31 UTC 2023 selfserv_9887 with PID 12447 started at Mon Mar 20 19:21:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12447 at Mon Mar 20 19:21:31 UTC 2023 kill -USR1 12447 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12447 killed at Mon Mar 20 19:21:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12499 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12499 found at Mon Mar 20 19:21:32 UTC 2023 selfserv_9887 with PID 12499 started at Mon Mar 20 19:21:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12499 at Mon Mar 20 19:21:32 UTC 2023 kill -USR1 12499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12499 killed at Mon Mar 20 19:21:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12551 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12551 found at Mon Mar 20 19:21:32 UTC 2023 selfserv_9887 with PID 12551 started at Mon Mar 20 19:21:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12551 at Mon Mar 20 19:21:32 UTC 2023 kill -USR1 12551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12551 killed at Mon Mar 20 19:21:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12603 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12603 found at Mon Mar 20 19:21:33 UTC 2023 selfserv_9887 with PID 12603 started at Mon Mar 20 19:21:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12603 at Mon Mar 20 19:21:33 UTC 2023 kill -USR1 12603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12603 killed at Mon Mar 20 19:21:33 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12657 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12657 found at Mon Mar 20 19:21:33 UTC 2023 selfserv_9887 with PID 12657 started at Mon Mar 20 19:21:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12657 at Mon Mar 20 19:21:33 UTC 2023 kill -USR1 12657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12657 killed at Mon Mar 20 19:21:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12713 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12713 found at Mon Mar 20 19:21:34 UTC 2023 selfserv_9887 with PID 12713 started at Mon Mar 20 19:21:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12713 at Mon Mar 20 19:21:34 UTC 2023 kill -USR1 12713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12713 killed at Mon Mar 20 19:21:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12767 found at Mon Mar 20 19:21:34 UTC 2023 selfserv_9887 with PID 12767 started at Mon Mar 20 19:21:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12767 at Mon Mar 20 19:21:34 UTC 2023 kill -USR1 12767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12767 killed at Mon Mar 20 19:21:34 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12821 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12821 found at Mon Mar 20 19:21:35 UTC 2023 selfserv_9887 with PID 12821 started at Mon Mar 20 19:21:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12821 at Mon Mar 20 19:21:35 UTC 2023 kill -USR1 12821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12821 killed at Mon Mar 20 19:21:35 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12876 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12876 found at Mon Mar 20 19:21:35 UTC 2023 selfserv_9887 with PID 12876 started at Mon Mar 20 19:21:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12876 at Mon Mar 20 19:21:35 UTC 2023 kill -USR1 12876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12876 killed at Mon Mar 20 19:21:35 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12928 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12928 found at Mon Mar 20 19:21:35 UTC 2023 selfserv_9887 with PID 12928 started at Mon Mar 20 19:21:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12928 at Mon Mar 20 19:21:36 UTC 2023 kill -USR1 12928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12928 killed at Mon Mar 20 19:21:36 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12980 found at Mon Mar 20 19:21:36 UTC 2023 selfserv_9887 with PID 12980 started at Mon Mar 20 19:21:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12980 at Mon Mar 20 19:21:36 UTC 2023 kill -USR1 12980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12980 killed at Mon Mar 20 19:21:36 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13032 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13032 found at Mon Mar 20 19:21:36 UTC 2023 selfserv_9887 with PID 13032 started at Mon Mar 20 19:21:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13032 at Mon Mar 20 19:21:36 UTC 2023 kill -USR1 13032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13032 killed at Mon Mar 20 19:21:36 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13084 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13084 found at Mon Mar 20 19:21:37 UTC 2023 selfserv_9887 with PID 13084 started at Mon Mar 20 19:21:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13084 at Mon Mar 20 19:21:37 UTC 2023 kill -USR1 13084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13084 killed at Mon Mar 20 19:21:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13136 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13136 found at Mon Mar 20 19:21:37 UTC 2023 selfserv_9887 with PID 13136 started at Mon Mar 20 19:21:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13136 at Mon Mar 20 19:21:37 UTC 2023 kill -USR1 13136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13136 killed at Mon Mar 20 19:21:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13188 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13188 found at Mon Mar 20 19:21:38 UTC 2023 selfserv_9887 with PID 13188 started at Mon Mar 20 19:21:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13188 at Mon Mar 20 19:21:38 UTC 2023 kill -USR1 13188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13188 killed at Mon Mar 20 19:21:38 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13240 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13240 found at Mon Mar 20 19:21:38 UTC 2023 selfserv_9887 with PID 13240 started at Mon Mar 20 19:21:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13240 at Mon Mar 20 19:21:38 UTC 2023 kill -USR1 13240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13240 killed at Mon Mar 20 19:21:38 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13292 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13292 found at Mon Mar 20 19:21:38 UTC 2023 selfserv_9887 with PID 13292 started at Mon Mar 20 19:21:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13292 at Mon Mar 20 19:21:39 UTC 2023 kill -USR1 13292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13292 killed at Mon Mar 20 19:21:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13344 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13344 found at Mon Mar 20 19:21:39 UTC 2023 selfserv_9887 with PID 13344 started at Mon Mar 20 19:21:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13344 at Mon Mar 20 19:21:39 UTC 2023 kill -USR1 13344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13344 killed at Mon Mar 20 19:21:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13396 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13396 found at Mon Mar 20 19:21:39 UTC 2023 selfserv_9887 with PID 13396 started at Mon Mar 20 19:21:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13396 at Mon Mar 20 19:21:40 UTC 2023 kill -USR1 13396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13396 killed at Mon Mar 20 19:21:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13448 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13448 found at Mon Mar 20 19:21:40 UTC 2023 selfserv_9887 with PID 13448 started at Mon Mar 20 19:21:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13448 at Mon Mar 20 19:21:40 UTC 2023 kill -USR1 13448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13448 killed at Mon Mar 20 19:21:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13501 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13501 found at Mon Mar 20 19:21:40 UTC 2023 selfserv_9887 with PID 13501 started at Mon Mar 20 19:21:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13501 at Mon Mar 20 19:21:41 UTC 2023 kill -USR1 13501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13501 killed at Mon Mar 20 19:21:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13567 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13567 found at Mon Mar 20 19:21:41 UTC 2023 selfserv_9887 with PID 13567 started at Mon Mar 20 19:21:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13567 at Mon Mar 20 19:21:41 UTC 2023 kill -USR1 13567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13567 killed at Mon Mar 20 19:21:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13619 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13619 found at Mon Mar 20 19:21:41 UTC 2023 selfserv_9887 with PID 13619 started at Mon Mar 20 19:21:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13619 at Mon Mar 20 19:21:42 UTC 2023 kill -USR1 13619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13619 killed at Mon Mar 20 19:21:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13671 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13671 found at Mon Mar 20 19:21:42 UTC 2023 selfserv_9887 with PID 13671 started at Mon Mar 20 19:21:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13671 at Mon Mar 20 19:21:42 UTC 2023 kill -USR1 13671 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13671 killed at Mon Mar 20 19:21:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13723 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13723 found at Mon Mar 20 19:21:43 UTC 2023 selfserv_9887 with PID 13723 started at Mon Mar 20 19:21:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13723 at Mon Mar 20 19:21:43 UTC 2023 kill -USR1 13723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13723 killed at Mon Mar 20 19:21:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13775 found at Mon Mar 20 19:21:43 UTC 2023 selfserv_9887 with PID 13775 started at Mon Mar 20 19:21:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13775 at Mon Mar 20 19:21:43 UTC 2023 kill -USR1 13775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13775 killed at Mon Mar 20 19:21:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13827 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13827 found at Mon Mar 20 19:21:44 UTC 2023 selfserv_9887 with PID 13827 started at Mon Mar 20 19:21:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13827 at Mon Mar 20 19:21:44 UTC 2023 kill -USR1 13827 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13827 killed at Mon Mar 20 19:21:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:21:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13879 found at Mon Mar 20 19:21:44 UTC 2023 selfserv_9887 with PID 13879 started at Mon Mar 20 19:21:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13879 at Mon Mar 20 19:21:44 UTC 2023 kill -USR1 13879 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13879 killed at Mon Mar 20 19:21:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13931 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13931 found at Mon Mar 20 19:21:45 UTC 2023 selfserv_9887 with PID 13931 started at Mon Mar 20 19:21:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13931 at Mon Mar 20 19:21:45 UTC 2023 kill -USR1 13931 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13931 killed at Mon Mar 20 19:21:45 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13983 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13983 found at Mon Mar 20 19:21:45 UTC 2023 selfserv_9887 with PID 13983 started at Mon Mar 20 19:21:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13983 at Mon Mar 20 19:21:45 UTC 2023 kill -USR1 13983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13983 killed at Mon Mar 20 19:21:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:21:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14036 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14036 found at Mon Mar 20 19:21:46 UTC 2023 selfserv_9887 with PID 14036 started at Mon Mar 20 19:21:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14036 at Mon Mar 20 19:21:46 UTC 2023 kill -USR1 14036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14036 killed at Mon Mar 20 19:21:46 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 19:21:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14118 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14118 found at Mon Mar 20 19:21:46 UTC 2023 selfserv_9887 with PID 14118 started at Mon Mar 20 19:21:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14118 at Mon Mar 20 19:21:46 UTC 2023 kill -USR1 14118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14118 killed at Mon Mar 20 19:21:46 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14160 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14160 found at Mon Mar 20 19:21:46 UTC 2023 selfserv_9887 with PID 14160 started at Mon Mar 20 19:21:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14160 at Mon Mar 20 19:21:47 UTC 2023 kill -USR1 14160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14160 killed at Mon Mar 20 19:21:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14199 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14199 found at Mon Mar 20 19:21:47 UTC 2023 selfserv_9887 with PID 14199 started at Mon Mar 20 19:21:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 14199 at Mon Mar 20 19:21:47 UTC 2023 kill -USR1 14199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14199 killed at Mon Mar 20 19:21:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14238 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14238 found at Mon Mar 20 19:21:47 UTC 2023 selfserv_9887 with PID 14238 started at Mon Mar 20 19:21:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14238 at Mon Mar 20 19:21:47 UTC 2023 kill -USR1 14238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14238 killed at Mon Mar 20 19:21:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14278 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14278 found at Mon Mar 20 19:21:48 UTC 2023 selfserv_9887 with PID 14278 started at Mon Mar 20 19:21:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 14278 at Mon Mar 20 19:21:48 UTC 2023 kill -USR1 14278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14278 killed at Mon Mar 20 19:21:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14317 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14317 found at Mon Mar 20 19:21:48 UTC 2023 selfserv_9887 with PID 14317 started at Mon Mar 20 19:21:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14317 at Mon Mar 20 19:21:48 UTC 2023 kill -USR1 14317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14317 killed at Mon Mar 20 19:21:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14356 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14356 found at Mon Mar 20 19:21:48 UTC 2023 selfserv_9887 with PID 14356 started at Mon Mar 20 19:21:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14356 at Mon Mar 20 19:21:48 UTC 2023 kill -USR1 14356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14356 killed at Mon Mar 20 19:21:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14395 found at Mon Mar 20 19:21:49 UTC 2023 selfserv_9887 with PID 14395 started at Mon Mar 20 19:21:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14395 at Mon Mar 20 19:21:49 UTC 2023 kill -USR1 14395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14395 killed at Mon Mar 20 19:21:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14434 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14434 found at Mon Mar 20 19:21:49 UTC 2023 selfserv_9887 with PID 14434 started at Mon Mar 20 19:21:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14434 at Mon Mar 20 19:21:49 UTC 2023 kill -USR1 14434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14434 killed at Mon Mar 20 19:21:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14474 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14474 found at Mon Mar 20 19:21:49 UTC 2023 selfserv_9887 with PID 14474 started at Mon Mar 20 19:21:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14474 at Mon Mar 20 19:21:49 UTC 2023 kill -USR1 14474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14474 killed at Mon Mar 20 19:21:49 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14513 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14513 found at Mon Mar 20 19:21:50 UTC 2023 selfserv_9887 with PID 14513 started at Mon Mar 20 19:21:50 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14513 at Mon Mar 20 19:21:50 UTC 2023 kill -USR1 14513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14513 killed at Mon Mar 20 19:21:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14553 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14553 found at Mon Mar 20 19:21:50 UTC 2023 selfserv_9887 with PID 14553 started at Mon Mar 20 19:21:50 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14553 at Mon Mar 20 19:21:50 UTC 2023 kill -USR1 14553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14553 killed at Mon Mar 20 19:21:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14593 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14593 found at Mon Mar 20 19:21:50 UTC 2023 selfserv_9887 with PID 14593 started at Mon Mar 20 19:21:50 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14593 at Mon Mar 20 19:21:50 UTC 2023 kill -USR1 14593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14593 killed at Mon Mar 20 19:21:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14633 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14633 found at Mon Mar 20 19:21:51 UTC 2023 selfserv_9887 with PID 14633 started at Mon Mar 20 19:21:51 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14633 at Mon Mar 20 19:21:51 UTC 2023 kill -USR1 14633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14633 killed at Mon Mar 20 19:21:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14673 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14673 found at Mon Mar 20 19:21:51 UTC 2023 selfserv_9887 with PID 14673 started at Mon Mar 20 19:21:51 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14673 at Mon Mar 20 19:21:51 UTC 2023 kill -USR1 14673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14673 killed at Mon Mar 20 19:21:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14713 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14713 found at Mon Mar 20 19:21:51 UTC 2023 selfserv_9887 with PID 14713 started at Mon Mar 20 19:21:51 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14713 at Mon Mar 20 19:21:52 UTC 2023 kill -USR1 14713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14713 killed at Mon Mar 20 19:21:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14753 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14753 found at Mon Mar 20 19:21:52 UTC 2023 selfserv_9887 with PID 14753 started at Mon Mar 20 19:21:52 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14753 at Mon Mar 20 19:21:52 UTC 2023 kill -USR1 14753 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14753 killed at Mon Mar 20 19:21:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14793 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14793 found at Mon Mar 20 19:21:52 UTC 2023 selfserv_9887 with PID 14793 started at Mon Mar 20 19:21:52 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14793 at Mon Mar 20 19:21:52 UTC 2023 kill -USR1 14793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14793 killed at Mon Mar 20 19:21:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:21:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14834 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14834 found at Mon Mar 20 19:21:53 UTC 2023 selfserv_9887 with PID 14834 started at Mon Mar 20 19:21:53 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14834 at Mon Mar 20 19:21:53 UTC 2023 kill -USR1 14834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14834 killed at Mon Mar 20 19:21:53 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 19:21:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:21:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 14956 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14956 found at Mon Mar 20 19:21:54 UTC 2023 selfserv_9887 with PID 14956 started at Mon Mar 20 19:21:54 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 14956 at Mon Mar 20 19:21:59 UTC 2023 kill -USR1 14956 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14956 killed at Mon Mar 20 19:22:00 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 19:22:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 15506 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15506 found at Mon Mar 20 19:22:00 UTC 2023 selfserv_9887 with PID 15506 started at Mon Mar 20 19:22:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15506 at Mon Mar 20 19:22:13 UTC 2023 kill -USR1 15506 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15506 killed at Mon Mar 20 19:22:13 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 19:22:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16304 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16304 found at Mon Mar 20 19:22:13 UTC 2023 selfserv_9887 with PID 16304 started at Mon Mar 20 19:22:13 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16304 at Mon Mar 20 19:22:14 UTC 2023 kill -USR1 16304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16304 killed at Mon Mar 20 19:22:14 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:22:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16382 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16382 found at Mon Mar 20 19:22:14 UTC 2023 selfserv_9887 with PID 16382 started at Mon Mar 20 19:22:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16382 at Mon Mar 20 19:22:14 UTC 2023 kill -USR1 16382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16382 killed at Mon Mar 20 19:22:14 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:22:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16435 found at Mon Mar 20 19:22:14 UTC 2023 selfserv_9887 with PID 16435 started at Mon Mar 20 19:22:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16435 at Mon Mar 20 19:22:39 UTC 2023 kill -USR1 16435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16435 killed at Mon Mar 20 19:22:39 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:22:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16487 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16487 found at Mon Mar 20 19:22:39 UTC 2023 selfserv_9887 with PID 16487 started at Mon Mar 20 19:22:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16487 at Mon Mar 20 19:22:39 UTC 2023 kill -USR1 16487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16487 killed at Mon Mar 20 19:22:39 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:22:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16551 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16551 found at Mon Mar 20 19:22:40 UTC 2023 selfserv_9887 with PID 16551 started at Mon Mar 20 19:22:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16551 at Mon Mar 20 19:22:40 UTC 2023 kill -USR1 16551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16551 killed at Mon Mar 20 19:22:40 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:22:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:22:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16603 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16603 found at Mon Mar 20 19:22:40 UTC 2023 selfserv_9887 with PID 16603 started at Mon Mar 20 19:22:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16603 at Mon Mar 20 19:23:03 UTC 2023 kill -USR1 16603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16603 killed at Mon Mar 20 19:23:03 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:23:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16670 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16670 found at Mon Mar 20 19:23:03 UTC 2023 selfserv_9887 with PID 16670 started at Mon Mar 20 19:23:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16670 at Mon Mar 20 19:23:04 UTC 2023 kill -USR1 16670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16670 killed at Mon Mar 20 19:23:04 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:23:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16734 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16734 found at Mon Mar 20 19:23:04 UTC 2023 selfserv_9887 with PID 16734 started at Mon Mar 20 19:23:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16734 at Mon Mar 20 19:23:05 UTC 2023 kill -USR1 16734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16734 killed at Mon Mar 20 19:23:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:23:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16786 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16786 found at Mon Mar 20 19:23:05 UTC 2023 selfserv_9887 with PID 16786 started at Mon Mar 20 19:23:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16786 at Mon Mar 20 19:23:29 UTC 2023 kill -USR1 16786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16786 killed at Mon Mar 20 19:23:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:23:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16838 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16838 found at Mon Mar 20 19:23:29 UTC 2023 selfserv_9887 with PID 16838 started at Mon Mar 20 19:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16838 at Mon Mar 20 19:23:30 UTC 2023 kill -USR1 16838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16838 killed at Mon Mar 20 19:23:30 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:23:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16902 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16902 found at Mon Mar 20 19:23:30 UTC 2023 selfserv_9887 with PID 16902 started at Mon Mar 20 19:23:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16902 at Mon Mar 20 19:23:31 UTC 2023 kill -USR1 16902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16902 killed at Mon Mar 20 19:23:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:23:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16954 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16954 found at Mon Mar 20 19:23:31 UTC 2023 selfserv_9887 with PID 16954 started at Mon Mar 20 19:23:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16954 at Mon Mar 20 19:23:55 UTC 2023 kill -USR1 16954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16954 killed at Mon Mar 20 19:23:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:23:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17021 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17021 found at Mon Mar 20 19:23:55 UTC 2023 selfserv_9887 with PID 17021 started at Mon Mar 20 19:23:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17021 at Mon Mar 20 19:23:56 UTC 2023 kill -USR1 17021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17021 killed at Mon Mar 20 19:23:56 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:23:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17086 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17086 found at Mon Mar 20 19:23:56 UTC 2023 selfserv_9887 with PID 17086 started at Mon Mar 20 19:23:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17086 at Mon Mar 20 19:23:56 UTC 2023 kill -USR1 17086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17086 killed at Mon Mar 20 19:23:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:23:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:23:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17138 found at Mon Mar 20 19:23:57 UTC 2023 selfserv_9887 with PID 17138 started at Mon Mar 20 19:23:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17138 at Mon Mar 20 19:24:20 UTC 2023 kill -USR1 17138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17138 killed at Mon Mar 20 19:24:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:24:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17190 found at Mon Mar 20 19:24:20 UTC 2023 selfserv_9887 with PID 17190 started at Mon Mar 20 19:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17190 at Mon Mar 20 19:24:20 UTC 2023 kill -USR1 17190 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17190 killed at Mon Mar 20 19:24:20 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:24:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17248 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17248 found at Mon Mar 20 19:24:21 UTC 2023 selfserv_9887 with PID 17248 started at Mon Mar 20 19:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17248 at Mon Mar 20 19:24:21 UTC 2023 kill -USR1 17248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17248 killed at Mon Mar 20 19:24:21 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:24:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17304 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17304 found at Mon Mar 20 19:24:21 UTC 2023 selfserv_9887 with PID 17304 started at Mon Mar 20 19:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17304 at Mon Mar 20 19:24:21 UTC 2023 kill -USR1 17304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17304 killed at Mon Mar 20 19:24:21 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:24:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17360 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17360 found at Mon Mar 20 19:24:22 UTC 2023 selfserv_9887 with PID 17360 started at Mon Mar 20 19:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17360 at Mon Mar 20 19:24:22 UTC 2023 kill -USR1 17360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17360 killed at Mon Mar 20 19:24:22 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:24:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17420 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17420 found at Mon Mar 20 19:24:22 UTC 2023 selfserv_9887 with PID 17420 started at Mon Mar 20 19:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17420 at Mon Mar 20 19:24:46 UTC 2023 kill -USR1 17420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17420 killed at Mon Mar 20 19:24:46 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:24:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17495 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17495 found at Mon Mar 20 19:24:46 UTC 2023 selfserv_9887 with PID 17495 started at Mon Mar 20 19:24:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17495 at Mon Mar 20 19:24:47 UTC 2023 kill -USR1 17495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17495 killed at Mon Mar 20 19:24:47 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:24:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:24:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17555 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17555 found at Mon Mar 20 19:24:47 UTC 2023 selfserv_9887 with PID 17555 started at Mon Mar 20 19:24:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17555 at Mon Mar 20 19:25:10 UTC 2023 kill -USR1 17555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17555 killed at Mon Mar 20 19:25:10 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:25:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:25:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17607 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17607 found at Mon Mar 20 19:25:11 UTC 2023 selfserv_9887 with PID 17607 started at Mon Mar 20 19:25:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17607 at Mon Mar 20 19:25:11 UTC 2023 kill -USR1 17607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17607 killed at Mon Mar 20 19:25:11 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:25:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:25:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17667 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17667 found at Mon Mar 20 19:25:11 UTC 2023 selfserv_9887 with PID 17667 started at Mon Mar 20 19:25:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17667 at Mon Mar 20 19:25:35 UTC 2023 kill -USR1 17667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17667 killed at Mon Mar 20 19:25:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:25:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:25:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17719 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17719 found at Mon Mar 20 19:25:35 UTC 2023 selfserv_9887 with PID 17719 started at Mon Mar 20 19:25:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17719 at Mon Mar 20 19:25:36 UTC 2023 kill -USR1 17719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17719 killed at Mon Mar 20 19:25:36 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:25:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:25:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17779 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17779 found at Mon Mar 20 19:25:36 UTC 2023 selfserv_9887 with PID 17779 started at Mon Mar 20 19:25:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17779 at Mon Mar 20 19:26:00 UTC 2023 kill -USR1 17779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17779 killed at Mon Mar 20 19:26:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:26:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17846 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17846 found at Mon Mar 20 19:26:01 UTC 2023 selfserv_9887 with PID 17846 started at Mon Mar 20 19:26:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17846 at Mon Mar 20 19:26:01 UTC 2023 kill -USR1 17846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17846 killed at Mon Mar 20 19:26:01 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:26:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17906 found at Mon Mar 20 19:26:02 UTC 2023 selfserv_9887 with PID 17906 started at Mon Mar 20 19:26:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17906 at Mon Mar 20 19:26:25 UTC 2023 kill -USR1 17906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17906 killed at Mon Mar 20 19:26:25 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:26:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17959 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17959 found at Mon Mar 20 19:26:25 UTC 2023 selfserv_9887 with PID 17959 started at Mon Mar 20 19:26:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17959 at Mon Mar 20 19:26:25 UTC 2023 kill -USR1 17959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17959 killed at Mon Mar 20 19:26:25 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:26:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18011 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18011 found at Mon Mar 20 19:26:26 UTC 2023 selfserv_9887 with PID 18011 started at Mon Mar 20 19:26:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18011 at Mon Mar 20 19:26:26 UTC 2023 kill -USR1 18011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18011 killed at Mon Mar 20 19:26:26 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:26:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18063 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18063 found at Mon Mar 20 19:26:26 UTC 2023 selfserv_9887 with PID 18063 started at Mon Mar 20 19:26:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18063 at Mon Mar 20 19:26:27 UTC 2023 kill -USR1 18063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18063 killed at Mon Mar 20 19:26:27 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:26:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18121 found at Mon Mar 20 19:26:27 UTC 2023 selfserv_9887 with PID 18121 started at Mon Mar 20 19:26:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18121 at Mon Mar 20 19:26:27 UTC 2023 kill -USR1 18121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18121 killed at Mon Mar 20 19:26:27 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 19:26:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18179 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18179 found at Mon Mar 20 19:26:27 UTC 2023 selfserv_9887 with PID 18179 started at Mon Mar 20 19:26:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18179 at Mon Mar 20 19:26:27 UTC 2023 kill -USR1 18179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18179 killed at Mon Mar 20 19:26:27 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 19:26:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18237 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18237 found at Mon Mar 20 19:26:28 UTC 2023 selfserv_9887 with PID 18237 started at Mon Mar 20 19:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18237 at Mon Mar 20 19:26:28 UTC 2023 kill -USR1 18237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18237 killed at Mon Mar 20 19:26:28 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:26:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18295 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18295 found at Mon Mar 20 19:26:28 UTC 2023 selfserv_9887 with PID 18295 started at Mon Mar 20 19:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18295 at Mon Mar 20 19:26:28 UTC 2023 kill -USR1 18295 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18295 killed at Mon Mar 20 19:26:28 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 19:26:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18353 found at Mon Mar 20 19:26:28 UTC 2023 selfserv_9887 with PID 18353 started at Mon Mar 20 19:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18353 at Mon Mar 20 19:26:29 UTC 2023 kill -USR1 18353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18353 killed at Mon Mar 20 19:26:29 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 19:26:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18411 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18411 found at Mon Mar 20 19:26:29 UTC 2023 selfserv_9887 with PID 18411 started at Mon Mar 20 19:26:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18411 at Mon Mar 20 19:26:29 UTC 2023 kill -USR1 18411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18411 killed at Mon Mar 20 19:26:29 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 19:26:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18469 found at Mon Mar 20 19:26:29 UTC 2023 selfserv_9887 with PID 18469 started at Mon Mar 20 19:26:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18469 at Mon Mar 20 19:26:29 UTC 2023 kill -USR1 18469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18469 killed at Mon Mar 20 19:26:30 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 19:26:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18527 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18527 found at Mon Mar 20 19:26:30 UTC 2023 selfserv_9887 with PID 18527 started at Mon Mar 20 19:26:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18527 at Mon Mar 20 19:26:30 UTC 2023 kill -USR1 18527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18527 killed at Mon Mar 20 19:26:30 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 19:26:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18585 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18585 found at Mon Mar 20 19:26:30 UTC 2023 selfserv_9887 with PID 18585 started at Mon Mar 20 19:26:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18585 at Mon Mar 20 19:26:30 UTC 2023 kill -USR1 18585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18585 killed at Mon Mar 20 19:26:30 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 19:26:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18643 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18643 found at Mon Mar 20 19:26:30 UTC 2023 selfserv_9887 with PID 18643 started at Mon Mar 20 19:26:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18643 at Mon Mar 20 19:26:31 UTC 2023 kill -USR1 18643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18643 killed at Mon Mar 20 19:26:31 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 19:26:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18685 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18685 found at Mon Mar 20 19:26:31 UTC 2023 selfserv_9887 with PID 18685 started at Mon Mar 20 19:26:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18685 at Mon Mar 20 19:26:31 UTC 2023 kill -USR1 18685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18685 killed at Mon Mar 20 19:26:31 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 19:26:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18727 found at Mon Mar 20 19:26:31 UTC 2023 selfserv_9887 with PID 18727 started at Mon Mar 20 19:26:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 18727 at Mon Mar 20 19:26:31 UTC 2023 kill -USR1 18727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18727 killed at Mon Mar 20 19:26:31 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 19:26:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18770 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18770 found at Mon Mar 20 19:26:32 UTC 2023 selfserv_9887 with PID 18770 started at Mon Mar 20 19:26:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 18770 at Mon Mar 20 19:26:32 UTC 2023 kill -USR1 18770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18770 killed at Mon Mar 20 19:26:32 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 19:26:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18812 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18812 found at Mon Mar 20 19:26:32 UTC 2023 selfserv_9887 with PID 18812 started at Mon Mar 20 19:26:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 18812 at Mon Mar 20 19:26:32 UTC 2023 kill -USR1 18812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18812 killed at Mon Mar 20 19:26:32 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 19:26:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18854 found at Mon Mar 20 19:26:32 UTC 2023 selfserv_9887 with PID 18854 started at Mon Mar 20 19:26:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 18854 at Mon Mar 20 19:26:32 UTC 2023 kill -USR1 18854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18854 killed at Mon Mar 20 19:26:32 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 19:26:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18896 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18896 found at Mon Mar 20 19:26:33 UTC 2023 selfserv_9887 with PID 18896 started at Mon Mar 20 19:26:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 18896 at Mon Mar 20 19:26:33 UTC 2023 kill -USR1 18896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18896 killed at Mon Mar 20 19:26:33 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 19:26:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18938 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18938 found at Mon Mar 20 19:26:33 UTC 2023 selfserv_9887 with PID 18938 started at Mon Mar 20 19:26:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 18938 at Mon Mar 20 19:26:33 UTC 2023 kill -USR1 18938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18938 killed at Mon Mar 20 19:26:33 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 19:26:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:26:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18980 found at Mon Mar 20 19:26:33 UTC 2023 selfserv_9887 with PID 18980 started at Mon Mar 20 19:26:33 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 19:26:33 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 19:27:45 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 18980 at Mon Mar 20 19:27:45 UTC 2023 kill -USR1 18980 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18980 killed at Mon Mar 20 19:27:45 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 19:27:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19061 found at Mon Mar 20 19:27:45 UTC 2023 selfserv_9887 with PID 19061 started at Mon Mar 20 19:27:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19061 at Mon Mar 20 19:27:45 UTC 2023 kill -USR1 19061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19061 killed at Mon Mar 20 19:27:46 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19103 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19103 found at Mon Mar 20 19:27:46 UTC 2023 selfserv_9887 with PID 19103 started at Mon Mar 20 19:27:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19103 at Mon Mar 20 19:27:46 UTC 2023 kill -USR1 19103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19103 killed at Mon Mar 20 19:27:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19142 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19142 found at Mon Mar 20 19:27:46 UTC 2023 selfserv_9887 with PID 19142 started at Mon Mar 20 19:27:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 19142 at Mon Mar 20 19:27:46 UTC 2023 kill -USR1 19142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19142 killed at Mon Mar 20 19:27:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19182 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19182 found at Mon Mar 20 19:27:46 UTC 2023 selfserv_9887 with PID 19182 started at Mon Mar 20 19:27:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19182 at Mon Mar 20 19:27:47 UTC 2023 kill -USR1 19182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19182 killed at Mon Mar 20 19:27:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19221 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19221 found at Mon Mar 20 19:27:47 UTC 2023 selfserv_9887 with PID 19221 started at Mon Mar 20 19:27:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 19221 at Mon Mar 20 19:27:47 UTC 2023 kill -USR1 19221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19221 killed at Mon Mar 20 19:27:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19261 found at Mon Mar 20 19:27:47 UTC 2023 selfserv_9887 with PID 19261 started at Mon Mar 20 19:27:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19261 at Mon Mar 20 19:27:47 UTC 2023 kill -USR1 19261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19261 killed at Mon Mar 20 19:27:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19300 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19300 found at Mon Mar 20 19:27:47 UTC 2023 selfserv_9887 with PID 19300 started at Mon Mar 20 19:27:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19300 at Mon Mar 20 19:27:48 UTC 2023 kill -USR1 19300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19300 killed at Mon Mar 20 19:27:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19339 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19339 found at Mon Mar 20 19:27:48 UTC 2023 selfserv_9887 with PID 19339 started at Mon Mar 20 19:27:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19339 at Mon Mar 20 19:27:48 UTC 2023 kill -USR1 19339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19339 killed at Mon Mar 20 19:27:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19378 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19378 found at Mon Mar 20 19:27:48 UTC 2023 selfserv_9887 with PID 19378 started at Mon Mar 20 19:27:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19378 at Mon Mar 20 19:27:48 UTC 2023 kill -USR1 19378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19378 killed at Mon Mar 20 19:27:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19417 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19417 found at Mon Mar 20 19:27:49 UTC 2023 selfserv_9887 with PID 19417 started at Mon Mar 20 19:27:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19417 at Mon Mar 20 19:27:49 UTC 2023 kill -USR1 19417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19417 killed at Mon Mar 20 19:27:49 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19457 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19457 found at Mon Mar 20 19:27:49 UTC 2023 selfserv_9887 with PID 19457 started at Mon Mar 20 19:27:49 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19457 at Mon Mar 20 19:27:49 UTC 2023 kill -USR1 19457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19457 killed at Mon Mar 20 19:27:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19497 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19497 found at Mon Mar 20 19:27:49 UTC 2023 selfserv_9887 with PID 19497 started at Mon Mar 20 19:27:49 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19497 at Mon Mar 20 19:27:49 UTC 2023 kill -USR1 19497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19497 killed at Mon Mar 20 19:27:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19538 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19538 found at Mon Mar 20 19:27:50 UTC 2023 selfserv_9887 with PID 19538 started at Mon Mar 20 19:27:50 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19538 at Mon Mar 20 19:27:50 UTC 2023 kill -USR1 19538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19538 killed at Mon Mar 20 19:27:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19578 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19578 found at Mon Mar 20 19:27:50 UTC 2023 selfserv_9887 with PID 19578 started at Mon Mar 20 19:27:50 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19578 at Mon Mar 20 19:27:50 UTC 2023 kill -USR1 19578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19578 killed at Mon Mar 20 19:27:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19618 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19618 found at Mon Mar 20 19:27:50 UTC 2023 selfserv_9887 with PID 19618 started at Mon Mar 20 19:27:50 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19618 at Mon Mar 20 19:27:50 UTC 2023 kill -USR1 19618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19618 killed at Mon Mar 20 19:27:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19658 found at Mon Mar 20 19:27:51 UTC 2023 selfserv_9887 with PID 19658 started at Mon Mar 20 19:27:51 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19658 at Mon Mar 20 19:27:51 UTC 2023 kill -USR1 19658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19658 killed at Mon Mar 20 19:27:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19698 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19698 found at Mon Mar 20 19:27:51 UTC 2023 selfserv_9887 with PID 19698 started at Mon Mar 20 19:27:51 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19698 at Mon Mar 20 19:27:51 UTC 2023 kill -USR1 19698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19698 killed at Mon Mar 20 19:27:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19738 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19738 found at Mon Mar 20 19:27:51 UTC 2023 selfserv_9887 with PID 19738 started at Mon Mar 20 19:27:51 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19738 at Mon Mar 20 19:27:52 UTC 2023 kill -USR1 19738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19738 killed at Mon Mar 20 19:27:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:27:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19780 found at Mon Mar 20 19:27:52 UTC 2023 selfserv_9887 with PID 19780 started at Mon Mar 20 19:27:52 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19780 at Mon Mar 20 19:27:52 UTC 2023 kill -USR1 19780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19780 killed at Mon Mar 20 19:27:52 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 19:27:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 19820 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19820 found at Mon Mar 20 19:27:52 UTC 2023 selfserv_9887 with PID 19820 started at Mon Mar 20 19:27:52 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 19820 at Mon Mar 20 19:27:58 UTC 2023 kill -USR1 19820 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19820 killed at Mon Mar 20 19:27:58 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 19:27:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:27:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 20371 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20371 found at Mon Mar 20 19:27:58 UTC 2023 selfserv_9887 with PID 20371 started at Mon Mar 20 19:27:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20371 at Mon Mar 20 19:28:08 UTC 2023 kill -USR1 20371 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20371 killed at Mon Mar 20 19:28:08 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:28:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21194 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21194 found at Mon Mar 20 19:28:08 UTC 2023 selfserv_9887 with PID 21194 started at Mon Mar 20 19:28:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21194 at Mon Mar 20 19:28:09 UTC 2023 kill -USR1 21194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21194 killed at Mon Mar 20 19:28:09 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:28:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21246 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21246 found at Mon Mar 20 19:28:09 UTC 2023 selfserv_9887 with PID 21246 started at Mon Mar 20 19:28:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21246 at Mon Mar 20 19:28:34 UTC 2023 kill -USR1 21246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21246 killed at Mon Mar 20 19:28:34 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:28:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21298 found at Mon Mar 20 19:28:34 UTC 2023 selfserv_9887 with PID 21298 started at Mon Mar 20 19:28:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21298 at Mon Mar 20 19:28:34 UTC 2023 kill -USR1 21298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21298 killed at Mon Mar 20 19:28:34 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:28:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21362 found at Mon Mar 20 19:28:35 UTC 2023 selfserv_9887 with PID 21362 started at Mon Mar 20 19:28:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21362 at Mon Mar 20 19:28:35 UTC 2023 kill -USR1 21362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21362 killed at Mon Mar 20 19:28:35 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:28:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21414 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21414 found at Mon Mar 20 19:28:35 UTC 2023 selfserv_9887 with PID 21414 started at Mon Mar 20 19:28:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21414 at Mon Mar 20 19:28:58 UTC 2023 kill -USR1 21414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21414 killed at Mon Mar 20 19:28:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:28:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21481 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21481 found at Mon Mar 20 19:28:58 UTC 2023 selfserv_9887 with PID 21481 started at Mon Mar 20 19:28:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21481 at Mon Mar 20 19:28:59 UTC 2023 kill -USR1 21481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21481 killed at Mon Mar 20 19:28:59 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:28:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21545 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21545 found at Mon Mar 20 19:28:59 UTC 2023 selfserv_9887 with PID 21545 started at Mon Mar 20 19:28:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21545 at Mon Mar 20 19:28:59 UTC 2023 kill -USR1 21545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21545 killed at Mon Mar 20 19:28:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:28:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:28:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21598 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21598 found at Mon Mar 20 19:28:59 UTC 2023 selfserv_9887 with PID 21598 started at Mon Mar 20 19:28:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21598 at Mon Mar 20 19:29:25 UTC 2023 kill -USR1 21598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21598 killed at Mon Mar 20 19:29:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:29:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:29:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21651 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21651 found at Mon Mar 20 19:29:25 UTC 2023 selfserv_9887 with PID 21651 started at Mon Mar 20 19:29:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21651 at Mon Mar 20 19:29:25 UTC 2023 kill -USR1 21651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21651 killed at Mon Mar 20 19:29:25 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:29:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:29:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21715 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21715 found at Mon Mar 20 19:29:25 UTC 2023 selfserv_9887 with PID 21715 started at Mon Mar 20 19:29:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21715 at Mon Mar 20 19:29:26 UTC 2023 kill -USR1 21715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21715 killed at Mon Mar 20 19:29:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:29:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:29:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21767 found at Mon Mar 20 19:29:26 UTC 2023 selfserv_9887 with PID 21767 started at Mon Mar 20 19:29:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21767 at Mon Mar 20 19:29:51 UTC 2023 kill -USR1 21767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21767 killed at Mon Mar 20 19:29:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:29:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:29:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21834 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21834 found at Mon Mar 20 19:29:51 UTC 2023 selfserv_9887 with PID 21834 started at Mon Mar 20 19:29:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21834 at Mon Mar 20 19:29:52 UTC 2023 kill -USR1 21834 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21834 killed at Mon Mar 20 19:29:52 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:29:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:29:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21898 found at Mon Mar 20 19:29:52 UTC 2023 selfserv_9887 with PID 21898 started at Mon Mar 20 19:29:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21898 at Mon Mar 20 19:29:52 UTC 2023 kill -USR1 21898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21898 killed at Mon Mar 20 19:29:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:29:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:29:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21950 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21950 found at Mon Mar 20 19:29:52 UTC 2023 selfserv_9887 with PID 21950 started at Mon Mar 20 19:29:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21950 at Mon Mar 20 19:30:15 UTC 2023 kill -USR1 21950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21950 killed at Mon Mar 20 19:30:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:30:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22084 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22084 found at Mon Mar 20 19:30:16 UTC 2023 selfserv_9887 with PID 22084 started at Mon Mar 20 19:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22084 at Mon Mar 20 19:30:16 UTC 2023 kill -USR1 22084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22084 killed at Mon Mar 20 19:30:16 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:30:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22140 found at Mon Mar 20 19:30:16 UTC 2023 selfserv_9887 with PID 22140 started at Mon Mar 20 19:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22140 at Mon Mar 20 19:30:16 UTC 2023 kill -USR1 22140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22140 killed at Mon Mar 20 19:30:16 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:30:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22196 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22196 found at Mon Mar 20 19:30:17 UTC 2023 selfserv_9887 with PID 22196 started at Mon Mar 20 19:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22196 at Mon Mar 20 19:30:17 UTC 2023 kill -USR1 22196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22196 killed at Mon Mar 20 19:30:17 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:30:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22252 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22252 found at Mon Mar 20 19:30:17 UTC 2023 selfserv_9887 with PID 22252 started at Mon Mar 20 19:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22252 at Mon Mar 20 19:30:17 UTC 2023 kill -USR1 22252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22252 killed at Mon Mar 20 19:30:17 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:30:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22314 found at Mon Mar 20 19:30:18 UTC 2023 selfserv_9887 with PID 22314 started at Mon Mar 20 19:30:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22314 at Mon Mar 20 19:30:43 UTC 2023 kill -USR1 22314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22314 killed at Mon Mar 20 19:30:43 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:30:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22381 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22381 found at Mon Mar 20 19:30:43 UTC 2023 selfserv_9887 with PID 22381 started at Mon Mar 20 19:30:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22381 at Mon Mar 20 19:30:43 UTC 2023 kill -USR1 22381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22381 killed at Mon Mar 20 19:30:43 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:30:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:30:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22442 found at Mon Mar 20 19:30:43 UTC 2023 selfserv_9887 with PID 22442 started at Mon Mar 20 19:30:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22442 at Mon Mar 20 19:31:07 UTC 2023 kill -USR1 22442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22442 killed at Mon Mar 20 19:31:07 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:31:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:31:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22494 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22494 found at Mon Mar 20 19:31:07 UTC 2023 selfserv_9887 with PID 22494 started at Mon Mar 20 19:31:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22494 at Mon Mar 20 19:31:07 UTC 2023 kill -USR1 22494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22494 killed at Mon Mar 20 19:31:07 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:31:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:31:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22554 found at Mon Mar 20 19:31:07 UTC 2023 selfserv_9887 with PID 22554 started at Mon Mar 20 19:31:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22554 at Mon Mar 20 19:31:33 UTC 2023 kill -USR1 22554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22554 killed at Mon Mar 20 19:31:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:31:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:31:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22606 found at Mon Mar 20 19:31:33 UTC 2023 selfserv_9887 with PID 22606 started at Mon Mar 20 19:31:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22606 at Mon Mar 20 19:31:33 UTC 2023 kill -USR1 22606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22606 killed at Mon Mar 20 19:31:33 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:31:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:31:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22666 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22666 found at Mon Mar 20 19:31:33 UTC 2023 selfserv_9887 with PID 22666 started at Mon Mar 20 19:31:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22666 at Mon Mar 20 19:31:58 UTC 2023 kill -USR1 22666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22666 killed at Mon Mar 20 19:31:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:31:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:31:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22733 found at Mon Mar 20 19:31:59 UTC 2023 selfserv_9887 with PID 22733 started at Mon Mar 20 19:31:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22733 at Mon Mar 20 19:31:59 UTC 2023 kill -USR1 22733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22733 killed at Mon Mar 20 19:31:59 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:31:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:31:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22793 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22793 found at Mon Mar 20 19:31:59 UTC 2023 selfserv_9887 with PID 22793 started at Mon Mar 20 19:31:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22793 at Mon Mar 20 19:32:22 UTC 2023 kill -USR1 22793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22793 killed at Mon Mar 20 19:32:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:32:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22845 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22845 found at Mon Mar 20 19:32:23 UTC 2023 selfserv_9887 with PID 22845 started at Mon Mar 20 19:32:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22845 at Mon Mar 20 19:32:23 UTC 2023 kill -USR1 22845 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22845 killed at Mon Mar 20 19:32:23 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:32:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22897 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22897 found at Mon Mar 20 19:32:23 UTC 2023 selfserv_9887 with PID 22897 started at Mon Mar 20 19:32:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22897 at Mon Mar 20 19:32:23 UTC 2023 kill -USR1 22897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22897 killed at Mon Mar 20 19:32:23 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:32:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22949 found at Mon Mar 20 19:32:24 UTC 2023 selfserv_9887 with PID 22949 started at Mon Mar 20 19:32:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22949 at Mon Mar 20 19:32:24 UTC 2023 kill -USR1 22949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22949 killed at Mon Mar 20 19:32:24 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 19:32:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23031 found at Mon Mar 20 19:32:24 UTC 2023 selfserv_9887 with PID 23031 started at Mon Mar 20 19:32:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23031 at Mon Mar 20 19:32:24 UTC 2023 kill -USR1 23031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23031 killed at Mon Mar 20 19:32:24 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23074 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23074 found at Mon Mar 20 19:32:24 UTC 2023 selfserv_9887 with PID 23074 started at Mon Mar 20 19:32:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23074 at Mon Mar 20 19:32:25 UTC 2023 kill -USR1 23074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23074 killed at Mon Mar 20 19:32:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23113 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23113 found at Mon Mar 20 19:32:25 UTC 2023 selfserv_9887 with PID 23113 started at Mon Mar 20 19:32:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23113 at Mon Mar 20 19:32:25 UTC 2023 kill -USR1 23113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23113 killed at Mon Mar 20 19:32:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23152 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23152 found at Mon Mar 20 19:32:25 UTC 2023 selfserv_9887 with PID 23152 started at Mon Mar 20 19:32:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23152 at Mon Mar 20 19:32:25 UTC 2023 kill -USR1 23152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23152 killed at Mon Mar 20 19:32:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23191 found at Mon Mar 20 19:32:26 UTC 2023 selfserv_9887 with PID 23191 started at Mon Mar 20 19:32:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23191 at Mon Mar 20 19:32:26 UTC 2023 kill -USR1 23191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23191 killed at Mon Mar 20 19:32:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23230 found at Mon Mar 20 19:32:26 UTC 2023 selfserv_9887 with PID 23230 started at Mon Mar 20 19:32:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23230 at Mon Mar 20 19:32:26 UTC 2023 kill -USR1 23230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23230 killed at Mon Mar 20 19:32:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23272 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23272 found at Mon Mar 20 19:32:26 UTC 2023 selfserv_9887 with PID 23272 started at Mon Mar 20 19:32:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23272 at Mon Mar 20 19:32:26 UTC 2023 kill -USR1 23272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23272 killed at Mon Mar 20 19:32:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23311 found at Mon Mar 20 19:32:27 UTC 2023 selfserv_9887 with PID 23311 started at Mon Mar 20 19:32:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23311 at Mon Mar 20 19:32:27 UTC 2023 kill -USR1 23311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23311 killed at Mon Mar 20 19:32:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23350 found at Mon Mar 20 19:32:27 UTC 2023 selfserv_9887 with PID 23350 started at Mon Mar 20 19:32:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23350 at Mon Mar 20 19:32:27 UTC 2023 kill -USR1 23350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23350 killed at Mon Mar 20 19:32:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23389 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23389 found at Mon Mar 20 19:32:27 UTC 2023 selfserv_9887 with PID 23389 started at Mon Mar 20 19:32:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23389 at Mon Mar 20 19:32:27 UTC 2023 kill -USR1 23389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23389 killed at Mon Mar 20 19:32:28 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23428 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23428 found at Mon Mar 20 19:32:28 UTC 2023 selfserv_9887 with PID 23428 started at Mon Mar 20 19:32:28 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23428 at Mon Mar 20 19:32:28 UTC 2023 kill -USR1 23428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23428 killed at Mon Mar 20 19:32:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23468 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23468 found at Mon Mar 20 19:32:28 UTC 2023 selfserv_9887 with PID 23468 started at Mon Mar 20 19:32:28 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23468 at Mon Mar 20 19:32:28 UTC 2023 kill -USR1 23468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23468 killed at Mon Mar 20 19:32:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23508 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23508 found at Mon Mar 20 19:32:28 UTC 2023 selfserv_9887 with PID 23508 started at Mon Mar 20 19:32:28 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23508 at Mon Mar 20 19:32:29 UTC 2023 kill -USR1 23508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23508 killed at Mon Mar 20 19:32:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23549 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23549 found at Mon Mar 20 19:32:29 UTC 2023 selfserv_9887 with PID 23549 started at Mon Mar 20 19:32:29 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23549 at Mon Mar 20 19:32:29 UTC 2023 kill -USR1 23549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23549 killed at Mon Mar 20 19:32:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23589 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23589 found at Mon Mar 20 19:32:29 UTC 2023 selfserv_9887 with PID 23589 started at Mon Mar 20 19:32:29 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23589 at Mon Mar 20 19:32:29 UTC 2023 kill -USR1 23589 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23589 killed at Mon Mar 20 19:32:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23629 found at Mon Mar 20 19:32:29 UTC 2023 selfserv_9887 with PID 23629 started at Mon Mar 20 19:32:29 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23629 at Mon Mar 20 19:32:30 UTC 2023 kill -USR1 23629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23629 killed at Mon Mar 20 19:32:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23669 found at Mon Mar 20 19:32:30 UTC 2023 selfserv_9887 with PID 23669 started at Mon Mar 20 19:32:30 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23669 at Mon Mar 20 19:32:30 UTC 2023 kill -USR1 23669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23669 killed at Mon Mar 20 19:32:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23709 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23709 found at Mon Mar 20 19:32:30 UTC 2023 selfserv_9887 with PID 23709 started at Mon Mar 20 19:32:30 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23709 at Mon Mar 20 19:32:30 UTC 2023 kill -USR1 23709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23709 killed at Mon Mar 20 19:32:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 19:32:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:32:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23749 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23749 found at Mon Mar 20 19:32:31 UTC 2023 selfserv_9887 with PID 23749 started at Mon Mar 20 19:32:31 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23749 at Mon Mar 20 19:32:31 UTC 2023 kill -USR1 23749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23749 killed at Mon Mar 20 19:32:31 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 20 19:32:31 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 20 19:32:31 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 20 19:32:31 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 20 19:32:31 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.30514 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:53:16 2023 Not After : Mon Mar 20 18:53:16 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:79:41:00:c4:d7:75:72:f4:60:55:66:03:d5:f2:86: 82:06:28:dd:4f:0c:fe:61:e7:b6:91:02:80:64:0c:79: 99:87:27:70:cb:f4:e2:99:73:ba:8e:76:0b:b5:c9:60: b6:0c:f7:30:82:07:bf:31:73:9a:bb:ff:9e:93:c7:fd: 36:09:e8:04:70:36:a7:5e:f6:e1:88:89:32:1d:8d:ca: 2a:ad:b5:c4:36:63:e6:40:fa:7c:b8:83:1d:b2:c7:3b: 87:30:e2:61:af:02:99:11:66:fd:bc:28:40:67:5f:07: 76:5d:1b:e4:14:f1:23:93:99:c8:36:f0:96:f1:01:b3: 7f:cd:fe:b2:3f:57:16:bb:35:1d:92:db:02:b1:52:ab: bd:f9:4b:5e:73:a2:4a:d4:f6:bb:4c:26:11:a0:df:d3: 0f:08:9d:44:84:50:a0:db:4b:06:ee:b9:42:86:1f:d6: 40:d7:ba:8e:59:ee:85:20:ea:89:19:a9:ed:8f:30:53: d8:e3:d4:8d:c5:eb:14:f5:5b:4d:b3:6f:b4:b3:f3:43: e3:c0:49:8b:61:57:11:39:01:75:1b:d6:6e:be:b9:fa: 44:3b:99:8b:c2:ae:f5:d0:a2:55:cd:c8:9b:40:3c:e5: ae:40:45:48:82:a1:a1:b9:12:82:8c:b0:8c:5d:80:7b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:3f:b8:e0:3e:1a:09:d0:8b:ee:9e:d0:bc:0a:75:52: 96:0f:8b:e0:ea:e8:aa:7c:2a:c5:26:46:e0:aa:b7:20: 1d:04:67:d0:fb:55:57:ea:6e:9f:3c:fa:8c:47:83:17: be:98:d2:23:fe:d1:16:19:b9:9d:ef:d7:ee:fe:ea:2a: 28:8d:8e:94:f5:c2:6a:7e:1b:44:3a:61:dc:82:5d:78: 16:ee:ea:9c:10:3b:5b:80:cb:dc:ae:d2:f5:fe:87:3b: 0a:0a:eb:55:e1:54:16:bd:51:10:49:ea:3d:1e:2b:67: af:a0:61:9c:c2:c8:ca:78:6f:7d:3f:3d:f1:e9:2a:0b: 96:94:59:9b:0f:34:7b:95:ae:3e:1f:50:0e:ad:f3:22: bf:64:0f:42:32:bf:e0:68:00:8f:7d:fe:3a:ae:da:23: bc:83:c1:cd:f9:ab:ba:0e:be:a0:e9:16:44:5f:4a:ea: ea:9c:e3:18:60:bf:d7:bc:0c:37:fa:b8:2e:d7:5f:16: 16:79:62:93:af:b4:cf:76:84:2c:e5:91:d8:04:c1:1a: a5:1a:50:39:ea:20:ce:a2:1e:41:4e:69:62:f4:37:b6: 03:06:2a:4e:bf:06:f4:75:5b:33:5e:a2:18:05:85:0c: 7a:13:b7:39:e7:f6:6d:ed:3e:b1:e3:80:b8:0d:99:1a Fingerprint (SHA-256): 85:27:26:E0:E9:A1:4D:96:E6:F4:27:47:B2:16:43:31:54:E5:9F:5F:69:AA:78:4E:AB:7D:94:4B:22:3C:58:93 Fingerprint (SHA1): C4:F6:B5:C9:44:82:3A:76:C2:57:18:37:30:36:39:70:97:A7:3D:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:53:18 2023 Not After : Mon Mar 20 18:53:18 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:d3:73:89:33:77:bd:38:1f:95:7e:ad:5f:fa:5c:4b: 41:a0:ed:61:4e:ed:86:d8:0e:d1:53:ef:71:cd:a8:a0: bf:e4:54:24:e0:01:93:f4:2c:a3:46:19:35:ce:a8:08: f7:62:b5:40:bd:fb:ca:66:b8:6e:ac:02:21:0a:22:b3: 13:f1:0f:d8:8e:3f:c2:d2:c0:c7:30:07:92:92:17:8e: 83:a3:ab:5f:20:48:a4:03:b8:c5:14:8a:20:14:d7:cf: ec:98:3b:0b:90:23:d5:37:6c:3e:96:ed:16:bc:c7:44: 71:66:88:5b:72:98:84:ed:95:19:40:0a:83:84:67:76: b9:8d:e0:ee:3a:ce:54:90:73:3a:ac:e4:40:a7:fd:50: 47:74:17:ad:2f:bb:84:66:b9:f4:7a:dc:6d:df:5d:0a: 43:bb:4f:e6:c8:0d:10:9f:bc:96:37:4b:16:ae:64:5f: 1a:f8:45:97:35:4a:f3:ed:ed:23:5f:c5:e5:88:de:3d: e9:e3:35:b5:1d:b0:da:bd:9a:45:51:3d:b4:a7:49:03: e7:10:ff:44:5f:5c:50:09:86:29:f5:a5:05:cd:f6:01: 65:97:54:7c:29:8b:e0:43:87:6a:81:cc:16:7d:1b:05: 0e:56:98:1c:58:f4:0c:ed:71:8b:90:94:4c:2d:90:e7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:b2:25:5e:5e:12:8c:71:62:11:4b:64:01:71:a2:d8: 27:ed:39:d9:ed:fd:a8:07:e8:b5:98:d1:16:2c:55:99: c9:c9:15:29:ec:f8:91:80:06:0f:cf:7d:ba:35:0a:5d: 72:d6:59:6a:e9:ff:66:c1:ee:13:c4:79:aa:97:14:9f: 73:99:5e:8a:42:2b:c3:14:f9:75:00:89:06:eb:3b:1d: 24:c6:c0:68:df:21:3f:92:16:67:42:74:f3:ec:2b:a8: 81:89:e3:5a:3c:a4:b1:2a:d1:e5:5f:1a:2a:8b:07:09: 4b:0f:e4:a2:93:54:fd:68:72:5a:e7:3a:bc:15:55:33: c1:5e:24:69:aa:e6:d3:39:45:5b:67:5e:11:80:cd:7e: 2e:a9:1b:95:97:27:93:c8:d5:76:1e:f9:c8:7f:68:25: 24:2c:53:57:59:a6:81:88:75:0e:c4:60:d8:15:27:a3: 65:f1:3f:b3:f9:bb:23:89:4f:7f:9f:c3:1d:6d:03:0c: 3f:ae:1a:14:49:6e:73:d8:94:5b:a1:eb:91:35:3b:d7: 01:d5:15:ef:17:3c:6c:1a:91:1f:5b:b4:69:cd:97:52: 97:20:cb:95:3b:d4:75:21:6e:70:77:10:09:bb:1a:22: 73:09:3a:da:b5:12:02:f9:1a:d4:06:39:33:a6:ce:40 Fingerprint (SHA-256): 54:21:E1:05:F1:D1:50:0F:6C:BD:90:95:F4:3C:A6:7D:5E:EF:47:E4:94:9F:89:FD:6E:3C:53:79:90:8B:A6:67 Fingerprint (SHA1): 9C:B3:1B:DD:FF:E5:CB:58:E4:E4:23:EA:AA:1E:4E:0F:51:38:94:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, localhost-sni.localdomain-rsa-pss u,u,u serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Alice-rsa-pss u,u,u Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@example.com ,, bob-ec@example.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C chain-1-clientCA-ec ,, chain-1-clientCA ,, clientCA-dsa T,C,C Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-2-clientCA ,, chain-1-clientCA-dsa ,, Alice #100 ,, Alice-dsa u,u,u Dave-rsa-pss u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@example.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.30514 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v1.30514 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 20 18:53:42 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 18:51:53 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 20 18:53:37 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=dbm TIMESTAMP merge END: Mon Mar 20 19:32:33 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 20 19:32:33 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193234 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20230320193250Z nextupdate=20240320193250Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Mar 20 19:32:50 2023 Next Update: Wed Mar 20 19:32:50 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20230320193251Z addcert 2 20230320193251Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Mar 20 19:32:51 2023 Next Update: Wed Mar 20 19:32:50 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:51 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320193251Z nextupdate=20240320193251Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 19:32:51 2023 Next Update: Wed Mar 20 19:32:51 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320193252Z addcert 2 20230320193252Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 19:32:52 2023 Next Update: Wed Mar 20 19:32:51 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:52 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320193253Z addcert 4 20230320193253Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 19:32:53 2023 Next Update: Wed Mar 20 19:32:51 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:52 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Mon Mar 20 19:32:53 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320193253Z nextupdate=20240320193253Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 19:32:53 2023 Next Update: Wed Mar 20 19:32:53 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320193254Z addcert 2 20230320193254Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 19:32:54 2023 Next Update: Wed Mar 20 19:32:53 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:54 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320193255Z addcert 3 20230320193255Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 19:32:55 2023 Next Update: Wed Mar 20 19:32:53 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:54 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Mar 20 19:32:55 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320193255Z nextupdate=20240320193255Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 19:32:55 2023 Next Update: Wed Mar 20 19:32:55 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320193256Z addcert 2 20230320193256Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 19:32:56 2023 Next Update: Wed Mar 20 19:32:55 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:56 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320193257Z addcert 3 20230320193257Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 19:32:57 2023 Next Update: Wed Mar 20 19:32:55 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 19:32:56 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Mar 20 19:32:57 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193235 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193236 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 320193237 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 320193238 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 320193239 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 320193240 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 320193241 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 320193242 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 320193243 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 320193244 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 320193245 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 320193246 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 320193247 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 320193248 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 320193249 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 320193250 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Mon Mar 20 19:33:21 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 19:33:21 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 26141 >/dev/null 2>/dev/null httpserv with PID 26141 found at Mon Mar 20 19:33:21 UTC 2023 httpserv with PID 26141 started at Mon Mar 20 19:33:21 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193235 (0x1315c2d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:06 2023 Not After : Mon Mar 20 19:33:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ef:4c:42:4c:99:6c:8a:c2:82:0a:c1:9d:b0:2c:88: f8:34:8f:65:41:2a:43:41:b1:95:a4:fa:c2:ea:7a:ce: a4:a1:d3:4d:24:84:2e:bd:a8:14:e5:a6:40:b1:1c:9b: 7c:56:99:89:c4:08:48:23:64:f7:8d:62:4e:c6:eb:22: a0:7a:cb:e0:fe:ac:7d:23:76:12:e7:87:de:11:ae:8f: 91:f3:2d:ae:93:70:f8:06:96:d1:1d:85:9d:ac:9c:bc: 19:93:cc:cd:0f:68:36:e4:56:e9:ae:ef:4a:93:62:c0: 74:d0:dd:da:ec:6b:8d:3e:81:51:23:d2:41:de:2f:34: 9a:df:8f:a4:a1:1e:1d:20:a6:3f:45:96:56:e0:5a:f0: 1f:5b:1a:5c:f3:68:fc:68:59:aa:23:57:31:d5:4d:43: f4:43:c1:c9:ae:98:05:1d:43:db:89:ff:dd:cc:17:63: c5:2c:1b:74:cb:3f:d2:fc:89:29:e7:aa:12:ec:7d:79: 95:05:cb:6d:a1:e7:6d:ed:c6:8e:a3:ea:66:46:95:05: d7:1d:23:a1:4e:31:a7:2a:69:7d:0a:bb:46:3b:0e:a4: 4f:8b:bc:cc:b7:f0:3e:f7:c2:2a:d4:34:58:4e:d8:6b: e5:a4:2f:96:a5:75:ee:4f:11:b3:ad:8b:ce:5a:8d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:90:e3:c0:58:52:c1:cc:01:b6:3f:d4:be:9e:9b:83: 5f:6e:e8:a2:a8:a5:4c:b5:11:23:50:57:09:59:6c:86: 7d:46:8b:f4:8a:d8:cb:51:15:00:96:ca:50:dd:3e:d6: 6d:ae:f0:28:8f:4c:25:9a:de:5d:33:9c:77:35:72:98: af:e8:3c:06:bb:40:5e:df:30:a2:1b:82:de:97:10:96: b5:b2:b8:1b:aa:ab:c2:4c:85:4a:f9:35:f7:c1:b5:2e: 0a:42:6d:5f:6a:23:ea:40:c4:4e:35:26:24:45:8d:6f: ae:58:78:fa:f9:4c:99:17:83:96:16:7f:3b:e4:6e:c7: 09:2f:0d:76:d8:a8:54:a9:62:63:6f:58:06:d2:66:2c: 66:7e:b3:5e:9c:d0:a8:3a:5f:d3:89:8a:66:9f:01:e7: 1d:4b:2f:80:99:3b:e5:23:25:48:19:67:cb:b9:de:7e: df:9e:ff:31:5f:a7:c8:da:59:02:27:c6:55:e9:6b:c1: 53:d5:00:3d:47:5b:a0:46:da:72:77:83:80:f7:42:6f: 5d:31:b2:9b:33:3c:1f:4e:04:f2:f0:17:ee:31:75:ad: 2d:80:57:ff:af:3f:62:15:a8:7c:10:f6:d7:05:5e:00: 86:ea:61:6a:07:ff:1a:28:21:eb:fe:e9:cc:8e:90:e1 Fingerprint (SHA-256): 27:5A:1D:F7:32:CF:DD:90:14:CD:A0:A4:B9:C1:E0:B2:AC:56:C9:66:A7:7E:77:7C:6F:7E:EB:00:26:C0:4E:FD Fingerprint (SHA1): 92:F1:2A:8C:DD:51:99:01:39:82:0A:66:AD:82:70:EF:ED:8E:FB:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9897 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193234 (0x1315c2d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Mar 20 19:32:34 2023 Not After : Mon Mar 20 19:32:34 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:5a:73:7e:da:a0:7f:94:ea:72:f5:c4:69:bc:72:60: 00:39:81:08:c1:4e:98:5f:eb:25:ac:e1:85:45:61:ca: 5e:a1:e5:2b:ab:6e:46:41:4a:21:f2:71:1a:8c:fe:b5: aa:69:02:f5:2b:4c:a6:98:19:96:51:63:d4:c6:c9:82: 2b:d0:38:61:65:f1:76:10:d0:fd:34:a9:f8:c9:a5:32: b2:03:56:a3:37:26:0e:48:1f:46:3c:d6:1a:49:52:a4: 4f:ef:28:da:c2:22:77:f4:8a:a6:ea:5c:7a:73:d6:bd: 3a:13:69:fb:5e:df:b6:52:69:2a:d8:ac:5b:a2:5b:a9: a5:bf:b2:ae:fe:7a:f7:20:9d:ca:dd:24:98:7b:3b:4c: 14:fb:bb:e6:f5:29:7f:6a:ab:af:0e:b3:df:de:7d:4b: 96:a6:a0:38:7b:52:15:9a:0b:77:04:95:d0:ba:95:b8: e0:aa:0a:38:6a:84:8e:07:01:1d:ff:22:b3:18:97:1d: 5e:34:aa:27:2c:6c:80:2c:27:d8:d0:48:05:89:34:bb: 6c:cc:28:d7:2e:c8:29:30:01:ec:4d:e5:84:33:ca:63: b8:a2:24:86:e2:b3:cd:e8:85:e9:33:d3:a2:f7:18:0c: e3:69:b4:e3:25:7f:60:fd:b0:53:5b:5f:5b:d8:4c:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ef:bc:d6:85:c2:62:e7:e4:48:7d:6c:4a:5c:37:8c: ab:fa:d0:f0:27:fa:d0:16:c7:6d:67:3f:62:7b:06:82: 46:fa:c0:d8:43:65:33:1a:f6:55:6f:d1:fc:16:4a:49: 64:51:70:d3:9e:84:80:67:d8:1e:12:46:b9:e7:62:bc: 5c:81:8a:e2:d6:c0:85:e1:0d:aa:6f:ce:51:01:09:e2: 8f:08:ee:47:c4:25:94:73:ad:ce:60:88:43:67:9c:fc: 2b:cb:3f:3b:87:23:66:3b:31:cf:da:7e:97:bb:35:1f: 3e:44:d8:da:cf:51:09:9d:b0:8a:2b:1f:3f:9a:71:c9: 0a:b6:6b:42:f9:83:9e:66:70:08:cd:f0:8c:26:b3:75: de:d2:42:d4:43:9f:76:46:c5:15:c0:77:34:8a:fa:b4: 7b:9a:9a:c5:20:f6:06:50:bf:c0:c7:b2:1f:5c:07:ff: 22:bf:17:15:a6:ea:e3:2e:ce:3b:e0:66:32:85:81:7b: 23:82:75:64:64:5c:a5:c7:25:3f:3b:21:43:85:4e:83: 24:1b:5d:93:a5:4f:3c:ce:b4:09:0e:16:5d:6e:c0:ca: 5e:4e:9d:bb:80:ad:82:71:1d:df:7c:a6:05:fd:33:4f: d2:32:ed:15:23:99:6a:7a:42:21:1f:64:3a:4a:dc:78 Fingerprint (SHA-256): A0:DB:E4:74:C7:13:B9:4B:E1:86:1B:E8:62:61:64:D1:0D:B0:19:F6:E0:2A:A1:3E:BC:D4:06:DE:8C:E3:EB:22 Fingerprint (SHA1): 1F:AA:45:0B:9C:2C:29:B6:99:F9:18:3A:5B:E1:CD:AE:F0:83:C7:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 26141 at Mon Mar 20 19:33:22 UTC 2023 kill -USR1 26141 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 26141 killed at Mon Mar 20 19:33:22 UTC 2023 httpserv starting at Mon Mar 20 19:33:22 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 19:33:22 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 26343 >/dev/null 2>/dev/null httpserv with PID 26343 found at Mon Mar 20 19:33:22 UTC 2023 httpserv with PID 26343 started at Mon Mar 20 19:33:22 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9897 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193234 (0x1315c2d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Mar 20 19:32:34 2023 Not After : Mon Mar 20 19:32:34 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:5a:73:7e:da:a0:7f:94:ea:72:f5:c4:69:bc:72:60: 00:39:81:08:c1:4e:98:5f:eb:25:ac:e1:85:45:61:ca: 5e:a1:e5:2b:ab:6e:46:41:4a:21:f2:71:1a:8c:fe:b5: aa:69:02:f5:2b:4c:a6:98:19:96:51:63:d4:c6:c9:82: 2b:d0:38:61:65:f1:76:10:d0:fd:34:a9:f8:c9:a5:32: b2:03:56:a3:37:26:0e:48:1f:46:3c:d6:1a:49:52:a4: 4f:ef:28:da:c2:22:77:f4:8a:a6:ea:5c:7a:73:d6:bd: 3a:13:69:fb:5e:df:b6:52:69:2a:d8:ac:5b:a2:5b:a9: a5:bf:b2:ae:fe:7a:f7:20:9d:ca:dd:24:98:7b:3b:4c: 14:fb:bb:e6:f5:29:7f:6a:ab:af:0e:b3:df:de:7d:4b: 96:a6:a0:38:7b:52:15:9a:0b:77:04:95:d0:ba:95:b8: e0:aa:0a:38:6a:84:8e:07:01:1d:ff:22:b3:18:97:1d: 5e:34:aa:27:2c:6c:80:2c:27:d8:d0:48:05:89:34:bb: 6c:cc:28:d7:2e:c8:29:30:01:ec:4d:e5:84:33:ca:63: b8:a2:24:86:e2:b3:cd:e8:85:e9:33:d3:a2:f7:18:0c: e3:69:b4:e3:25:7f:60:fd:b0:53:5b:5f:5b:d8:4c:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ef:bc:d6:85:c2:62:e7:e4:48:7d:6c:4a:5c:37:8c: ab:fa:d0:f0:27:fa:d0:16:c7:6d:67:3f:62:7b:06:82: 46:fa:c0:d8:43:65:33:1a:f6:55:6f:d1:fc:16:4a:49: 64:51:70:d3:9e:84:80:67:d8:1e:12:46:b9:e7:62:bc: 5c:81:8a:e2:d6:c0:85:e1:0d:aa:6f:ce:51:01:09:e2: 8f:08:ee:47:c4:25:94:73:ad:ce:60:88:43:67:9c:fc: 2b:cb:3f:3b:87:23:66:3b:31:cf:da:7e:97:bb:35:1f: 3e:44:d8:da:cf:51:09:9d:b0:8a:2b:1f:3f:9a:71:c9: 0a:b6:6b:42:f9:83:9e:66:70:08:cd:f0:8c:26:b3:75: de:d2:42:d4:43:9f:76:46:c5:15:c0:77:34:8a:fa:b4: 7b:9a:9a:c5:20:f6:06:50:bf:c0:c7:b2:1f:5c:07:ff: 22:bf:17:15:a6:ea:e3:2e:ce:3b:e0:66:32:85:81:7b: 23:82:75:64:64:5c:a5:c7:25:3f:3b:21:43:85:4e:83: 24:1b:5d:93:a5:4f:3c:ce:b4:09:0e:16:5d:6e:c0:ca: 5e:4e:9d:bb:80:ad:82:71:1d:df:7c:a6:05:fd:33:4f: d2:32:ed:15:23:99:6a:7a:42:21:1f:64:3a:4a:dc:78 Fingerprint (SHA-256): A0:DB:E4:74:C7:13:B9:4B:E1:86:1B:E8:62:61:64:D1:0D:B0:19:F6:E0:2A:A1:3E:BC:D4:06:DE:8C:E3:EB:22 Fingerprint (SHA1): 1F:AA:45:0B:9C:2C:29:B6:99:F9:18:3A:5B:E1:CD:AE:F0:83:C7:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 26343 at Mon Mar 20 19:33:23 UTC 2023 kill -USR1 26343 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 26343 killed at Mon Mar 20 19:33:23 UTC 2023 httpserv starting at Mon Mar 20 19:33:23 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 19:33:23 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 26563 >/dev/null 2>/dev/null httpserv with PID 26563 found at Mon Mar 20 19:33:23 UTC 2023 httpserv with PID 26563 started at Mon Mar 20 19:33:23 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193251 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193252 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320193253 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320193254 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 320193255 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193252 (0x1315c2e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:33:25 2023 Not After : Mon Mar 20 19:33:25 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:21:f1:6f:15:a9:63:43:99:ec:b6:3b:6b:5d:53:7e: 52:13:33:4d:86:a4:78:2e:87:b9:c2:ea:e4:4c:d2:62: f2:2a:d1:5b:4a:b3:a3:0d:fb:94:5f:51:cd:66:6c:46: 19:10:64:5f:0c:21:03:e1:29:71:09:7d:98:5b:f5:59: 23:f3:40:1a:c3:6e:4f:ca:77:44:bc:ca:8f:1e:f2:c9: ec:59:00:d2:42:e2:e8:cc:16:00:09:36:85:6f:bc:85: 37:c3:3c:51:e3:7f:5c:b2:69:68:f6:3b:4f:68:79:82: e6:af:c6:06:1d:c1:8b:c3:96:ac:76:de:a8:65:3d:49: 1a:be:9e:4d:2a:4c:4e:e8:2b:b5:d9:45:70:c4:df:cf: 40:38:5f:1b:b8:f7:7a:02:42:c1:e6:0f:a6:a3:c3:57: 1d:34:09:a6:c5:32:42:32:91:e1:be:eb:c2:62:f5:03: 46:2c:b8:24:ac:48:cc:ad:d0:68:28:b0:84:19:98:4f: 6f:8c:61:f5:48:69:e3:c4:92:85:9e:24:64:e1:bd:4b: 6e:ed:6b:8e:fa:6c:23:3b:39:d9:05:56:06:e6:75:29: b1:a6:14:84:05:83:fb:41:42:6d:63:17:f9:94:2e:2b: 03:6f:3a:e8:29:76:7c:76:b5:59:43:d6:ca:6a:7e:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:0a:7f:68:a7:db:b2:81:94:93:28:d6:fc:e9:13:ea: f8:9e:0c:76:08:b0:00:1e:39:61:97:c7:b5:4a:88:80: 9d:6a:80:da:25:18:9e:99:ff:ab:d1:cd:0e:35:78:19: 1f:d6:51:fa:41:36:d6:7d:e2:e1:f6:64:a4:6b:da:8e: 2c:46:bb:72:8d:a4:db:b9:da:42:4f:08:80:9d:18:cb: 95:44:26:61:de:a0:04:fb:1f:b5:c2:81:84:53:17:14: f9:0f:c1:e9:63:50:35:d1:4a:e0:93:cb:95:7f:28:0f: 99:c9:31:0c:6e:9d:95:b0:15:39:fd:ae:46:08:aa:24: 54:77:5c:40:2b:24:f9:20:a1:d0:b1:42:c1:a9:66:b7: 27:b3:c8:82:4e:c1:72:25:a3:a1:71:14:0a:a1:43:da: 3c:1d:02:c6:67:68:eb:01:d0:cf:40:0a:d6:82:e6:35: a3:5b:54:73:0b:ea:68:95:61:88:9a:93:a9:1f:00:49: c0:87:23:3d:14:de:2a:57:3a:13:54:b4:e3:21:93:29: ca:a4:cf:02:a2:8f:e2:05:9c:9f:16:f1:ee:ef:54:1f: ae:32:f2:03:a9:63:d4:4f:f9:b8:94:d9:12:7b:ce:4a: fb:ce:62:f5:96:49:55:54:9b:aa:42:cb:95:e9:bd:1b Fingerprint (SHA-256): B3:CF:01:40:B7:DF:05:EC:08:A8:5A:DE:6D:45:70:64:5C:0E:CA:EF:94:49:65:29:C0:2F:AB:37:19:9D:29:7A Fingerprint (SHA1): 5A:E3:A1:F3:6A:7A:95:D6:43:4A:EB:9D:4B:5E:21:3E:52:5E:1A:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193251 (0x1315c2e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:33:24 2023 Not After : Mon Mar 20 19:33:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c7:d7:04:6c:0e:df:f5:1b:95:b7:d2:99:66:bc:43: f1:39:c7:d3:93:bb:13:9f:02:1d:e5:4e:26:46:b2:b5: 84:a1:fc:78:96:2d:db:2c:c5:b5:b1:db:fd:29:aa:a6: cf:2c:3b:72:7c:47:d7:46:aa:8d:e3:4d:f4:cb:dc:3c: be:9f:ad:e6:9d:15:96:c5:6a:1d:d2:84:80:ea:89:2b: 2a:f5:0b:98:7a:d6:38:cf:54:8b:cd:97:d8:76:68:9b: f5:52:c0:87:37:64:f8:fa:71:c7:31:7f:b0:e7:25:c4: af:15:dd:65:6a:bd:70:03:23:6e:66:f6:16:84:d9:8d: 82:db:77:f7:18:b4:45:ad:06:c8:9d:4e:66:92:70:70: 59:71:2c:0f:cd:51:c7:3d:1b:e0:41:45:e2:d0:15:b9: 36:ef:8e:a2:ec:26:8c:6d:3b:3d:6f:7d:90:5b:eb:76: cc:20:91:ec:b2:44:d6:5a:c1:a1:47:9e:13:07:11:d0: fb:b2:86:3a:48:9b:f1:0b:4c:f7:81:f2:fa:27:32:8e: e4:22:25:a3:8e:8c:31:54:62:9e:34:53:cd:56:d5:a7: 08:9f:e7:c9:5d:2c:05:33:7e:d8:b5:e0:96:41:8f:65: 72:52:84:10:97:b1:69:0c:cf:2c:a4:c6:cb:da:dc:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:49:e4:e1:12:b2:48:fc:ad:1c:6a:a3:93:ae:98:6d: fe:aa:1f:7f:90:5a:5d:e2:e0:fa:1b:46:2c:3b:04:d2: 96:db:91:c8:b1:4d:31:44:11:5a:49:f2:39:2f:b7:6d: e4:78:fb:4d:56:1f:04:af:76:b4:cc:73:0b:b2:66:2c: 2a:ad:ec:4d:b5:39:f2:fb:e2:57:14:3a:52:af:ae:eb: fc:66:6c:eb:6a:41:34:3e:49:32:e7:64:54:24:73:83: 3a:c4:a8:7c:5c:3f:5b:54:8c:88:bd:3b:4e:50:1e:8b: 22:a2:63:0a:e1:41:bb:58:8f:f7:3c:ac:65:4a:c8:5a: 77:92:8d:73:d2:a9:64:51:97:af:52:10:a3:e9:66:a0: ec:06:0f:9a:59:81:4a:7b:7d:5d:f0:38:fb:98:f6:c3: a7:cc:ce:d0:e9:0c:b0:51:dd:99:ab:cb:d4:c7:3e:54: 85:e9:9f:57:af:d4:c0:83:03:34:20:c2:eb:84:a4:d6: 38:4c:07:3b:db:85:99:e0:08:ae:f0:00:30:f3:ed:92: ee:ba:89:b2:aa:01:1e:1c:d0:0c:26:66:6c:ce:4a:d6: 71:e5:e0:e7:6e:5c:8c:68:03:4e:ab:26:d8:30:96:01: 48:00:31:e0:15:93:77:a3:8c:fb:69:37:44:11:4e:88 Fingerprint (SHA-256): 75:C7:0D:16:41:46:D3:C6:79:FB:CA:B8:A3:61:0A:5F:DB:BB:02:F6:E5:1C:BE:CB:08:95:DB:30:5D:77:2C:2D Fingerprint (SHA1): 39:90:D3:3E:F0:8D:2B:8C:55:A4:F3:AA:DD:7A:1F:81:94:BD:81:0F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193251 (0x1315c2e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:33:24 2023 Not After : Mon Mar 20 19:33:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c7:d7:04:6c:0e:df:f5:1b:95:b7:d2:99:66:bc:43: f1:39:c7:d3:93:bb:13:9f:02:1d:e5:4e:26:46:b2:b5: 84:a1:fc:78:96:2d:db:2c:c5:b5:b1:db:fd:29:aa:a6: cf:2c:3b:72:7c:47:d7:46:aa:8d:e3:4d:f4:cb:dc:3c: be:9f:ad:e6:9d:15:96:c5:6a:1d:d2:84:80:ea:89:2b: 2a:f5:0b:98:7a:d6:38:cf:54:8b:cd:97:d8:76:68:9b: f5:52:c0:87:37:64:f8:fa:71:c7:31:7f:b0:e7:25:c4: af:15:dd:65:6a:bd:70:03:23:6e:66:f6:16:84:d9:8d: 82:db:77:f7:18:b4:45:ad:06:c8:9d:4e:66:92:70:70: 59:71:2c:0f:cd:51:c7:3d:1b:e0:41:45:e2:d0:15:b9: 36:ef:8e:a2:ec:26:8c:6d:3b:3d:6f:7d:90:5b:eb:76: cc:20:91:ec:b2:44:d6:5a:c1:a1:47:9e:13:07:11:d0: fb:b2:86:3a:48:9b:f1:0b:4c:f7:81:f2:fa:27:32:8e: e4:22:25:a3:8e:8c:31:54:62:9e:34:53:cd:56:d5:a7: 08:9f:e7:c9:5d:2c:05:33:7e:d8:b5:e0:96:41:8f:65: 72:52:84:10:97:b1:69:0c:cf:2c:a4:c6:cb:da:dc:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:49:e4:e1:12:b2:48:fc:ad:1c:6a:a3:93:ae:98:6d: fe:aa:1f:7f:90:5a:5d:e2:e0:fa:1b:46:2c:3b:04:d2: 96:db:91:c8:b1:4d:31:44:11:5a:49:f2:39:2f:b7:6d: e4:78:fb:4d:56:1f:04:af:76:b4:cc:73:0b:b2:66:2c: 2a:ad:ec:4d:b5:39:f2:fb:e2:57:14:3a:52:af:ae:eb: fc:66:6c:eb:6a:41:34:3e:49:32:e7:64:54:24:73:83: 3a:c4:a8:7c:5c:3f:5b:54:8c:88:bd:3b:4e:50:1e:8b: 22:a2:63:0a:e1:41:bb:58:8f:f7:3c:ac:65:4a:c8:5a: 77:92:8d:73:d2:a9:64:51:97:af:52:10:a3:e9:66:a0: ec:06:0f:9a:59:81:4a:7b:7d:5d:f0:38:fb:98:f6:c3: a7:cc:ce:d0:e9:0c:b0:51:dd:99:ab:cb:d4:c7:3e:54: 85:e9:9f:57:af:d4:c0:83:03:34:20:c2:eb:84:a4:d6: 38:4c:07:3b:db:85:99:e0:08:ae:f0:00:30:f3:ed:92: ee:ba:89:b2:aa:01:1e:1c:d0:0c:26:66:6c:ce:4a:d6: 71:e5:e0:e7:6e:5c:8c:68:03:4e:ab:26:d8:30:96:01: 48:00:31:e0:15:93:77:a3:8c:fb:69:37:44:11:4e:88 Fingerprint (SHA-256): 75:C7:0D:16:41:46:D3:C6:79:FB:CA:B8:A3:61:0A:5F:DB:BB:02:F6:E5:1C:BE:CB:08:95:DB:30:5D:77:2C:2D Fingerprint (SHA1): 39:90:D3:3E:F0:8D:2B:8C:55:A4:F3:AA:DD:7A:1F:81:94:BD:81:0F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193252 (0x1315c2e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:33:25 2023 Not After : Mon Mar 20 19:33:25 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:21:f1:6f:15:a9:63:43:99:ec:b6:3b:6b:5d:53:7e: 52:13:33:4d:86:a4:78:2e:87:b9:c2:ea:e4:4c:d2:62: f2:2a:d1:5b:4a:b3:a3:0d:fb:94:5f:51:cd:66:6c:46: 19:10:64:5f:0c:21:03:e1:29:71:09:7d:98:5b:f5:59: 23:f3:40:1a:c3:6e:4f:ca:77:44:bc:ca:8f:1e:f2:c9: ec:59:00:d2:42:e2:e8:cc:16:00:09:36:85:6f:bc:85: 37:c3:3c:51:e3:7f:5c:b2:69:68:f6:3b:4f:68:79:82: e6:af:c6:06:1d:c1:8b:c3:96:ac:76:de:a8:65:3d:49: 1a:be:9e:4d:2a:4c:4e:e8:2b:b5:d9:45:70:c4:df:cf: 40:38:5f:1b:b8:f7:7a:02:42:c1:e6:0f:a6:a3:c3:57: 1d:34:09:a6:c5:32:42:32:91:e1:be:eb:c2:62:f5:03: 46:2c:b8:24:ac:48:cc:ad:d0:68:28:b0:84:19:98:4f: 6f:8c:61:f5:48:69:e3:c4:92:85:9e:24:64:e1:bd:4b: 6e:ed:6b:8e:fa:6c:23:3b:39:d9:05:56:06:e6:75:29: b1:a6:14:84:05:83:fb:41:42:6d:63:17:f9:94:2e:2b: 03:6f:3a:e8:29:76:7c:76:b5:59:43:d6:ca:6a:7e:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:0a:7f:68:a7:db:b2:81:94:93:28:d6:fc:e9:13:ea: f8:9e:0c:76:08:b0:00:1e:39:61:97:c7:b5:4a:88:80: 9d:6a:80:da:25:18:9e:99:ff:ab:d1:cd:0e:35:78:19: 1f:d6:51:fa:41:36:d6:7d:e2:e1:f6:64:a4:6b:da:8e: 2c:46:bb:72:8d:a4:db:b9:da:42:4f:08:80:9d:18:cb: 95:44:26:61:de:a0:04:fb:1f:b5:c2:81:84:53:17:14: f9:0f:c1:e9:63:50:35:d1:4a:e0:93:cb:95:7f:28:0f: 99:c9:31:0c:6e:9d:95:b0:15:39:fd:ae:46:08:aa:24: 54:77:5c:40:2b:24:f9:20:a1:d0:b1:42:c1:a9:66:b7: 27:b3:c8:82:4e:c1:72:25:a3:a1:71:14:0a:a1:43:da: 3c:1d:02:c6:67:68:eb:01:d0:cf:40:0a:d6:82:e6:35: a3:5b:54:73:0b:ea:68:95:61:88:9a:93:a9:1f:00:49: c0:87:23:3d:14:de:2a:57:3a:13:54:b4:e3:21:93:29: ca:a4:cf:02:a2:8f:e2:05:9c:9f:16:f1:ee:ef:54:1f: ae:32:f2:03:a9:63:d4:4f:f9:b8:94:d9:12:7b:ce:4a: fb:ce:62:f5:96:49:55:54:9b:aa:42:cb:95:e9:bd:1b Fingerprint (SHA-256): B3:CF:01:40:B7:DF:05:EC:08:A8:5A:DE:6D:45:70:64:5C:0E:CA:EF:94:49:65:29:C0:2F:AB:37:19:9D:29:7A Fingerprint (SHA1): 5A:E3:A1:F3:6A:7A:95:D6:43:4A:EB:9D:4B:5E:21:3E:52:5E:1A:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193252 (0x1315c2e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:33:25 2023 Not After : Mon Mar 20 19:33:25 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:21:f1:6f:15:a9:63:43:99:ec:b6:3b:6b:5d:53:7e: 52:13:33:4d:86:a4:78:2e:87:b9:c2:ea:e4:4c:d2:62: f2:2a:d1:5b:4a:b3:a3:0d:fb:94:5f:51:cd:66:6c:46: 19:10:64:5f:0c:21:03:e1:29:71:09:7d:98:5b:f5:59: 23:f3:40:1a:c3:6e:4f:ca:77:44:bc:ca:8f:1e:f2:c9: ec:59:00:d2:42:e2:e8:cc:16:00:09:36:85:6f:bc:85: 37:c3:3c:51:e3:7f:5c:b2:69:68:f6:3b:4f:68:79:82: e6:af:c6:06:1d:c1:8b:c3:96:ac:76:de:a8:65:3d:49: 1a:be:9e:4d:2a:4c:4e:e8:2b:b5:d9:45:70:c4:df:cf: 40:38:5f:1b:b8:f7:7a:02:42:c1:e6:0f:a6:a3:c3:57: 1d:34:09:a6:c5:32:42:32:91:e1:be:eb:c2:62:f5:03: 46:2c:b8:24:ac:48:cc:ad:d0:68:28:b0:84:19:98:4f: 6f:8c:61:f5:48:69:e3:c4:92:85:9e:24:64:e1:bd:4b: 6e:ed:6b:8e:fa:6c:23:3b:39:d9:05:56:06:e6:75:29: b1:a6:14:84:05:83:fb:41:42:6d:63:17:f9:94:2e:2b: 03:6f:3a:e8:29:76:7c:76:b5:59:43:d6:ca:6a:7e:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:0a:7f:68:a7:db:b2:81:94:93:28:d6:fc:e9:13:ea: f8:9e:0c:76:08:b0:00:1e:39:61:97:c7:b5:4a:88:80: 9d:6a:80:da:25:18:9e:99:ff:ab:d1:cd:0e:35:78:19: 1f:d6:51:fa:41:36:d6:7d:e2:e1:f6:64:a4:6b:da:8e: 2c:46:bb:72:8d:a4:db:b9:da:42:4f:08:80:9d:18:cb: 95:44:26:61:de:a0:04:fb:1f:b5:c2:81:84:53:17:14: f9:0f:c1:e9:63:50:35:d1:4a:e0:93:cb:95:7f:28:0f: 99:c9:31:0c:6e:9d:95:b0:15:39:fd:ae:46:08:aa:24: 54:77:5c:40:2b:24:f9:20:a1:d0:b1:42:c1:a9:66:b7: 27:b3:c8:82:4e:c1:72:25:a3:a1:71:14:0a:a1:43:da: 3c:1d:02:c6:67:68:eb:01:d0:cf:40:0a:d6:82:e6:35: a3:5b:54:73:0b:ea:68:95:61:88:9a:93:a9:1f:00:49: c0:87:23:3d:14:de:2a:57:3a:13:54:b4:e3:21:93:29: ca:a4:cf:02:a2:8f:e2:05:9c:9f:16:f1:ee:ef:54:1f: ae:32:f2:03:a9:63:d4:4f:f9:b8:94:d9:12:7b:ce:4a: fb:ce:62:f5:96:49:55:54:9b:aa:42:cb:95:e9:bd:1b Fingerprint (SHA-256): B3:CF:01:40:B7:DF:05:EC:08:A8:5A:DE:6D:45:70:64:5C:0E:CA:EF:94:49:65:29:C0:2F:AB:37:19:9D:29:7A Fingerprint (SHA1): 5A:E3:A1:F3:6A:7A:95:D6:43:4A:EB:9D:4B:5E:21:3E:52:5E:1A:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193252 (0x1315c2e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:33:25 2023 Not After : Mon Mar 20 19:33:25 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:21:f1:6f:15:a9:63:43:99:ec:b6:3b:6b:5d:53:7e: 52:13:33:4d:86:a4:78:2e:87:b9:c2:ea:e4:4c:d2:62: f2:2a:d1:5b:4a:b3:a3:0d:fb:94:5f:51:cd:66:6c:46: 19:10:64:5f:0c:21:03:e1:29:71:09:7d:98:5b:f5:59: 23:f3:40:1a:c3:6e:4f:ca:77:44:bc:ca:8f:1e:f2:c9: ec:59:00:d2:42:e2:e8:cc:16:00:09:36:85:6f:bc:85: 37:c3:3c:51:e3:7f:5c:b2:69:68:f6:3b:4f:68:79:82: e6:af:c6:06:1d:c1:8b:c3:96:ac:76:de:a8:65:3d:49: 1a:be:9e:4d:2a:4c:4e:e8:2b:b5:d9:45:70:c4:df:cf: 40:38:5f:1b:b8:f7:7a:02:42:c1:e6:0f:a6:a3:c3:57: 1d:34:09:a6:c5:32:42:32:91:e1:be:eb:c2:62:f5:03: 46:2c:b8:24:ac:48:cc:ad:d0:68:28:b0:84:19:98:4f: 6f:8c:61:f5:48:69:e3:c4:92:85:9e:24:64:e1:bd:4b: 6e:ed:6b:8e:fa:6c:23:3b:39:d9:05:56:06:e6:75:29: b1:a6:14:84:05:83:fb:41:42:6d:63:17:f9:94:2e:2b: 03:6f:3a:e8:29:76:7c:76:b5:59:43:d6:ca:6a:7e:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:0a:7f:68:a7:db:b2:81:94:93:28:d6:fc:e9:13:ea: f8:9e:0c:76:08:b0:00:1e:39:61:97:c7:b5:4a:88:80: 9d:6a:80:da:25:18:9e:99:ff:ab:d1:cd:0e:35:78:19: 1f:d6:51:fa:41:36:d6:7d:e2:e1:f6:64:a4:6b:da:8e: 2c:46:bb:72:8d:a4:db:b9:da:42:4f:08:80:9d:18:cb: 95:44:26:61:de:a0:04:fb:1f:b5:c2:81:84:53:17:14: f9:0f:c1:e9:63:50:35:d1:4a:e0:93:cb:95:7f:28:0f: 99:c9:31:0c:6e:9d:95:b0:15:39:fd:ae:46:08:aa:24: 54:77:5c:40:2b:24:f9:20:a1:d0:b1:42:c1:a9:66:b7: 27:b3:c8:82:4e:c1:72:25:a3:a1:71:14:0a:a1:43:da: 3c:1d:02:c6:67:68:eb:01:d0:cf:40:0a:d6:82:e6:35: a3:5b:54:73:0b:ea:68:95:61:88:9a:93:a9:1f:00:49: c0:87:23:3d:14:de:2a:57:3a:13:54:b4:e3:21:93:29: ca:a4:cf:02:a2:8f:e2:05:9c:9f:16:f1:ee:ef:54:1f: ae:32:f2:03:a9:63:d4:4f:f9:b8:94:d9:12:7b:ce:4a: fb:ce:62:f5:96:49:55:54:9b:aa:42:cb:95:e9:bd:1b Fingerprint (SHA-256): B3:CF:01:40:B7:DF:05:EC:08:A8:5A:DE:6D:45:70:64:5C:0E:CA:EF:94:49:65:29:C0:2F:AB:37:19:9D:29:7A Fingerprint (SHA1): 5A:E3:A1:F3:6A:7A:95:D6:43:4A:EB:9D:4B:5E:21:3E:52:5E:1A:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193251 (0x1315c2e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:33:24 2023 Not After : Mon Mar 20 19:33:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c7:d7:04:6c:0e:df:f5:1b:95:b7:d2:99:66:bc:43: f1:39:c7:d3:93:bb:13:9f:02:1d:e5:4e:26:46:b2:b5: 84:a1:fc:78:96:2d:db:2c:c5:b5:b1:db:fd:29:aa:a6: cf:2c:3b:72:7c:47:d7:46:aa:8d:e3:4d:f4:cb:dc:3c: be:9f:ad:e6:9d:15:96:c5:6a:1d:d2:84:80:ea:89:2b: 2a:f5:0b:98:7a:d6:38:cf:54:8b:cd:97:d8:76:68:9b: f5:52:c0:87:37:64:f8:fa:71:c7:31:7f:b0:e7:25:c4: af:15:dd:65:6a:bd:70:03:23:6e:66:f6:16:84:d9:8d: 82:db:77:f7:18:b4:45:ad:06:c8:9d:4e:66:92:70:70: 59:71:2c:0f:cd:51:c7:3d:1b:e0:41:45:e2:d0:15:b9: 36:ef:8e:a2:ec:26:8c:6d:3b:3d:6f:7d:90:5b:eb:76: cc:20:91:ec:b2:44:d6:5a:c1:a1:47:9e:13:07:11:d0: fb:b2:86:3a:48:9b:f1:0b:4c:f7:81:f2:fa:27:32:8e: e4:22:25:a3:8e:8c:31:54:62:9e:34:53:cd:56:d5:a7: 08:9f:e7:c9:5d:2c:05:33:7e:d8:b5:e0:96:41:8f:65: 72:52:84:10:97:b1:69:0c:cf:2c:a4:c6:cb:da:dc:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:49:e4:e1:12:b2:48:fc:ad:1c:6a:a3:93:ae:98:6d: fe:aa:1f:7f:90:5a:5d:e2:e0:fa:1b:46:2c:3b:04:d2: 96:db:91:c8:b1:4d:31:44:11:5a:49:f2:39:2f:b7:6d: e4:78:fb:4d:56:1f:04:af:76:b4:cc:73:0b:b2:66:2c: 2a:ad:ec:4d:b5:39:f2:fb:e2:57:14:3a:52:af:ae:eb: fc:66:6c:eb:6a:41:34:3e:49:32:e7:64:54:24:73:83: 3a:c4:a8:7c:5c:3f:5b:54:8c:88:bd:3b:4e:50:1e:8b: 22:a2:63:0a:e1:41:bb:58:8f:f7:3c:ac:65:4a:c8:5a: 77:92:8d:73:d2:a9:64:51:97:af:52:10:a3:e9:66:a0: ec:06:0f:9a:59:81:4a:7b:7d:5d:f0:38:fb:98:f6:c3: a7:cc:ce:d0:e9:0c:b0:51:dd:99:ab:cb:d4:c7:3e:54: 85:e9:9f:57:af:d4:c0:83:03:34:20:c2:eb:84:a4:d6: 38:4c:07:3b:db:85:99:e0:08:ae:f0:00:30:f3:ed:92: ee:ba:89:b2:aa:01:1e:1c:d0:0c:26:66:6c:ce:4a:d6: 71:e5:e0:e7:6e:5c:8c:68:03:4e:ab:26:d8:30:96:01: 48:00:31:e0:15:93:77:a3:8c:fb:69:37:44:11:4e:88 Fingerprint (SHA-256): 75:C7:0D:16:41:46:D3:C6:79:FB:CA:B8:A3:61:0A:5F:DB:BB:02:F6:E5:1C:BE:CB:08:95:DB:30:5D:77:2C:2D Fingerprint (SHA1): 39:90:D3:3E:F0:8D:2B:8C:55:A4:F3:AA:DD:7A:1F:81:94:BD:81:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193251 (0x1315c2e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:33:24 2023 Not After : Mon Mar 20 19:33:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c7:d7:04:6c:0e:df:f5:1b:95:b7:d2:99:66:bc:43: f1:39:c7:d3:93:bb:13:9f:02:1d:e5:4e:26:46:b2:b5: 84:a1:fc:78:96:2d:db:2c:c5:b5:b1:db:fd:29:aa:a6: cf:2c:3b:72:7c:47:d7:46:aa:8d:e3:4d:f4:cb:dc:3c: be:9f:ad:e6:9d:15:96:c5:6a:1d:d2:84:80:ea:89:2b: 2a:f5:0b:98:7a:d6:38:cf:54:8b:cd:97:d8:76:68:9b: f5:52:c0:87:37:64:f8:fa:71:c7:31:7f:b0:e7:25:c4: af:15:dd:65:6a:bd:70:03:23:6e:66:f6:16:84:d9:8d: 82:db:77:f7:18:b4:45:ad:06:c8:9d:4e:66:92:70:70: 59:71:2c:0f:cd:51:c7:3d:1b:e0:41:45:e2:d0:15:b9: 36:ef:8e:a2:ec:26:8c:6d:3b:3d:6f:7d:90:5b:eb:76: cc:20:91:ec:b2:44:d6:5a:c1:a1:47:9e:13:07:11:d0: fb:b2:86:3a:48:9b:f1:0b:4c:f7:81:f2:fa:27:32:8e: e4:22:25:a3:8e:8c:31:54:62:9e:34:53:cd:56:d5:a7: 08:9f:e7:c9:5d:2c:05:33:7e:d8:b5:e0:96:41:8f:65: 72:52:84:10:97:b1:69:0c:cf:2c:a4:c6:cb:da:dc:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:49:e4:e1:12:b2:48:fc:ad:1c:6a:a3:93:ae:98:6d: fe:aa:1f:7f:90:5a:5d:e2:e0:fa:1b:46:2c:3b:04:d2: 96:db:91:c8:b1:4d:31:44:11:5a:49:f2:39:2f:b7:6d: e4:78:fb:4d:56:1f:04:af:76:b4:cc:73:0b:b2:66:2c: 2a:ad:ec:4d:b5:39:f2:fb:e2:57:14:3a:52:af:ae:eb: fc:66:6c:eb:6a:41:34:3e:49:32:e7:64:54:24:73:83: 3a:c4:a8:7c:5c:3f:5b:54:8c:88:bd:3b:4e:50:1e:8b: 22:a2:63:0a:e1:41:bb:58:8f:f7:3c:ac:65:4a:c8:5a: 77:92:8d:73:d2:a9:64:51:97:af:52:10:a3:e9:66:a0: ec:06:0f:9a:59:81:4a:7b:7d:5d:f0:38:fb:98:f6:c3: a7:cc:ce:d0:e9:0c:b0:51:dd:99:ab:cb:d4:c7:3e:54: 85:e9:9f:57:af:d4:c0:83:03:34:20:c2:eb:84:a4:d6: 38:4c:07:3b:db:85:99:e0:08:ae:f0:00:30:f3:ed:92: ee:ba:89:b2:aa:01:1e:1c:d0:0c:26:66:6c:ce:4a:d6: 71:e5:e0:e7:6e:5c:8c:68:03:4e:ab:26:d8:30:96:01: 48:00:31:e0:15:93:77:a3:8c:fb:69:37:44:11:4e:88 Fingerprint (SHA-256): 75:C7:0D:16:41:46:D3:C6:79:FB:CA:B8:A3:61:0A:5F:DB:BB:02:F6:E5:1C:BE:CB:08:95:DB:30:5D:77:2C:2D Fingerprint (SHA1): 39:90:D3:3E:F0:8D:2B:8C:55:A4:F3:AA:DD:7A:1F:81:94:BD:81:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193256 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193257 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193258 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193259 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193260 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193261 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193262 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193263 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193264 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 320193265 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 320193266 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 320193267 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 320193268 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 320193269 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 320193270 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 320193271 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 320193272 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 320193273 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 320193274 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 320193275 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 320193276 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 320193277 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193278 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193256 (0x1315c2e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 20 19:33:29 2023 Not After : Mon Mar 20 19:33:29 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:bb:1e:21:39:98:af:2c:24:37:53:df:82:ec:b2:c5: ab:6a:ac:71:ca:fe:e1:6c:57:81:0e:7a:f8:ce:ac:7d: fc:a1:bd:81:2d:12:4c:5e:bb:01:f3:f5:be:a6:d2:f6: ad:c7:01:a7:25:06:87:5f:a7:a1:27:53:f5:7d:40:ea: c5:e9:6d:1a:f3:b2:a6:81:d8:17:87:77:24:9d:1c:8b: 9e:0f:1e:2f:9a:d1:c9:00:9c:2d:e8:a8:1d:b7:27:b7: 3d:8d:47:4e:d0:9a:c3:a9:b6:bf:0d:a8:d9:ca:e6:f8: f0:a7:39:38:ed:83:79:f5:62:91:bf:8d:a3:56:11:1b: 8f:b5:db:14:01:2c:aa:72:41:51:fe:9f:11:42:fa:5f: cd:4d:76:c3:b7:e8:d7:33:1b:4a:a6:f3:3f:4f:23:0f: af:e5:89:64:32:21:92:dc:d5:39:c5:0e:ac:0b:1c:fb: d4:1b:7b:7b:ff:70:a1:bb:7b:7c:59:24:04:fe:64:4f: c2:ec:05:72:bd:b7:44:91:19:71:74:be:72:d6:5f:96: 9e:b6:d8:8c:35:26:96:bc:1b:92:ed:65:91:8c:91:08: 9c:90:bb:16:25:b7:ec:8e:98:9f:87:31:ba:e9:3b:04: 94:cc:7a:7d:9e:58:0a:6b:3b:b5:47:54:67:20:3c:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:38:24:40:b6:1a:0f:74:5d:ce:eb:29:02:20:2b:df: 58:c9:5f:4a:e3:28:44:79:d9:a5:82:94:94:66:a4:e3: 7e:c1:bf:f2:f4:bb:28:ac:e7:87:ea:ca:80:b3:bc:c3: 8b:2f:24:57:fe:5a:41:da:40:81:50:eb:48:2a:36:4e: 1d:5e:d1:41:11:06:47:13:11:91:bd:c1:bd:f1:5d:e3: ab:a0:e7:cc:8b:9b:1a:cd:ba:ce:0b:4b:0f:1b:85:cb: 5d:f7:65:12:3f:75:04:f8:a7:e4:4f:78:c8:22:11:73: a2:e3:01:ed:5c:1b:db:58:d0:7b:21:98:e5:54:b3:10: 6f:d0:a3:22:47:c7:09:95:a4:6a:59:6b:98:f5:aa:85: c8:cf:96:22:93:e2:d9:c8:cd:81:ba:4c:bc:b7:f9:c8: d2:13:5c:77:18:6e:69:1b:d4:51:eb:75:ef:7b:fd:cf: bd:16:a1:5f:a1:95:fc:0a:a3:1b:00:75:37:19:91:44: f1:35:cb:81:e9:10:62:0b:51:23:b9:3a:16:38:d8:d4: 8c:87:07:fe:dc:39:a1:e4:a8:ea:9c:08:81:c6:25:e7: 4e:d0:6e:52:54:7f:d8:a4:d5:7b:ad:e6:49:c6:fd:0c: 06:ae:bd:76:c5:b5:ee:2b:0b:4c:90:3a:f9:18:a1:ee Fingerprint (SHA-256): 98:17:A9:37:15:25:AA:C0:2B:E7:2A:E7:31:5F:91:23:6C:44:2A:AD:08:9A:5D:46:1B:83:9F:55:08:14:BD:FF Fingerprint (SHA1): 80:87:5C:AC:6D:31:AB:87:EF:4A:B2:AB:2C:94:3F:53:DF:FB:F6:2B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193257 (0x1315c2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 20 19:33:30 2023 Not After : Mon Mar 20 19:33:30 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:5e:25:f5:8a:f1:f7:f9:c0:c9:ff:46:cb:4d:36:7a: 0e:7c:4f:99:c1:f9:72:41:70:89:ee:80:73:7b:5a:da: ef:e7:4c:40:67:e8:41:e2:ff:15:01:ef:b4:23:34:8c: 1c:ab:4a:e9:88:24:80:02:9b:f0:ec:1c:b4:27:c8:19: d9:6b:19:af:2e:91:54:5b:11:e5:bd:58:d1:b4:1c:e7: c0:18:87:44:55:14:67:ff:17:79:ed:eb:e4:ed:b0:fd: 7e:60:de:d0:88:7f:59:da:b8:50:da:fe:b5:a8:01:78: 12:0c:9d:3a:23:42:6b:5e:da:fc:d2:a6:35:27:44:a0: 81:5d:cf:d4:07:e9:9c:95:da:5e:36:0f:48:8b:07:21: 6e:cb:b6:c8:b0:82:86:99:12:eb:2b:85:59:c0:53:9b: bf:3f:bd:ca:cb:cd:f3:e2:0a:27:18:9f:4a:90:9e:ef: 5f:04:04:9e:50:b7:93:1c:6b:85:f9:d0:a3:09:ef:16: 01:b0:05:85:a4:06:76:4c:6f:bb:d1:81:44:23:a2:11: fe:04:40:7f:c2:97:c4:d3:54:d0:97:c0:b0:32:89:97: 60:b0:7a:96:49:52:40:d7:0c:4e:4e:aa:03:47:6e:c4: 13:ea:08:bc:17:79:4b:e5:36:2d:57:f5:b9:af:60:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:95:9d:54:46:8e:bb:ff:ce:f7:66:31:0a:58:9d:cc: 3e:7d:80:04:4b:65:cf:d8:4b:8c:16:0c:ee:12:5d:6e: 77:bd:80:c9:d3:7f:8e:16:75:a9:67:b3:02:76:83:e1: 33:07:e2:60:b2:7c:97:1c:57:65:2e:d5:23:7f:9c:e4: d9:58:38:da:ab:0b:73:13:3a:f6:69:c8:a8:f5:77:14: 69:fb:ed:3f:ed:fe:85:db:27:8c:57:7b:bf:04:a2:4b: 4e:a3:3a:81:11:eb:07:c8:f4:25:8a:8d:ae:c0:8e:c7: d0:bd:a8:13:83:f3:93:9f:1d:9b:fc:63:71:7e:7f:c5: 97:43:71:25:fe:34:4a:fb:09:4f:4a:9e:38:c3:87:0d: b6:6d:63:ae:c7:86:99:10:70:43:b0:36:ff:ea:ed:ea: cd:3f:ae:71:f6:2b:8b:65:79:bc:3c:f3:2e:73:76:4e: af:dc:59:63:28:7a:09:5d:85:64:31:58:0f:78:de:3b: 04:9a:a0:2b:0c:46:6d:a6:02:e7:83:8f:e4:61:1f:6d: ea:e9:35:c6:b9:7a:d5:8c:53:53:4f:5d:73:8e:61:2f: 3f:fa:e8:70:b8:40:90:c1:a5:58:8b:9a:7b:d6:91:0e: 37:33:89:17:ab:70:bf:9e:c2:52:bd:54:a8:37:af:54 Fingerprint (SHA-256): 35:7F:A5:C2:8A:D2:40:C5:A4:10:2D:37:D8:66:56:16:C4:04:63:D3:71:76:C5:82:1A:44:81:0C:57:12:73:3A Fingerprint (SHA1): A7:66:1B:5A:89:CC:EE:31:2E:3D:31:42:ED:40:F4:02:CB:5F:F7:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193258 (0x1315c2ea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 20 19:33:30 2023 Not After : Mon Mar 20 19:33:30 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:09:83:e2:89:7e:fb:11:14:d5:5f:59:ee:ad:97:af: 4d:d5:b1:53:a0:28:1e:43:1e:dc:ca:2e:c6:8a:6f:91: 17:c6:cc:05:8f:8a:f4:fd:3a:da:30:43:7e:d2:65:4c: 86:84:fd:03:2d:df:03:c0:5a:56:e0:cd:97:14:df:51: 48:b1:07:ae:b3:a5:23:fe:8a:90:ab:c0:13:34:29:c0: 81:e3:21:e6:e3:1a:3e:f3:5c:ff:bb:00:7c:a3:46:71: 24:f5:ae:61:32:ad:a1:2b:c6:f7:ba:17:e6:37:76:a0: 77:c0:f2:37:a1:98:4e:b6:0f:b9:c0:a7:77:58:08:7c: 70:8e:d1:84:28:a9:93:35:e0:a9:6f:f0:88:e5:16:98: db:4b:f7:cc:e0:f0:f6:49:c8:67:a5:a1:98:3b:d2:03: 49:de:aa:bc:23:9b:dd:fe:86:6a:6f:49:d5:a7:3d:00: dc:3e:d6:eb:b0:59:cf:de:3e:7b:65:62:e2:12:9f:34: 26:fc:c2:e9:8f:a9:13:88:96:03:e7:98:26:cf:56:ca: 69:f0:39:40:1a:97:42:0e:cb:c9:fe:86:da:1f:09:3c: 35:c3:10:df:1f:18:76:62:af:51:56:90:03:30:5c:71: b4:72:a9:64:44:d7:90:93:4d:c2:4f:78:1e:4e:94:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:46:b4:f8:e7:ae:ce:7f:67:06:df:0b:4d:5b:1d:47: d3:0f:ee:20:57:ef:3f:5e:6e:00:5c:12:06:8c:6b:83: 52:66:e5:a1:b4:eb:47:66:28:a2:56:e2:d7:8e:79:5c: 07:e3:d8:b3:67:be:0b:d8:b2:a4:40:3c:72:8f:3e:49: 41:7f:58:12:8c:e2:e3:58:2d:b4:e0:85:fb:0d:e6:83: 36:23:8c:c2:34:6c:a7:61:e2:20:2a:5e:ab:70:3b:32: 32:ff:a5:a4:ee:d5:60:d6:98:80:b5:e5:8f:c3:28:3f: 5f:4b:31:2a:5f:d4:9e:96:50:58:f4:c5:e8:f1:a8:2c: ce:da:64:1f:3f:75:87:a3:36:ef:47:61:1e:e4:01:cd: da:b5:0b:31:8b:ab:d4:45:95:74:be:73:1b:af:8c:bb: a4:03:6d:02:5d:72:a2:2d:cd:ef:b8:c8:3e:b1:4d:04: 69:aa:72:8b:93:b8:54:ec:9d:b3:40:0e:91:e6:4e:3c: 93:de:9e:9b:1e:f1:82:d3:c5:cc:0d:07:b8:0e:2e:fe: c2:dd:03:58:95:5c:d6:26:bb:3c:b8:92:5b:d8:20:5b: 16:34:10:a4:3e:7c:91:ed:57:07:3f:09:ca:e5:e4:98: 55:d5:9b:16:9a:59:ab:32:4a:a5:7b:9b:4c:53:e9:ca Fingerprint (SHA-256): 74:87:CA:C6:60:6B:AB:22:93:E9:56:F9:51:44:7C:83:8A:E8:AF:13:32:05:C3:AD:92:E7:0D:55:33:B3:57:57 Fingerprint (SHA1): 18:6E:C0:F6:6F:22:3A:0B:66:A7:1C:50:76:C5:89:24:6F:FD:B4:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193259 (0x1315c2eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 20 19:33:31 2023 Not After : Mon Mar 20 19:33:31 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:08:cf:4a:f5:59:19:11:5e:aa:a3:b7:46:90:b5:71: 8d:cf:c2:28:14:c4:eb:eb:6f:60:7a:a4:8f:08:bd:45: fd:4f:75:d2:62:1e:a9:e4:21:8b:21:8a:e6:e2:cd:7d: c3:84:56:c8:ea:d3:56:e6:77:7b:87:7f:00:b5:25:1f: 2a:67:63:ec:d8:da:12:75:18:53:a6:7b:0c:2e:30:e4: 96:fb:bb:83:b9:7f:50:2d:88:6b:27:09:1e:42:05:ea: 25:49:ee:29:76:5a:08:fd:8d:91:e0:1d:dc:19:8d:a9: 20:b8:e4:3b:b3:1b:04:d1:72:0d:d7:60:27:cd:79:b0: 77:3a:b7:08:81:01:54:55:d6:34:48:83:bd:16:b2:18: 4d:47:3f:8e:ec:b9:cc:31:1a:40:52:13:26:53:5d:0a: 33:55:99:2a:3e:83:e8:86:5f:75:92:3d:de:7d:29:84: e7:a5:b3:9c:26:ab:c9:25:80:7c:38:e2:e4:c8:1a:8d: 66:2f:4b:6e:14:2e:59:2c:27:8c:2c:22:ae:73:9f:88: bf:57:3c:77:90:ad:bb:c8:41:2f:04:53:00:70:99:ae: 0a:f8:8a:30:1f:66:64:02:ea:e0:a5:5e:7a:b9:cc:71: 3a:41:f6:3f:d9:fa:a3:4c:92:26:7f:1d:61:b4:ff:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:4f:a7:3c:2e:6c:67:86:f7:ef:13:42:b9:75:91:a7: 47:7a:35:d9:b8:78:09:1a:ca:ef:09:fb:1d:77:cb:c2: 75:ae:f4:13:88:c4:bb:65:b6:6b:1c:27:9f:70:b6:95: f9:40:50:f8:52:65:38:59:c5:30:d2:fe:7c:8c:b1:93: 17:e2:cd:60:5c:f8:7d:a6:a7:cb:ad:bf:cc:30:35:f5: 32:66:ed:44:c5:9a:3a:9d:7c:f1:af:02:4b:40:ce:40: 36:3d:9a:d4:63:20:72:15:b7:4a:d7:e9:7d:27:b3:21: b5:34:ea:5f:9b:01:48:82:a3:8f:bf:94:e2:ad:ef:36: dd:c2:7b:b7:43:cb:e7:23:8f:d6:0b:e8:e1:85:f9:48: 08:cf:0d:8a:7a:95:68:32:03:e1:1d:be:b6:f6:3f:f8: 09:24:a9:9a:8c:c0:d7:e8:24:ca:76:b9:36:09:2c:14: 83:16:fc:4a:1d:5b:32:23:00:5a:78:3f:96:b5:2b:91: 4f:e3:28:52:99:c2:01:ec:45:ea:fd:67:ab:81:81:0d: 89:aa:df:5f:3c:4e:0e:6c:b1:0b:a5:1a:46:bd:e6:fa: a2:4f:29:49:03:a0:76:03:c5:1a:57:40:e4:93:f2:a0: 0d:53:4c:3f:27:9c:aa:95:bd:6e:3c:95:52:ba:19:ba Fingerprint (SHA-256): 7F:08:B7:04:A2:29:CB:17:98:46:09:B9:A2:14:ED:25:6B:F6:74:7E:65:07:1F:96:F2:C2:61:02:95:CE:02:8C Fingerprint (SHA1): 43:71:7B:EB:B5:F3:B5:A4:A2:C3:3A:B2:AE:D0:E4:49:A8:94:6F:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193260 (0x1315c2ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 20 19:33:32 2023 Not After : Mon Mar 20 19:33:32 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:c6:6e:25:a3:8f:bd:94:f8:84:ba:eb:a8:3d:02:ca: dc:3f:bb:b4:14:6f:fb:ef:11:bc:17:06:ae:11:6c:2a: 34:d5:f5:3c:ef:77:69:f5:46:39:23:9c:c1:90:09:24: 35:29:0e:b0:bc:79:18:18:88:f1:1b:19:cc:d3:4f:47: de:93:59:7a:7a:38:05:51:73:fa:c8:55:ef:6c:bf:a0: ed:51:e6:4e:f3:f9:1b:50:02:15:c3:7e:5d:47:c3:bd: a9:eb:07:df:c9:39:ac:58:e3:93:b7:f5:04:a2:a8:50: e3:40:1e:01:aa:bf:c3:92:c7:27:ad:f2:13:1c:fc:74: 44:b0:f7:ff:3b:10:94:08:e9:ce:f1:ed:a4:6e:8e:30: 76:2b:25:14:70:46:50:39:59:f3:04:fb:3f:ef:2d:8e: 87:ee:02:0e:bf:0e:aa:c9:c9:2d:d5:67:03:63:33:cc: 9a:a9:f1:d0:69:62:62:79:75:aa:90:41:ab:e4:15:d5: c8:1e:f7:27:3a:8e:c2:8d:e7:97:a9:95:8c:6e:3c:b8: 38:75:97:88:fd:be:90:67:29:2d:be:70:71:04:98:e4: 5a:df:b4:30:47:2c:3f:d3:8c:b7:9c:4e:61:92:4f:c0: 33:d7:1c:96:bd:07:40:83:f4:6c:0d:10:85:c5:7f:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:97:cc:49:6f:56:40:a1:c0:70:50:48:6e:9f:e5:91: 78:1c:d9:1c:c2:a7:66:e3:ca:c0:42:26:99:21:80:31: 0d:7d:fe:f6:01:7e:93:4a:71:ea:42:f9:81:5d:dc:26: 4e:5e:6c:de:9b:27:81:52:8c:24:2e:20:fe:57:5f:e9: 50:ed:6e:d8:2e:8a:69:51:2d:0a:2f:f5:8c:c4:b6:d6: 54:89:b8:4c:91:75:be:ab:00:f0:b5:04:26:4a:26:59: 3f:7f:d4:62:b8:55:75:de:73:59:13:99:24:13:6f:63: ec:c2:9d:40:bc:c7:7f:6b:41:10:40:54:66:97:bc:6a: b6:53:44:cc:58:b8:b0:40:8b:87:69:ad:98:e0:08:ce: d0:44:7b:ef:c4:6a:db:36:9e:f8:e4:2d:d1:67:30:44: 3d:91:9f:7a:b7:95:1b:5e:41:30:fe:ce:a2:7e:68:82: a5:92:5f:6f:af:f8:fd:cf:5e:2a:68:71:3b:2d:fc:d6: 33:46:6b:44:f2:2c:de:bb:88:8d:5c:b6:1a:18:16:e8: 89:f5:02:52:22:88:47:2f:52:e6:d7:72:53:93:cc:1e: 49:38:d0:ff:58:e3:b8:fb:fc:25:ad:27:2a:d1:39:25: 4c:02:e3:3f:61:1d:51:bf:e5:2f:08:89:b9:12:83:8d Fingerprint (SHA-256): 82:5B:E7:A1:81:C4:06:5E:31:75:97:B4:ED:74:8D:6E:B9:41:AB:2C:BA:FD:9E:23:63:18:B0:99:D3:8B:76:A3 Fingerprint (SHA1): E5:5F:7F:7D:30:54:4D:8E:2D:8D:CF:B8:29:4B:D1:1B:93:6C:30:D6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193261 (0x1315c2ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 20 19:33:33 2023 Not After : Mon Mar 20 19:33:33 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:bc:8e:63:69:02:a1:be:cf:59:29:09:08:8e:90:8c: f1:6c:2b:11:6e:21:94:01:2b:27:30:15:e6:7e:fd:2c: 01:56:72:d2:42:df:04:fe:99:27:36:93:3a:d8:b0:c4: 38:7c:ee:b7:85:f4:c6:48:6c:5d:98:dc:ac:da:96:ea: 73:54:1a:82:d6:40:bf:2e:c1:06:83:1e:78:74:66:29: a3:03:9f:bd:54:27:49:25:25:ea:93:d6:11:ce:54:26: 7f:29:3d:c1:92:90:34:d3:2a:79:5c:97:1d:c2:66:dd: 61:75:00:c6:57:ce:46:04:0e:e4:c9:b9:69:ac:86:6a: ec:f8:a1:f3:04:1a:d4:8a:9b:ed:82:0f:7a:f1:df:3e: 4f:43:47:f9:71:04:e0:0b:d5:0b:57:e2:67:5f:ea:47: 79:1a:8b:ab:7f:b8:a5:c7:f6:e2:c5:40:28:6a:6f:f7: a1:c5:5a:d5:3b:cb:87:1d:2e:57:88:0f:d6:01:4c:31: b4:c9:ce:85:52:6d:35:21:8b:d8:07:fe:8d:67:88:fc: 99:e1:56:26:17:54:5c:4a:3e:42:cb:c0:15:02:7a:58: 17:79:1d:35:22:2b:7e:23:25:09:31:67:4a:23:d7:d3: 29:5b:56:00:db:51:74:11:64:36:e0:99:8a:68:8f:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:2f:c3:d0:d9:53:2f:4e:d3:15:a8:92:36:54:a6:ea: 55:cb:18:55:ab:db:5f:d9:e0:4e:1f:cf:4e:2c:93:0e: 32:04:44:4b:c7:a5:1c:4d:71:9e:20:c9:b0:bc:ec:fb: 53:99:20:08:ec:28:9e:05:eb:b0:67:cc:f7:81:7f:ca: e3:eb:e4:00:c4:29:26:b1:f9:c8:53:dc:8c:6a:e3:e7: b5:14:ca:4d:1b:d8:29:7a:e6:d6:f4:93:2c:e5:a5:2c: c9:74:94:17:f5:fe:54:27:12:71:81:97:4b:0a:65:21: 51:17:53:a6:93:65:df:04:b1:e5:83:ff:dc:7c:1c:7b: 6d:a2:e0:c0:cc:9f:72:83:35:96:ee:dc:f7:c1:71:57: 27:c7:51:28:1a:4a:c9:9e:15:ad:da:6f:55:aa:41:46: 60:7d:1b:72:1c:fd:6b:7e:5e:2d:ff:44:aa:df:1a:75: db:8a:21:8a:90:5f:21:73:7a:99:87:00:f0:fd:2e:39: 57:e1:df:81:d1:e5:7a:59:fa:e9:8e:c6:b4:96:65:39: 89:ea:7a:4a:2a:67:ec:56:da:a7:d2:0c:7e:0c:29:81: 69:d9:a4:d7:7d:57:90:fc:1f:b3:92:c6:9c:56:1b:36: f7:45:93:9f:e7:11:39:5e:cc:3f:52:8f:d0:df:02:1d Fingerprint (SHA-256): 5B:FF:67:1B:C3:C4:23:ED:DF:A6:F7:B8:02:9D:99:C1:BF:13:1A:77:DC:92:75:EF:6B:F9:BD:6F:E9:CE:2F:B0 Fingerprint (SHA1): 2B:05:C2:42:9A:8D:FE:EF:C5:02:E7:79:07:8D:F0:2B:0E:F0:EA:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193262 (0x1315c2ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 20 19:33:33 2023 Not After : Mon Mar 20 19:33:33 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:61:b7:c2:a6:6f:be:30:42:d1:53:31:10:39:2e:cf: a8:2f:9c:d2:29:ed:23:f9:8c:b6:60:d7:18:94:e4:18: 44:fc:e6:b4:db:d8:dc:27:0d:4c:f6:23:96:a2:57:7d: b8:46:38:76:2e:ef:82:84:7d:41:6c:85:43:9c:37:f7: 45:ff:4a:b6:24:36:07:01:00:7d:a0:3c:5b:4e:fb:81: 45:32:97:51:dd:c7:79:33:67:9c:8f:c6:e6:c4:95:cd: 9c:dd:cd:8d:d1:66:8a:9e:5a:bc:a0:99:ef:01:24:74: ee:b1:95:d5:cd:8e:f2:f8:20:0c:2e:04:39:81:f9:f3: 1e:67:51:5c:6f:d0:6b:7c:a3:0e:3b:7e:6d:99:72:c6: 39:72:d8:03:3a:92:d0:17:5c:a3:19:04:29:50:c1:82: d1:03:b6:f7:da:f7:37:39:a8:7b:b8:74:bd:c0:07:22: d1:39:13:8d:a1:4c:eb:ce:02:9e:b5:4c:46:53:81:97: 59:f3:b0:7b:e3:f9:ae:f7:23:a1:ca:57:a1:27:40:27: 79:73:23:2c:8b:52:28:1c:18:4e:46:8b:ae:00:89:f7: 46:e8:19:d4:5d:5f:32:a5:b6:03:bd:4e:39:34:29:e4: 5b:82:24:04:16:3e:13:49:33:7c:f9:5a:b8:b8:2b:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:e7:dd:ba:b3:e6:82:65:03:ef:c4:2d:1f:66:e9:9d: 09:f8:6e:ef:3e:0b:5c:2a:7e:e7:fd:bc:09:a6:01:b7: 3c:d6:c9:ba:31:6f:e5:ca:26:26:7e:29:41:57:40:c2: fa:08:ec:b4:fe:17:f9:df:02:9f:5c:1d:e7:b6:04:a6: 19:31:19:76:23:46:1c:25:42:50:2a:81:d2:f3:b7:8d: 55:53:f6:b4:d5:8e:79:ea:e2:35:2a:a4:ca:3f:c0:dd: fc:ae:e9:cb:13:2f:62:22:f0:7c:c2:b1:3f:c3:10:a2: 16:5e:bf:fd:b2:28:a4:86:4b:70:6f:2a:88:7d:f6:b2: a9:fb:23:05:04:3f:15:2b:cf:1c:fc:75:5f:41:4f:02: 82:96:ed:cf:2b:30:f4:74:71:8e:66:3f:df:ae:83:6d: 9b:c4:5d:3d:84:e4:7d:a8:62:9b:21:79:b7:82:fe:a8: ab:08:f8:85:70:08:16:94:9d:48:ba:eb:e6:a0:af:02: 67:38:78:c8:e3:97:7a:da:75:39:7b:1c:84:13:8e:b1: d2:59:1d:21:72:79:c2:08:94:fa:12:65:28:95:1e:7e: 4b:30:7b:a5:f5:a1:b9:a2:96:56:67:5e:9d:1e:f4:c1: ae:bb:ab:2f:9c:b5:17:be:c1:a2:30:d2:da:e0:2c:f7 Fingerprint (SHA-256): 37:34:F6:9F:54:D0:23:61:65:AE:78:E2:8C:A7:1D:28:E5:4C:B0:2F:3A:FC:F5:E3:E4:8F:AD:22:F7:19:69:6C Fingerprint (SHA1): 98:32:FE:0C:A8:77:18:9C:98:05:96:7F:6B:ED:F7:45:52:61:E5:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193263 (0x1315c2ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 20 19:33:34 2023 Not After : Mon Mar 20 19:33:34 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:ac:51:40:2a:07:79:8e:72:9f:b2:a4:78:18:d6:4b: 10:a2:3f:9a:18:54:7a:3f:84:ce:c2:8c:5e:fd:a9:1c: 21:0a:04:41:03:c3:4b:b7:e7:36:dd:d7:cb:7e:36:38: dc:91:39:d1:08:82:a6:7a:5a:aa:2b:28:ca:35:64:8a: 64:73:8d:87:95:60:87:b6:10:15:8b:43:4b:af:cb:1c: e2:a9:e5:15:d2:e9:e0:56:54:62:77:ef:ab:d0:62:a7: a9:77:5c:50:79:b2:9b:49:bb:6c:f9:50:cf:64:07:be: e2:9b:9b:0c:39:69:e4:18:04:a9:74:b8:01:23:c6:30: bf:bd:94:db:3d:cd:4a:6f:92:fc:53:a7:dc:b8:1b:4c: 64:82:8d:0e:8a:28:38:db:6c:72:ef:1a:cb:27:31:ab: 14:ba:f5:fa:2f:cb:93:d4:19:2f:c2:8e:5a:e3:ff:6d: e0:86:29:3e:71:f5:cf:2e:aa:e3:36:29:30:b8:72:cc: 5a:24:52:a8:4f:c1:65:d0:27:77:72:72:f8:08:7e:04: 3b:4c:4d:71:6c:e0:1e:a9:77:5c:b2:a8:0e:ec:c2:a7: 93:75:d3:f2:28:54:c3:9c:48:61:af:4f:41:3d:68:50: f4:e0:b7:f3:72:52:5d:f6:64:4b:9f:46:73:c3:7b:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:a6:44:7d:90:1d:21:0b:6f:59:a4:fd:59:f9:75:0c: 6a:36:ab:44:30:5b:f7:0d:13:75:88:7c:88:ba:de:72: d8:cd:50:72:0a:7e:d1:df:3f:81:e0:0d:a0:3e:e4:94: 71:25:16:f8:17:6b:fd:7f:d1:f4:6f:95:56:0d:3b:3f: fc:37:fa:19:83:b7:18:ac:f9:5f:03:f0:96:f4:11:25: 08:3e:09:6e:b4:f3:a6:73:e3:c4:29:2b:a6:a8:5a:0c: f5:c0:3c:1a:92:95:f3:9e:6b:ff:b8:bd:36:3d:91:ac: 6e:cb:94:c8:8e:2c:d5:46:0c:a8:7a:ff:47:df:b6:4a: 29:82:ad:72:7a:2a:8b:ae:42:c8:5e:58:5a:16:d6:7f: 2e:fd:b8:ae:ab:81:8a:be:75:46:ae:87:2c:b8:be:0c: 0a:46:a8:dc:00:b6:c7:42:25:aa:11:7b:b4:d8:e7:e7: 1d:2f:8f:3f:1f:73:70:9d:aa:3e:3a:a4:29:e0:fc:59: 4d:73:49:dc:a1:4a:d1:4e:51:e7:68:06:3a:2c:c3:02: 03:d9:df:fc:0b:53:46:b4:a0:6d:82:c5:40:0e:aa:06: 88:b8:56:84:4b:54:01:cb:6b:79:c8:ae:84:82:e0:39: 94:70:9b:24:98:40:3a:d7:ff:a3:4a:c3:58:04:d1:b6 Fingerprint (SHA-256): A5:1E:A3:E3:19:D0:ED:F8:EA:88:72:92:D1:88:DC:3A:BA:8E:E3:4E:BA:B5:93:B6:66:0F:DA:D3:40:C3:90:20 Fingerprint (SHA1): 9B:E8:6F:E2:81:C2:5C:61:F5:80:72:21:5A:BD:6C:6A:FD:80:3A:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193264 (0x1315c2f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 20 19:33:34 2023 Not After : Mon Mar 20 19:33:34 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:48:e8:3f:e3:f7:22:2c:f3:b8:bc:90:6d:16:8f:b3: 33:0a:3d:a7:9f:6b:0a:ac:58:75:3f:36:06:07:c7:11: 95:8f:10:02:8f:db:c5:13:b6:01:8d:9f:01:cb:9e:42: 28:71:04:6d:ab:7c:13:45:2c:28:1a:16:03:28:ce:1d: 9b:68:e2:41:67:7a:dc:0c:d1:44:96:4b:58:5e:84:28: 10:ed:39:9f:b5:3a:37:e4:cd:31:41:de:3d:88:e4:2c: 70:28:02:39:7f:4e:ac:ec:4f:e6:a6:29:6f:c5:8f:4f: bd:1f:a3:48:5c:3f:67:00:48:63:34:6a:4c:d8:2f:08: 0a:0a:e4:86:48:73:35:24:b0:8d:2e:a7:44:d7:bf:22: 79:36:7f:e1:40:f2:33:33:07:5a:61:b1:93:3c:a1:30: 0f:01:d5:50:97:d4:31:e0:7f:e9:0b:18:d8:3c:1e:ca: d2:df:bf:98:b9:42:aa:21:8d:37:5e:02:b1:da:b1:cd: 61:b1:da:1b:34:66:bd:9f:a8:45:02:45:66:7d:d7:7a: a6:25:1c:ea:3b:27:2b:6a:cf:1e:2d:87:d5:87:cf:b4: f9:f2:e1:dd:8b:6a:4e:eb:37:5b:fe:02:71:9a:26:af: b4:49:d7:32:c7:0c:b0:fc:27:a9:3f:77:c6:86:51:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:bd:e0:10:93:32:f4:7b:a7:0b:d9:9d:b7:18:f1:0d: ab:aa:b5:54:6a:3d:68:0f:68:7d:23:d0:bd:71:eb:10: 11:2c:3e:b7:1b:eb:86:ed:1a:51:b1:9f:d8:df:bd:8e: e6:ca:24:75:ba:de:2f:5b:73:42:3f:3f:c8:fb:6f:1b: 32:6f:53:5b:f3:f1:00:83:8d:ac:c1:d7:58:12:9e:27: 1e:f6:c3:5b:13:72:ed:cb:c1:d9:63:e4:8b:39:9b:e9: bb:1f:35:3b:23:b0:31:c9:56:7a:41:38:03:44:a0:3d: 94:f6:83:74:75:93:4d:e9:2f:96:b9:0d:94:88:0e:9b: 29:55:5e:8d:e9:d6:bc:77:f2:98:49:17:8e:b7:72:f0: e2:f3:92:36:5e:f4:4c:71:5e:13:24:f0:b8:97:8c:bb: f2:0b:90:b5:c7:d6:cf:d9:61:65:fb:8a:27:84:fe:4f: 7c:28:7a:67:fe:c8:e0:aa:cf:40:27:93:07:b3:c0:fe: ab:61:b0:15:46:85:e9:41:6c:09:02:0b:ad:17:33:1a: 47:31:b1:b8:e3:3a:83:87:37:74:03:36:50:bf:c4:9a: fa:a6:5a:d6:d9:88:b1:7b:c6:bf:e5:74:df:9e:ff:ed: c9:52:72:98:56:8a:57:44:e8:c5:4d:5d:78:a0:49:c5 Fingerprint (SHA-256): 64:36:58:33:12:86:BF:31:2A:C1:97:25:F5:37:BF:22:FD:EF:F0:D2:2F:D3:67:1B:7E:E7:16:63:0A:65:70:87 Fingerprint (SHA1): CC:BE:3E:F0:A6:0F:87:16:0B:F1:1D:2A:34:95:57:AB:2D:4A:5E:89 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193279 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193280 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193281 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320193282 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193279 (0x1315c2ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:43 2023 Not After : Mon Mar 20 19:33:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:75:02:bb:80:38:22:de:24:9f:cf:f0:bf:2d:25:f5: 78:55:46:fb:16:97:d7:52:eb:89:56:08:10:50:bd:24: 12:97:d2:c8:45:1a:be:c8:50:0e:ca:d7:54:2a:c0:c2: 4d:b3:fe:4c:e6:dc:44:a2:7c:a1:3f:36:96:af:f6:cc: a2:e9:7f:00:40:fd:ef:de:f1:56:09:14:db:94:76:32: 6e:ef:ac:b8:62:c5:94:f7:13:f1:62:8c:e5:44:63:0e: 01:fe:e5:18:ad:8b:fe:51:94:e0:51:be:27:f5:8a:0c: 96:ea:b5:09:c6:5f:0f:ee:8f:56:38:92:fd:b2:a4:3d: 90:ef:2a:34:df:c5:80:21:97:ca:d0:32:ae:9d:80:68: 25:c5:e6:cc:24:ba:b6:f7:e3:c4:6b:b1:7d:2c:7a:56: 4e:45:c4:49:cb:4e:06:fe:b1:d1:6e:7d:2b:b0:f3:b8: 6b:2d:e1:07:59:91:ad:97:e9:7e:99:5b:b6:ca:08:42: 90:71:db:2b:3c:8e:b3:7c:0e:e2:f5:eb:10:2e:da:25: a0:51:22:6f:56:a5:45:fc:3b:bb:57:60:58:60:96:55: 0a:26:26:0e:66:38:9f:99:db:7f:76:65:01:59:12:02: e6:dc:fb:70:b2:99:da:bd:de:23:97:99:4e:f2:b8:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:75:2e:18:ba:cf:73:14:5c:42:0f:a6:36:ff:57:4c: 41:66:0c:e5:59:65:a7:07:28:81:75:7a:f5:6d:f9:4d: 58:04:61:a7:de:1c:14:8c:d7:e4:dc:61:28:25:50:0d: ee:ff:73:35:37:46:91:c8:7d:2a:d4:85:fb:e5:ee:a6: 0f:2a:3f:c0:59:3c:62:b5:90:24:c2:72:64:9c:06:4f: 48:81:fd:dd:f2:94:85:43:7a:ff:9e:b3:0b:c3:63:d1: 90:49:f7:4d:69:ad:df:77:6c:6e:3f:05:91:e3:3e:da: 63:98:82:37:58:8f:ee:6a:83:fe:2b:54:28:76:ea:17: 7e:ef:b3:bb:15:e7:71:bb:cf:47:da:48:b4:74:47:5c: 68:d6:51:e8:9b:d3:49:29:24:e7:80:49:ea:e5:58:1b: 2c:87:af:dd:c2:40:67:3c:17:ec:b7:f3:6d:ac:31:1f: e6:ce:11:30:28:f6:1f:50:2c:13:2c:b9:2f:51:09:3c: 40:da:11:0a:8a:61:b8:04:d7:9c:80:9a:3a:82:a8:80: 42:34:4b:cf:04:09:51:bd:5c:78:ab:b8:6f:44:a2:81: ba:32:dd:15:c9:19:9a:0b:00:ca:c2:d2:75:98:82:7f: 53:74:b5:02:e5:f9:0e:01:68:2f:d2:63:f4:63:0f:ae Fingerprint (SHA-256): BD:D5:8E:AB:BC:21:6B:20:13:FB:2D:36:53:BB:D9:7D:C7:ED:34:FD:45:59:EC:51:5F:0E:BA:5E:7A:5B:08:33 Fingerprint (SHA1): DF:21:AA:9C:22:01:A6:11:74:3E:18:8D:D1:2A:FD:94:A1:99:BD:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193280 (0x1315c300) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:44 2023 Not After : Mon Mar 20 19:33:44 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f1:e0:93:fc:37:12:e1:f7:39:5e:9d:1f:7f:24:7d: b7:82:1d:be:2c:32:87:aa:0f:67:7f:89:a6:06:4f:2b: 61:9e:b8:07:e0:89:33:14:a8:fd:51:19:05:06:ce:81: 47:9f:84:1d:52:60:8b:74:2e:70:ad:49:39:ba:7c:99: 4f:30:c0:89:e7:4c:c6:87:69:d2:41:84:7d:72:ea:ca: b7:33:f3:bb:67:52:db:49:56:ca:66:49:8d:0d:c9:76: 68:a2:ab:46:34:ee:b0:86:70:45:3d:85:f7:2e:76:ff: 2b:ee:be:f2:8a:d0:21:6b:3c:aa:85:b7:2a:70:b0:1c: b1:23:1b:01:62:2e:4f:21:c5:c8:93:ba:53:5f:f8:9c: a6:14:b8:c1:e3:0e:04:34:5a:0c:20:38:a9:c3:9c:62: cd:4c:1d:be:c1:93:6a:b9:70:8f:aa:fe:71:5a:21:f2: 50:c7:5b:ca:b1:63:7b:13:e6:e5:14:99:94:55:d1:63: 31:57:74:4d:93:a3:a6:d3:65:0a:5f:cd:d9:b1:6f:1d: 44:fd:eb:70:b4:6d:9e:19:f6:63:68:26:05:45:d9:ce: 75:53:37:2b:6c:94:f9:8e:05:d1:7a:19:3d:b3:93:69: 94:4a:61:57:63:b3:bd:bd:2a:c9:ab:38:42:c3:3d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:aa:9d:29:d6:a8:48:98:1a:58:7b:14:90:d1:1a:a5: 43:4e:9f:67:2b:4b:56:a3:c3:48:ac:5b:f4:73:17:88: 2c:a1:98:cb:03:42:65:c3:a4:d0:ee:be:d1:d9:42:ac: 92:96:af:9c:0e:fe:c9:91:da:40:ac:2c:74:1d:30:9d: 84:a4:8f:7d:9c:db:e0:27:f0:1e:dd:3e:ab:0e:96:da: 5b:ba:2b:fd:dc:98:28:da:9d:5b:80:7c:86:28:12:fb: 07:a3:2e:7f:9e:b6:01:9b:37:3f:fe:f6:2e:9b:32:58: 9c:40:d3:8e:14:40:a2:46:15:19:77:39:09:1e:ca:e8: 5e:77:54:e8:18:11:b6:03:ec:88:8f:73:ae:0f:ca:4d: da:fb:39:e1:bb:7f:d9:61:8a:56:9a:24:39:18:aa:b4: 7f:73:fb:c3:6e:2c:c0:29:41:dc:79:be:6a:ab:8b:78: 55:42:2f:55:d1:c6:62:38:00:bf:e1:a4:55:ea:1f:14: 80:e0:20:1f:9f:bd:4d:5e:f2:05:b5:c0:83:5c:69:fd: 02:cb:e9:e3:2d:84:a8:b2:48:f1:2b:d2:48:33:80:83: c8:94:22:50:3f:76:a6:53:fc:08:4f:8c:29:25:1d:9b: 12:e1:10:d8:c2:d2:3d:3b:a9:05:49:b6:f4:18:38:07 Fingerprint (SHA-256): 77:15:81:D3:5B:B8:A9:CF:E5:04:D8:F2:21:BC:D1:DA:86:3B:40:10:94:14:C4:32:F3:39:E1:7E:15:77:17:C9 Fingerprint (SHA1): 18:D8:A8:3D:64:C1:B7:E0:B3:42:1D:31:B8:AF:1D:BB:A7:64:16:2B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193281 (0x1315c301) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:33:44 2023 Not After : Mon Mar 20 19:33:44 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:35:3e:5e:18:1d:29:83:c6:db:15:87:ab:6c:50:80: 47:c6:7d:a1:2d:28:97:79:8a:07:1b:3e:2d:cc:c7:a9: 4b:42:39:23:1c:a2:a7:49:67:98:a0:41:67:43:9d:30: 56:3b:18:9d:dc:3d:d8:7a:a5:63:0d:c4:7f:fc:2d:bc: 1f:b6:59:ba:26:f4:a8:77:e4:c2:3a:47:db:69:e6:b5: 08:2c:53:70:62:e5:ee:ca:f9:2b:1e:34:87:52:5d:c0: db:e6:60:cf:62:c0:96:f4:59:92:ea:b8:0a:1f:db:b4: 40:33:bf:97:7e:b7:e3:ba:97:ba:5c:8c:f0:8c:c1:90: ac:fa:6a:fc:ef:e6:a5:46:66:ae:79:cc:08:fd:65:56: 5c:11:b3:e3:11:45:b9:9d:42:de:c5:b7:c0:17:47:10: 1b:55:10:d5:2b:2e:04:ce:16:67:24:21:22:db:1e:65: 07:b2:98:85:da:c4:6e:0c:8a:3a:ac:e8:72:95:52:55: e7:db:96:a8:13:52:da:52:c5:54:3c:17:72:3c:76:75: 43:f5:46:53:f4:07:f9:80:53:05:ec:58:e1:00:4f:cf: 95:f2:0b:63:07:3c:ef:ce:3e:49:b6:46:b3:62:b9:e4: 36:f3:b8:d2:5e:95:3a:08:f4:c8:f3:17:57:2f:79:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:69:f1:56:47:f9:4a:01:0f:b6:4e:87:84:32:4a:44: 90:d6:9f:0c:a3:80:cb:59:60:7e:2d:e4:56:b6:24:53: 0f:a7:c4:e5:9f:8a:2b:d9:9b:e3:c0:44:88:6b:c6:8d: 5f:4b:bf:7e:3d:16:38:45:ae:57:55:bf:6c:8a:59:c4: b2:e5:94:ad:c5:41:90:68:fb:1f:ff:06:18:23:f6:74: 04:6d:06:93:98:ef:01:38:a5:29:e8:6f:b5:2a:bb:66: ac:be:10:e9:f6:92:90:0d:9b:8a:51:2d:8b:f0:d8:32: 0a:1c:90:b7:d4:58:db:6d:d7:36:62:e2:68:df:8e:5a: 40:56:5d:6b:ff:48:20:65:a6:f7:fe:b5:77:bf:3d:a5: bb:b7:bc:06:83:92:2a:ca:92:4a:87:1b:14:21:0e:4e: 4c:1f:0b:88:19:96:94:93:c1:7a:e1:4d:72:11:68:ec: 75:3e:39:3b:eb:d6:5b:05:35:ae:c9:57:72:6e:77:b4: 31:27:fb:f3:df:cd:31:d2:d0:58:b4:ab:67:69:9c:7c: b0:17:f9:c7:a7:a7:3e:58:cc:34:08:c2:39:36:d7:12: aa:fb:85:8b:8c:ba:2c:1d:76:98:04:48:5b:69:75:2f: b7:9e:6a:70:d1:31:3e:1a:32:de:f0:8f:9e:fb:83:b9 Fingerprint (SHA-256): D4:80:2E:52:84:C8:8C:8C:3F:62:A6:93:1E:C7:F3:00:DE:46:AE:A0:E0:B1:5F:B8:8B:7C:00:AF:EA:87:C7:17 Fingerprint (SHA1): 27:79:85:B6:E6:EC:60:7C:E2:F7:EC:CC:43:39:36:6D:46:27:B9:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193279 (0x1315c2ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:43 2023 Not After : Mon Mar 20 19:33:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:75:02:bb:80:38:22:de:24:9f:cf:f0:bf:2d:25:f5: 78:55:46:fb:16:97:d7:52:eb:89:56:08:10:50:bd:24: 12:97:d2:c8:45:1a:be:c8:50:0e:ca:d7:54:2a:c0:c2: 4d:b3:fe:4c:e6:dc:44:a2:7c:a1:3f:36:96:af:f6:cc: a2:e9:7f:00:40:fd:ef:de:f1:56:09:14:db:94:76:32: 6e:ef:ac:b8:62:c5:94:f7:13:f1:62:8c:e5:44:63:0e: 01:fe:e5:18:ad:8b:fe:51:94:e0:51:be:27:f5:8a:0c: 96:ea:b5:09:c6:5f:0f:ee:8f:56:38:92:fd:b2:a4:3d: 90:ef:2a:34:df:c5:80:21:97:ca:d0:32:ae:9d:80:68: 25:c5:e6:cc:24:ba:b6:f7:e3:c4:6b:b1:7d:2c:7a:56: 4e:45:c4:49:cb:4e:06:fe:b1:d1:6e:7d:2b:b0:f3:b8: 6b:2d:e1:07:59:91:ad:97:e9:7e:99:5b:b6:ca:08:42: 90:71:db:2b:3c:8e:b3:7c:0e:e2:f5:eb:10:2e:da:25: a0:51:22:6f:56:a5:45:fc:3b:bb:57:60:58:60:96:55: 0a:26:26:0e:66:38:9f:99:db:7f:76:65:01:59:12:02: e6:dc:fb:70:b2:99:da:bd:de:23:97:99:4e:f2:b8:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:75:2e:18:ba:cf:73:14:5c:42:0f:a6:36:ff:57:4c: 41:66:0c:e5:59:65:a7:07:28:81:75:7a:f5:6d:f9:4d: 58:04:61:a7:de:1c:14:8c:d7:e4:dc:61:28:25:50:0d: ee:ff:73:35:37:46:91:c8:7d:2a:d4:85:fb:e5:ee:a6: 0f:2a:3f:c0:59:3c:62:b5:90:24:c2:72:64:9c:06:4f: 48:81:fd:dd:f2:94:85:43:7a:ff:9e:b3:0b:c3:63:d1: 90:49:f7:4d:69:ad:df:77:6c:6e:3f:05:91:e3:3e:da: 63:98:82:37:58:8f:ee:6a:83:fe:2b:54:28:76:ea:17: 7e:ef:b3:bb:15:e7:71:bb:cf:47:da:48:b4:74:47:5c: 68:d6:51:e8:9b:d3:49:29:24:e7:80:49:ea:e5:58:1b: 2c:87:af:dd:c2:40:67:3c:17:ec:b7:f3:6d:ac:31:1f: e6:ce:11:30:28:f6:1f:50:2c:13:2c:b9:2f:51:09:3c: 40:da:11:0a:8a:61:b8:04:d7:9c:80:9a:3a:82:a8:80: 42:34:4b:cf:04:09:51:bd:5c:78:ab:b8:6f:44:a2:81: ba:32:dd:15:c9:19:9a:0b:00:ca:c2:d2:75:98:82:7f: 53:74:b5:02:e5:f9:0e:01:68:2f:d2:63:f4:63:0f:ae Fingerprint (SHA-256): BD:D5:8E:AB:BC:21:6B:20:13:FB:2D:36:53:BB:D9:7D:C7:ED:34:FD:45:59:EC:51:5F:0E:BA:5E:7A:5B:08:33 Fingerprint (SHA1): DF:21:AA:9C:22:01:A6:11:74:3E:18:8D:D1:2A:FD:94:A1:99:BD:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193280 (0x1315c300) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:44 2023 Not After : Mon Mar 20 19:33:44 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f1:e0:93:fc:37:12:e1:f7:39:5e:9d:1f:7f:24:7d: b7:82:1d:be:2c:32:87:aa:0f:67:7f:89:a6:06:4f:2b: 61:9e:b8:07:e0:89:33:14:a8:fd:51:19:05:06:ce:81: 47:9f:84:1d:52:60:8b:74:2e:70:ad:49:39:ba:7c:99: 4f:30:c0:89:e7:4c:c6:87:69:d2:41:84:7d:72:ea:ca: b7:33:f3:bb:67:52:db:49:56:ca:66:49:8d:0d:c9:76: 68:a2:ab:46:34:ee:b0:86:70:45:3d:85:f7:2e:76:ff: 2b:ee:be:f2:8a:d0:21:6b:3c:aa:85:b7:2a:70:b0:1c: b1:23:1b:01:62:2e:4f:21:c5:c8:93:ba:53:5f:f8:9c: a6:14:b8:c1:e3:0e:04:34:5a:0c:20:38:a9:c3:9c:62: cd:4c:1d:be:c1:93:6a:b9:70:8f:aa:fe:71:5a:21:f2: 50:c7:5b:ca:b1:63:7b:13:e6:e5:14:99:94:55:d1:63: 31:57:74:4d:93:a3:a6:d3:65:0a:5f:cd:d9:b1:6f:1d: 44:fd:eb:70:b4:6d:9e:19:f6:63:68:26:05:45:d9:ce: 75:53:37:2b:6c:94:f9:8e:05:d1:7a:19:3d:b3:93:69: 94:4a:61:57:63:b3:bd:bd:2a:c9:ab:38:42:c3:3d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:aa:9d:29:d6:a8:48:98:1a:58:7b:14:90:d1:1a:a5: 43:4e:9f:67:2b:4b:56:a3:c3:48:ac:5b:f4:73:17:88: 2c:a1:98:cb:03:42:65:c3:a4:d0:ee:be:d1:d9:42:ac: 92:96:af:9c:0e:fe:c9:91:da:40:ac:2c:74:1d:30:9d: 84:a4:8f:7d:9c:db:e0:27:f0:1e:dd:3e:ab:0e:96:da: 5b:ba:2b:fd:dc:98:28:da:9d:5b:80:7c:86:28:12:fb: 07:a3:2e:7f:9e:b6:01:9b:37:3f:fe:f6:2e:9b:32:58: 9c:40:d3:8e:14:40:a2:46:15:19:77:39:09:1e:ca:e8: 5e:77:54:e8:18:11:b6:03:ec:88:8f:73:ae:0f:ca:4d: da:fb:39:e1:bb:7f:d9:61:8a:56:9a:24:39:18:aa:b4: 7f:73:fb:c3:6e:2c:c0:29:41:dc:79:be:6a:ab:8b:78: 55:42:2f:55:d1:c6:62:38:00:bf:e1:a4:55:ea:1f:14: 80:e0:20:1f:9f:bd:4d:5e:f2:05:b5:c0:83:5c:69:fd: 02:cb:e9:e3:2d:84:a8:b2:48:f1:2b:d2:48:33:80:83: c8:94:22:50:3f:76:a6:53:fc:08:4f:8c:29:25:1d:9b: 12:e1:10:d8:c2:d2:3d:3b:a9:05:49:b6:f4:18:38:07 Fingerprint (SHA-256): 77:15:81:D3:5B:B8:A9:CF:E5:04:D8:F2:21:BC:D1:DA:86:3B:40:10:94:14:C4:32:F3:39:E1:7E:15:77:17:C9 Fingerprint (SHA1): 18:D8:A8:3D:64:C1:B7:E0:B3:42:1D:31:B8:AF:1D:BB:A7:64:16:2B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193281 (0x1315c301) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:33:44 2023 Not After : Mon Mar 20 19:33:44 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:35:3e:5e:18:1d:29:83:c6:db:15:87:ab:6c:50:80: 47:c6:7d:a1:2d:28:97:79:8a:07:1b:3e:2d:cc:c7:a9: 4b:42:39:23:1c:a2:a7:49:67:98:a0:41:67:43:9d:30: 56:3b:18:9d:dc:3d:d8:7a:a5:63:0d:c4:7f:fc:2d:bc: 1f:b6:59:ba:26:f4:a8:77:e4:c2:3a:47:db:69:e6:b5: 08:2c:53:70:62:e5:ee:ca:f9:2b:1e:34:87:52:5d:c0: db:e6:60:cf:62:c0:96:f4:59:92:ea:b8:0a:1f:db:b4: 40:33:bf:97:7e:b7:e3:ba:97:ba:5c:8c:f0:8c:c1:90: ac:fa:6a:fc:ef:e6:a5:46:66:ae:79:cc:08:fd:65:56: 5c:11:b3:e3:11:45:b9:9d:42:de:c5:b7:c0:17:47:10: 1b:55:10:d5:2b:2e:04:ce:16:67:24:21:22:db:1e:65: 07:b2:98:85:da:c4:6e:0c:8a:3a:ac:e8:72:95:52:55: e7:db:96:a8:13:52:da:52:c5:54:3c:17:72:3c:76:75: 43:f5:46:53:f4:07:f9:80:53:05:ec:58:e1:00:4f:cf: 95:f2:0b:63:07:3c:ef:ce:3e:49:b6:46:b3:62:b9:e4: 36:f3:b8:d2:5e:95:3a:08:f4:c8:f3:17:57:2f:79:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:69:f1:56:47:f9:4a:01:0f:b6:4e:87:84:32:4a:44: 90:d6:9f:0c:a3:80:cb:59:60:7e:2d:e4:56:b6:24:53: 0f:a7:c4:e5:9f:8a:2b:d9:9b:e3:c0:44:88:6b:c6:8d: 5f:4b:bf:7e:3d:16:38:45:ae:57:55:bf:6c:8a:59:c4: b2:e5:94:ad:c5:41:90:68:fb:1f:ff:06:18:23:f6:74: 04:6d:06:93:98:ef:01:38:a5:29:e8:6f:b5:2a:bb:66: ac:be:10:e9:f6:92:90:0d:9b:8a:51:2d:8b:f0:d8:32: 0a:1c:90:b7:d4:58:db:6d:d7:36:62:e2:68:df:8e:5a: 40:56:5d:6b:ff:48:20:65:a6:f7:fe:b5:77:bf:3d:a5: bb:b7:bc:06:83:92:2a:ca:92:4a:87:1b:14:21:0e:4e: 4c:1f:0b:88:19:96:94:93:c1:7a:e1:4d:72:11:68:ec: 75:3e:39:3b:eb:d6:5b:05:35:ae:c9:57:72:6e:77:b4: 31:27:fb:f3:df:cd:31:d2:d0:58:b4:ab:67:69:9c:7c: b0:17:f9:c7:a7:a7:3e:58:cc:34:08:c2:39:36:d7:12: aa:fb:85:8b:8c:ba:2c:1d:76:98:04:48:5b:69:75:2f: b7:9e:6a:70:d1:31:3e:1a:32:de:f0:8f:9e:fb:83:b9 Fingerprint (SHA-256): D4:80:2E:52:84:C8:8C:8C:3F:62:A6:93:1E:C7:F3:00:DE:46:AE:A0:E0:B1:5F:B8:8B:7C:00:AF:EA:87:C7:17 Fingerprint (SHA1): 27:79:85:B6:E6:EC:60:7C:E2:F7:EC:CC:43:39:36:6D:46:27:B9:D0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193283 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193284 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193285 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320193286 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320193287 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193283 (0x1315c303) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:47 2023 Not After : Mon Mar 20 19:33:47 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:84:e0:f3:35:33:91:b7:de:36:0b:b6:f3:fd:d1: 9b:93:d7:5d:2d:b4:97:4d:74:fa:61:01:2b:db:b6:8b: 27:9a:f0:d2:db:0c:d2:39:59:e7:24:74:6a:2f:6d:c0: 2e:b4:36:5a:e8:aa:cc:79:b8:ae:68:a2:bc:65:2a:05: 14:39:b4:bd:b3:b2:22:b6:10:f9:aa:64:07:b4:6f:e0: 9f:88:e2:bc:8e:cd:e9:4f:06:bd:7e:52:09:43:d5:0d: 7b:2d:3a:00:b0:c9:56:24:bb:f2:f2:4f:a1:3f:3d:a3: d9:3a:cb:16:5e:2d:e1:be:18:a7:91:17:9e:b3:25:fa: 41:a7:40:ce:f8:83:d3:52:e5:08:ba:91:1e:e9:3b:c9: 46:a4:52:1e:c2:f0:6a:0a:e1:79:d9:5d:09:73:2f:5d: 34:0d:26:5b:d6:31:98:69:dc:ff:9c:5d:13:dd:a2:3d: a4:92:59:61:5f:c3:ef:c0:4f:1d:0e:be:30:a5:6e:98: 9c:70:67:00:6a:d0:83:32:03:cf:1b:ef:29:b6:18:69: 93:9a:a5:bb:99:af:6c:b6:3b:24:f6:16:dc:9b:d4:50: 74:6f:9b:e8:39:01:bb:a1:67:4a:8c:d8:f8:35:55:04: af:0e:ac:22:e9:4d:23:aa:33:9e:22:4d:1b:26:64:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:24:75:b4:85:b8:02:d4:26:5f:b1:90:05:f3:86:8c: 0b:1f:37:46:b5:e2:f9:5e:0e:b0:aa:11:24:ed:3c:a5: 37:6e:df:d4:08:6b:ee:4d:70:2f:7b:de:e9:21:37:d6: 2a:a7:34:64:4c:b9:28:c5:4f:3c:2e:3c:32:9c:17:7d: d3:01:37:15:fa:22:8f:e1:f2:79:e7:e2:8c:fd:34:53: 17:44:80:2d:56:ef:fd:92:3d:16:b9:41:2e:c5:34:11: a9:b9:1a:a7:5c:37:41:6d:61:00:d2:68:10:96:bd:7a: 2e:22:64:aa:b5:bc:5f:1b:80:39:05:e0:71:ba:fe:ea: 35:cd:fc:ed:37:28:5b:29:a2:40:f8:3f:e2:18:54:81: 64:14:2c:28:c3:61:5d:f8:06:ce:b6:f2:d3:23:06:2e: a1:15:6f:7e:6e:20:89:d1:89:8c:1e:e6:a0:71:0e:bd: 29:43:0c:a4:c1:14:74:9c:04:49:fa:b5:47:38:ce:9a: 21:04:bb:2c:f6:bb:95:49:a3:22:fc:e8:6b:29:81:a7: ae:5b:2a:92:f7:ec:ba:73:dc:1e:4f:42:24:8c:4f:79: d1:51:56:58:13:e3:b5:e5:3d:bd:86:62:d3:fe:8d:6e: 2c:5f:f5:e1:18:86:cf:09:76:5c:6f:46:ba:3d:db:d2 Fingerprint (SHA-256): A4:7C:50:E7:22:46:E1:DB:23:12:97:14:CB:00:BE:E7:F4:87:CB:F1:55:FF:E9:4D:4C:27:B4:37:95:45:FC:33 Fingerprint (SHA1): 6B:04:F9:7A:D1:60:F6:BA:9E:EB:C3:3C:04:1E:80:77:FD:61:88:DE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193284 (0x1315c304) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:24:92:4a:58:23:73:db:b9:ab:8c:54:36:3f:57:33: bb:60:a1:87:dd:b0:5d:5c:76:d7:5c:0b:2d:59:3d:ab: db:fb:36:b1:87:4e:65:e0:fc:41:64:ad:c1:df:29:44: d6:50:7a:b4:d2:fb:74:6d:da:75:3c:1b:37:27:79:d4: be:37:af:9d:53:f8:0d:aa:e2:f3:9f:64:28:2c:a4:50: 73:91:73:44:c7:e2:3e:6c:1c:cc:38:60:13:20:08:ee: 44:e8:83:7b:ee:72:98:1a:6f:23:44:6d:61:c7:96:31: cc:12:8f:53:65:10:0e:95:7f:28:76:07:50:10:0d:bf: 02:24:66:b1:2b:27:7c:f3:5e:63:86:fc:66:0d:3d:43: 5e:75:6a:f5:22:ce:48:7b:e9:49:74:dc:20:1d:e8:7e: 9e:10:f2:44:2a:bc:11:28:3b:31:a4:94:74:38:5a:99: e8:a1:14:61:2e:f9:da:6d:ce:0b:69:87:8a:79:51:31: 6a:0d:41:9c:3c:cd:8b:51:59:35:eb:74:ff:92:d3:8d: 19:65:19:5e:56:d2:87:0f:e7:01:37:0e:69:22:1a:93: 2f:f0:e4:cc:59:38:ec:59:7c:da:51:4e:68:8f:ff:32: 54:1b:d9:4c:32:0b:6a:81:bc:fc:c6:44:f1:90:5a:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:00:18:d1:67:ff:c9:14:2c:ad:69:cd:70:1c:ff:2b: a6:38:82:a5:21:c4:4e:e7:50:82:e8:9c:92:b6:c9:cb: 9d:a1:bd:08:bf:cd:09:41:b7:fd:2e:4e:bf:80:0c:46: 1c:78:4d:7c:4c:72:a0:20:14:90:09:5c:e4:72:00:e1: 9b:dd:15:dc:4e:09:ca:07:47:86:5b:c6:b8:75:fb:12: d7:b3:2e:86:2a:b0:19:5a:00:4d:e5:b8:6e:f2:33:09: ba:64:14:53:d5:ee:ad:2a:4d:87:e4:09:24:33:61:d1: 97:ec:95:5b:fc:5a:2c:63:46:17:7d:2b:67:cf:f4:e3: 23:33:81:74:b3:75:66:79:e8:64:81:05:9b:a5:7f:3c: f2:20:40:4e:d0:a9:29:28:2a:2c:df:b6:a5:87:5f:5e: 29:51:85:dd:05:6c:d0:25:18:30:e7:13:c8:96:e5:33: a4:d4:de:c4:4a:91:32:88:db:6d:14:5e:2b:6a:c9:75: d3:a8:85:cb:14:c6:9a:1f:c8:5e:4a:47:8d:dc:38:fa: e6:d3:cf:5e:a7:41:cf:13:19:d7:b3:59:8e:01:f2:2f: 90:bd:b9:cd:da:04:5a:35:14:8f:5c:12:50:87:16:65: c9:9b:50:c6:62:3e:ab:d1:d6:29:13:0e:e5:5e:63:5f Fingerprint (SHA-256): 7D:C9:3D:E6:03:31:F4:76:CE:9B:0A:74:49:2A:67:3B:C8:1E:C3:7E:E6:C8:7A:55:22:47:DE:41:00:17:32:03 Fingerprint (SHA1): 4D:84:A9:4F:E9:60:1D:87:F2:0A:6F:5E:2E:6B:3B:6B:ED:85:C2:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193285 (0x1315c305) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:bc:b4:48:2b:a7:e2:d0:d5:64:4a:7a:83:b2:b4:08: 95:6a:72:d2:44:38:f4:3f:80:e0:ac:f1:6b:30:67:8b: 8b:b6:67:4d:20:f1:54:ec:22:de:15:c5:3d:f5:5d:bf: 3f:8c:66:17:30:e3:6c:59:71:d8:d0:84:ef:93:21:dc: c9:1b:eb:bb:59:03:60:dc:19:50:ab:a7:ea:c9:73:2e: 9c:af:bb:e8:7b:08:4d:82:b6:ee:83:db:81:24:98:b6: b1:ff:91:ae:89:ad:ab:26:8b:3a:c6:62:47:cc:e2:59: f1:3f:87:fb:11:96:b0:2d:00:c3:5b:04:61:14:69:b8: a7:30:a9:93:2f:fb:8c:5f:d1:65:e8:e1:bc:2a:23:ce: c6:17:45:05:42:3e:3a:ad:79:8c:40:91:98:cc:97:67: ae:1b:ba:df:08:52:7a:df:b8:32:32:27:6f:ca:05:4f: 37:a8:d2:fb:7a:28:5c:87:47:18:94:df:10:f1:82:d3: 2c:d6:79:66:59:3b:4a:5a:76:a0:db:de:3f:c5:2f:a9: e3:2c:5d:09:71:06:19:e4:31:f7:e1:ba:82:4f:96:06: 2f:91:44:3e:1f:81:a5:2c:92:a7:f1:49:51:56:38:60: 1d:dc:66:e4:73:36:0d:aa:49:9e:13:90:85:59:99:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:70:fa:f6:03:9e:d7:8e:54:06:69:30:7a:b7:79:08: d0:d9:c4:d7:f4:b6:a9:be:e3:30:65:b3:74:90:2c:fe: d4:b5:64:3f:7f:ac:ef:d0:d2:ae:60:3c:c3:41:24:ee: 8a:22:fb:61:84:69:5d:77:d2:4e:45:ca:ef:a0:a8:28: 8d:9f:50:2b:fd:40:97:d3:fe:c9:dd:84:04:41:04:3a: 92:57:99:64:dc:96:8f:d0:8a:3f:f7:3c:24:73:71:dc: 82:19:60:56:b9:b2:25:48:1a:49:f5:6c:a9:f6:e8:15: 1f:cb:1d:ac:02:db:47:e6:98:70:8d:8f:c3:2a:7e:68: 9b:12:85:13:32:04:c0:b9:ca:8f:73:c1:d7:d2:e7:65: c8:00:a2:55:7c:f5:85:d5:0f:54:2b:83:ec:97:ea:30: f7:2b:dc:c2:b2:8f:2d:fd:df:83:97:c1:ee:c5:f5:db: 74:69:de:a0:82:23:6b:e8:83:e5:a3:65:01:83:12:98: 1d:cf:5a:eb:d7:bb:d6:3a:d1:30:61:66:d7:40:7d:4b: 87:23:6d:fb:e9:a4:ce:4c:1d:40:ed:45:96:e9:26:6a: 2c:a2:28:c5:f0:13:d7:cf:d2:d4:98:cf:2b:14:d4:9c: bc:50:12:0b:0c:3b:2f:35:be:60:2b:73:8e:12:82:74 Fingerprint (SHA-256): 6F:2E:4F:1F:1E:75:7A:0D:91:DA:2E:48:AA:D8:33:F7:8A:7F:3D:22:39:FA:F1:DB:EA:23:1F:07:1A:8D:F6:BE Fingerprint (SHA1): 2C:F1:7A:B3:A5:36:07:74:55:4B:B0:97:E4:9D:8C:06:60:A3:BF:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193283 (0x1315c303) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:47 2023 Not After : Mon Mar 20 19:33:47 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:84:e0:f3:35:33:91:b7:de:36:0b:b6:f3:fd:d1: 9b:93:d7:5d:2d:b4:97:4d:74:fa:61:01:2b:db:b6:8b: 27:9a:f0:d2:db:0c:d2:39:59:e7:24:74:6a:2f:6d:c0: 2e:b4:36:5a:e8:aa:cc:79:b8:ae:68:a2:bc:65:2a:05: 14:39:b4:bd:b3:b2:22:b6:10:f9:aa:64:07:b4:6f:e0: 9f:88:e2:bc:8e:cd:e9:4f:06:bd:7e:52:09:43:d5:0d: 7b:2d:3a:00:b0:c9:56:24:bb:f2:f2:4f:a1:3f:3d:a3: d9:3a:cb:16:5e:2d:e1:be:18:a7:91:17:9e:b3:25:fa: 41:a7:40:ce:f8:83:d3:52:e5:08:ba:91:1e:e9:3b:c9: 46:a4:52:1e:c2:f0:6a:0a:e1:79:d9:5d:09:73:2f:5d: 34:0d:26:5b:d6:31:98:69:dc:ff:9c:5d:13:dd:a2:3d: a4:92:59:61:5f:c3:ef:c0:4f:1d:0e:be:30:a5:6e:98: 9c:70:67:00:6a:d0:83:32:03:cf:1b:ef:29:b6:18:69: 93:9a:a5:bb:99:af:6c:b6:3b:24:f6:16:dc:9b:d4:50: 74:6f:9b:e8:39:01:bb:a1:67:4a:8c:d8:f8:35:55:04: af:0e:ac:22:e9:4d:23:aa:33:9e:22:4d:1b:26:64:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:24:75:b4:85:b8:02:d4:26:5f:b1:90:05:f3:86:8c: 0b:1f:37:46:b5:e2:f9:5e:0e:b0:aa:11:24:ed:3c:a5: 37:6e:df:d4:08:6b:ee:4d:70:2f:7b:de:e9:21:37:d6: 2a:a7:34:64:4c:b9:28:c5:4f:3c:2e:3c:32:9c:17:7d: d3:01:37:15:fa:22:8f:e1:f2:79:e7:e2:8c:fd:34:53: 17:44:80:2d:56:ef:fd:92:3d:16:b9:41:2e:c5:34:11: a9:b9:1a:a7:5c:37:41:6d:61:00:d2:68:10:96:bd:7a: 2e:22:64:aa:b5:bc:5f:1b:80:39:05:e0:71:ba:fe:ea: 35:cd:fc:ed:37:28:5b:29:a2:40:f8:3f:e2:18:54:81: 64:14:2c:28:c3:61:5d:f8:06:ce:b6:f2:d3:23:06:2e: a1:15:6f:7e:6e:20:89:d1:89:8c:1e:e6:a0:71:0e:bd: 29:43:0c:a4:c1:14:74:9c:04:49:fa:b5:47:38:ce:9a: 21:04:bb:2c:f6:bb:95:49:a3:22:fc:e8:6b:29:81:a7: ae:5b:2a:92:f7:ec:ba:73:dc:1e:4f:42:24:8c:4f:79: d1:51:56:58:13:e3:b5:e5:3d:bd:86:62:d3:fe:8d:6e: 2c:5f:f5:e1:18:86:cf:09:76:5c:6f:46:ba:3d:db:d2 Fingerprint (SHA-256): A4:7C:50:E7:22:46:E1:DB:23:12:97:14:CB:00:BE:E7:F4:87:CB:F1:55:FF:E9:4D:4C:27:B4:37:95:45:FC:33 Fingerprint (SHA1): 6B:04:F9:7A:D1:60:F6:BA:9E:EB:C3:3C:04:1E:80:77:FD:61:88:DE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193284 (0x1315c304) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:24:92:4a:58:23:73:db:b9:ab:8c:54:36:3f:57:33: bb:60:a1:87:dd:b0:5d:5c:76:d7:5c:0b:2d:59:3d:ab: db:fb:36:b1:87:4e:65:e0:fc:41:64:ad:c1:df:29:44: d6:50:7a:b4:d2:fb:74:6d:da:75:3c:1b:37:27:79:d4: be:37:af:9d:53:f8:0d:aa:e2:f3:9f:64:28:2c:a4:50: 73:91:73:44:c7:e2:3e:6c:1c:cc:38:60:13:20:08:ee: 44:e8:83:7b:ee:72:98:1a:6f:23:44:6d:61:c7:96:31: cc:12:8f:53:65:10:0e:95:7f:28:76:07:50:10:0d:bf: 02:24:66:b1:2b:27:7c:f3:5e:63:86:fc:66:0d:3d:43: 5e:75:6a:f5:22:ce:48:7b:e9:49:74:dc:20:1d:e8:7e: 9e:10:f2:44:2a:bc:11:28:3b:31:a4:94:74:38:5a:99: e8:a1:14:61:2e:f9:da:6d:ce:0b:69:87:8a:79:51:31: 6a:0d:41:9c:3c:cd:8b:51:59:35:eb:74:ff:92:d3:8d: 19:65:19:5e:56:d2:87:0f:e7:01:37:0e:69:22:1a:93: 2f:f0:e4:cc:59:38:ec:59:7c:da:51:4e:68:8f:ff:32: 54:1b:d9:4c:32:0b:6a:81:bc:fc:c6:44:f1:90:5a:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:00:18:d1:67:ff:c9:14:2c:ad:69:cd:70:1c:ff:2b: a6:38:82:a5:21:c4:4e:e7:50:82:e8:9c:92:b6:c9:cb: 9d:a1:bd:08:bf:cd:09:41:b7:fd:2e:4e:bf:80:0c:46: 1c:78:4d:7c:4c:72:a0:20:14:90:09:5c:e4:72:00:e1: 9b:dd:15:dc:4e:09:ca:07:47:86:5b:c6:b8:75:fb:12: d7:b3:2e:86:2a:b0:19:5a:00:4d:e5:b8:6e:f2:33:09: ba:64:14:53:d5:ee:ad:2a:4d:87:e4:09:24:33:61:d1: 97:ec:95:5b:fc:5a:2c:63:46:17:7d:2b:67:cf:f4:e3: 23:33:81:74:b3:75:66:79:e8:64:81:05:9b:a5:7f:3c: f2:20:40:4e:d0:a9:29:28:2a:2c:df:b6:a5:87:5f:5e: 29:51:85:dd:05:6c:d0:25:18:30:e7:13:c8:96:e5:33: a4:d4:de:c4:4a:91:32:88:db:6d:14:5e:2b:6a:c9:75: d3:a8:85:cb:14:c6:9a:1f:c8:5e:4a:47:8d:dc:38:fa: e6:d3:cf:5e:a7:41:cf:13:19:d7:b3:59:8e:01:f2:2f: 90:bd:b9:cd:da:04:5a:35:14:8f:5c:12:50:87:16:65: c9:9b:50:c6:62:3e:ab:d1:d6:29:13:0e:e5:5e:63:5f Fingerprint (SHA-256): 7D:C9:3D:E6:03:31:F4:76:CE:9B:0A:74:49:2A:67:3B:C8:1E:C3:7E:E6:C8:7A:55:22:47:DE:41:00:17:32:03 Fingerprint (SHA1): 4D:84:A9:4F:E9:60:1D:87:F2:0A:6F:5E:2E:6B:3B:6B:ED:85:C2:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193285 (0x1315c305) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:bc:b4:48:2b:a7:e2:d0:d5:64:4a:7a:83:b2:b4:08: 95:6a:72:d2:44:38:f4:3f:80:e0:ac:f1:6b:30:67:8b: 8b:b6:67:4d:20:f1:54:ec:22:de:15:c5:3d:f5:5d:bf: 3f:8c:66:17:30:e3:6c:59:71:d8:d0:84:ef:93:21:dc: c9:1b:eb:bb:59:03:60:dc:19:50:ab:a7:ea:c9:73:2e: 9c:af:bb:e8:7b:08:4d:82:b6:ee:83:db:81:24:98:b6: b1:ff:91:ae:89:ad:ab:26:8b:3a:c6:62:47:cc:e2:59: f1:3f:87:fb:11:96:b0:2d:00:c3:5b:04:61:14:69:b8: a7:30:a9:93:2f:fb:8c:5f:d1:65:e8:e1:bc:2a:23:ce: c6:17:45:05:42:3e:3a:ad:79:8c:40:91:98:cc:97:67: ae:1b:ba:df:08:52:7a:df:b8:32:32:27:6f:ca:05:4f: 37:a8:d2:fb:7a:28:5c:87:47:18:94:df:10:f1:82:d3: 2c:d6:79:66:59:3b:4a:5a:76:a0:db:de:3f:c5:2f:a9: e3:2c:5d:09:71:06:19:e4:31:f7:e1:ba:82:4f:96:06: 2f:91:44:3e:1f:81:a5:2c:92:a7:f1:49:51:56:38:60: 1d:dc:66:e4:73:36:0d:aa:49:9e:13:90:85:59:99:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:70:fa:f6:03:9e:d7:8e:54:06:69:30:7a:b7:79:08: d0:d9:c4:d7:f4:b6:a9:be:e3:30:65:b3:74:90:2c:fe: d4:b5:64:3f:7f:ac:ef:d0:d2:ae:60:3c:c3:41:24:ee: 8a:22:fb:61:84:69:5d:77:d2:4e:45:ca:ef:a0:a8:28: 8d:9f:50:2b:fd:40:97:d3:fe:c9:dd:84:04:41:04:3a: 92:57:99:64:dc:96:8f:d0:8a:3f:f7:3c:24:73:71:dc: 82:19:60:56:b9:b2:25:48:1a:49:f5:6c:a9:f6:e8:15: 1f:cb:1d:ac:02:db:47:e6:98:70:8d:8f:c3:2a:7e:68: 9b:12:85:13:32:04:c0:b9:ca:8f:73:c1:d7:d2:e7:65: c8:00:a2:55:7c:f5:85:d5:0f:54:2b:83:ec:97:ea:30: f7:2b:dc:c2:b2:8f:2d:fd:df:83:97:c1:ee:c5:f5:db: 74:69:de:a0:82:23:6b:e8:83:e5:a3:65:01:83:12:98: 1d:cf:5a:eb:d7:bb:d6:3a:d1:30:61:66:d7:40:7d:4b: 87:23:6d:fb:e9:a4:ce:4c:1d:40:ed:45:96:e9:26:6a: 2c:a2:28:c5:f0:13:d7:cf:d2:d4:98:cf:2b:14:d4:9c: bc:50:12:0b:0c:3b:2f:35:be:60:2b:73:8e:12:82:74 Fingerprint (SHA-256): 6F:2E:4F:1F:1E:75:7A:0D:91:DA:2E:48:AA:D8:33:F7:8A:7F:3D:22:39:FA:F1:DB:EA:23:1F:07:1A:8D:F6:BE Fingerprint (SHA1): 2C:F1:7A:B3:A5:36:07:74:55:4B:B0:97:E4:9D:8C:06:60:A3:BF:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193283 (0x1315c303) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:47 2023 Not After : Mon Mar 20 19:33:47 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:84:e0:f3:35:33:91:b7:de:36:0b:b6:f3:fd:d1: 9b:93:d7:5d:2d:b4:97:4d:74:fa:61:01:2b:db:b6:8b: 27:9a:f0:d2:db:0c:d2:39:59:e7:24:74:6a:2f:6d:c0: 2e:b4:36:5a:e8:aa:cc:79:b8:ae:68:a2:bc:65:2a:05: 14:39:b4:bd:b3:b2:22:b6:10:f9:aa:64:07:b4:6f:e0: 9f:88:e2:bc:8e:cd:e9:4f:06:bd:7e:52:09:43:d5:0d: 7b:2d:3a:00:b0:c9:56:24:bb:f2:f2:4f:a1:3f:3d:a3: d9:3a:cb:16:5e:2d:e1:be:18:a7:91:17:9e:b3:25:fa: 41:a7:40:ce:f8:83:d3:52:e5:08:ba:91:1e:e9:3b:c9: 46:a4:52:1e:c2:f0:6a:0a:e1:79:d9:5d:09:73:2f:5d: 34:0d:26:5b:d6:31:98:69:dc:ff:9c:5d:13:dd:a2:3d: a4:92:59:61:5f:c3:ef:c0:4f:1d:0e:be:30:a5:6e:98: 9c:70:67:00:6a:d0:83:32:03:cf:1b:ef:29:b6:18:69: 93:9a:a5:bb:99:af:6c:b6:3b:24:f6:16:dc:9b:d4:50: 74:6f:9b:e8:39:01:bb:a1:67:4a:8c:d8:f8:35:55:04: af:0e:ac:22:e9:4d:23:aa:33:9e:22:4d:1b:26:64:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:24:75:b4:85:b8:02:d4:26:5f:b1:90:05:f3:86:8c: 0b:1f:37:46:b5:e2:f9:5e:0e:b0:aa:11:24:ed:3c:a5: 37:6e:df:d4:08:6b:ee:4d:70:2f:7b:de:e9:21:37:d6: 2a:a7:34:64:4c:b9:28:c5:4f:3c:2e:3c:32:9c:17:7d: d3:01:37:15:fa:22:8f:e1:f2:79:e7:e2:8c:fd:34:53: 17:44:80:2d:56:ef:fd:92:3d:16:b9:41:2e:c5:34:11: a9:b9:1a:a7:5c:37:41:6d:61:00:d2:68:10:96:bd:7a: 2e:22:64:aa:b5:bc:5f:1b:80:39:05:e0:71:ba:fe:ea: 35:cd:fc:ed:37:28:5b:29:a2:40:f8:3f:e2:18:54:81: 64:14:2c:28:c3:61:5d:f8:06:ce:b6:f2:d3:23:06:2e: a1:15:6f:7e:6e:20:89:d1:89:8c:1e:e6:a0:71:0e:bd: 29:43:0c:a4:c1:14:74:9c:04:49:fa:b5:47:38:ce:9a: 21:04:bb:2c:f6:bb:95:49:a3:22:fc:e8:6b:29:81:a7: ae:5b:2a:92:f7:ec:ba:73:dc:1e:4f:42:24:8c:4f:79: d1:51:56:58:13:e3:b5:e5:3d:bd:86:62:d3:fe:8d:6e: 2c:5f:f5:e1:18:86:cf:09:76:5c:6f:46:ba:3d:db:d2 Fingerprint (SHA-256): A4:7C:50:E7:22:46:E1:DB:23:12:97:14:CB:00:BE:E7:F4:87:CB:F1:55:FF:E9:4D:4C:27:B4:37:95:45:FC:33 Fingerprint (SHA1): 6B:04:F9:7A:D1:60:F6:BA:9E:EB:C3:3C:04:1E:80:77:FD:61:88:DE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193283 (0x1315c303) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:47 2023 Not After : Mon Mar 20 19:33:47 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:84:e0:f3:35:33:91:b7:de:36:0b:b6:f3:fd:d1: 9b:93:d7:5d:2d:b4:97:4d:74:fa:61:01:2b:db:b6:8b: 27:9a:f0:d2:db:0c:d2:39:59:e7:24:74:6a:2f:6d:c0: 2e:b4:36:5a:e8:aa:cc:79:b8:ae:68:a2:bc:65:2a:05: 14:39:b4:bd:b3:b2:22:b6:10:f9:aa:64:07:b4:6f:e0: 9f:88:e2:bc:8e:cd:e9:4f:06:bd:7e:52:09:43:d5:0d: 7b:2d:3a:00:b0:c9:56:24:bb:f2:f2:4f:a1:3f:3d:a3: d9:3a:cb:16:5e:2d:e1:be:18:a7:91:17:9e:b3:25:fa: 41:a7:40:ce:f8:83:d3:52:e5:08:ba:91:1e:e9:3b:c9: 46:a4:52:1e:c2:f0:6a:0a:e1:79:d9:5d:09:73:2f:5d: 34:0d:26:5b:d6:31:98:69:dc:ff:9c:5d:13:dd:a2:3d: a4:92:59:61:5f:c3:ef:c0:4f:1d:0e:be:30:a5:6e:98: 9c:70:67:00:6a:d0:83:32:03:cf:1b:ef:29:b6:18:69: 93:9a:a5:bb:99:af:6c:b6:3b:24:f6:16:dc:9b:d4:50: 74:6f:9b:e8:39:01:bb:a1:67:4a:8c:d8:f8:35:55:04: af:0e:ac:22:e9:4d:23:aa:33:9e:22:4d:1b:26:64:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:24:75:b4:85:b8:02:d4:26:5f:b1:90:05:f3:86:8c: 0b:1f:37:46:b5:e2:f9:5e:0e:b0:aa:11:24:ed:3c:a5: 37:6e:df:d4:08:6b:ee:4d:70:2f:7b:de:e9:21:37:d6: 2a:a7:34:64:4c:b9:28:c5:4f:3c:2e:3c:32:9c:17:7d: d3:01:37:15:fa:22:8f:e1:f2:79:e7:e2:8c:fd:34:53: 17:44:80:2d:56:ef:fd:92:3d:16:b9:41:2e:c5:34:11: a9:b9:1a:a7:5c:37:41:6d:61:00:d2:68:10:96:bd:7a: 2e:22:64:aa:b5:bc:5f:1b:80:39:05:e0:71:ba:fe:ea: 35:cd:fc:ed:37:28:5b:29:a2:40:f8:3f:e2:18:54:81: 64:14:2c:28:c3:61:5d:f8:06:ce:b6:f2:d3:23:06:2e: a1:15:6f:7e:6e:20:89:d1:89:8c:1e:e6:a0:71:0e:bd: 29:43:0c:a4:c1:14:74:9c:04:49:fa:b5:47:38:ce:9a: 21:04:bb:2c:f6:bb:95:49:a3:22:fc:e8:6b:29:81:a7: ae:5b:2a:92:f7:ec:ba:73:dc:1e:4f:42:24:8c:4f:79: d1:51:56:58:13:e3:b5:e5:3d:bd:86:62:d3:fe:8d:6e: 2c:5f:f5:e1:18:86:cf:09:76:5c:6f:46:ba:3d:db:d2 Fingerprint (SHA-256): A4:7C:50:E7:22:46:E1:DB:23:12:97:14:CB:00:BE:E7:F4:87:CB:F1:55:FF:E9:4D:4C:27:B4:37:95:45:FC:33 Fingerprint (SHA1): 6B:04:F9:7A:D1:60:F6:BA:9E:EB:C3:3C:04:1E:80:77:FD:61:88:DE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193284 (0x1315c304) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:24:92:4a:58:23:73:db:b9:ab:8c:54:36:3f:57:33: bb:60:a1:87:dd:b0:5d:5c:76:d7:5c:0b:2d:59:3d:ab: db:fb:36:b1:87:4e:65:e0:fc:41:64:ad:c1:df:29:44: d6:50:7a:b4:d2:fb:74:6d:da:75:3c:1b:37:27:79:d4: be:37:af:9d:53:f8:0d:aa:e2:f3:9f:64:28:2c:a4:50: 73:91:73:44:c7:e2:3e:6c:1c:cc:38:60:13:20:08:ee: 44:e8:83:7b:ee:72:98:1a:6f:23:44:6d:61:c7:96:31: cc:12:8f:53:65:10:0e:95:7f:28:76:07:50:10:0d:bf: 02:24:66:b1:2b:27:7c:f3:5e:63:86:fc:66:0d:3d:43: 5e:75:6a:f5:22:ce:48:7b:e9:49:74:dc:20:1d:e8:7e: 9e:10:f2:44:2a:bc:11:28:3b:31:a4:94:74:38:5a:99: e8:a1:14:61:2e:f9:da:6d:ce:0b:69:87:8a:79:51:31: 6a:0d:41:9c:3c:cd:8b:51:59:35:eb:74:ff:92:d3:8d: 19:65:19:5e:56:d2:87:0f:e7:01:37:0e:69:22:1a:93: 2f:f0:e4:cc:59:38:ec:59:7c:da:51:4e:68:8f:ff:32: 54:1b:d9:4c:32:0b:6a:81:bc:fc:c6:44:f1:90:5a:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:00:18:d1:67:ff:c9:14:2c:ad:69:cd:70:1c:ff:2b: a6:38:82:a5:21:c4:4e:e7:50:82:e8:9c:92:b6:c9:cb: 9d:a1:bd:08:bf:cd:09:41:b7:fd:2e:4e:bf:80:0c:46: 1c:78:4d:7c:4c:72:a0:20:14:90:09:5c:e4:72:00:e1: 9b:dd:15:dc:4e:09:ca:07:47:86:5b:c6:b8:75:fb:12: d7:b3:2e:86:2a:b0:19:5a:00:4d:e5:b8:6e:f2:33:09: ba:64:14:53:d5:ee:ad:2a:4d:87:e4:09:24:33:61:d1: 97:ec:95:5b:fc:5a:2c:63:46:17:7d:2b:67:cf:f4:e3: 23:33:81:74:b3:75:66:79:e8:64:81:05:9b:a5:7f:3c: f2:20:40:4e:d0:a9:29:28:2a:2c:df:b6:a5:87:5f:5e: 29:51:85:dd:05:6c:d0:25:18:30:e7:13:c8:96:e5:33: a4:d4:de:c4:4a:91:32:88:db:6d:14:5e:2b:6a:c9:75: d3:a8:85:cb:14:c6:9a:1f:c8:5e:4a:47:8d:dc:38:fa: e6:d3:cf:5e:a7:41:cf:13:19:d7:b3:59:8e:01:f2:2f: 90:bd:b9:cd:da:04:5a:35:14:8f:5c:12:50:87:16:65: c9:9b:50:c6:62:3e:ab:d1:d6:29:13:0e:e5:5e:63:5f Fingerprint (SHA-256): 7D:C9:3D:E6:03:31:F4:76:CE:9B:0A:74:49:2A:67:3B:C8:1E:C3:7E:E6:C8:7A:55:22:47:DE:41:00:17:32:03 Fingerprint (SHA1): 4D:84:A9:4F:E9:60:1D:87:F2:0A:6F:5E:2E:6B:3B:6B:ED:85:C2:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193284 (0x1315c304) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:24:92:4a:58:23:73:db:b9:ab:8c:54:36:3f:57:33: bb:60:a1:87:dd:b0:5d:5c:76:d7:5c:0b:2d:59:3d:ab: db:fb:36:b1:87:4e:65:e0:fc:41:64:ad:c1:df:29:44: d6:50:7a:b4:d2:fb:74:6d:da:75:3c:1b:37:27:79:d4: be:37:af:9d:53:f8:0d:aa:e2:f3:9f:64:28:2c:a4:50: 73:91:73:44:c7:e2:3e:6c:1c:cc:38:60:13:20:08:ee: 44:e8:83:7b:ee:72:98:1a:6f:23:44:6d:61:c7:96:31: cc:12:8f:53:65:10:0e:95:7f:28:76:07:50:10:0d:bf: 02:24:66:b1:2b:27:7c:f3:5e:63:86:fc:66:0d:3d:43: 5e:75:6a:f5:22:ce:48:7b:e9:49:74:dc:20:1d:e8:7e: 9e:10:f2:44:2a:bc:11:28:3b:31:a4:94:74:38:5a:99: e8:a1:14:61:2e:f9:da:6d:ce:0b:69:87:8a:79:51:31: 6a:0d:41:9c:3c:cd:8b:51:59:35:eb:74:ff:92:d3:8d: 19:65:19:5e:56:d2:87:0f:e7:01:37:0e:69:22:1a:93: 2f:f0:e4:cc:59:38:ec:59:7c:da:51:4e:68:8f:ff:32: 54:1b:d9:4c:32:0b:6a:81:bc:fc:c6:44:f1:90:5a:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:00:18:d1:67:ff:c9:14:2c:ad:69:cd:70:1c:ff:2b: a6:38:82:a5:21:c4:4e:e7:50:82:e8:9c:92:b6:c9:cb: 9d:a1:bd:08:bf:cd:09:41:b7:fd:2e:4e:bf:80:0c:46: 1c:78:4d:7c:4c:72:a0:20:14:90:09:5c:e4:72:00:e1: 9b:dd:15:dc:4e:09:ca:07:47:86:5b:c6:b8:75:fb:12: d7:b3:2e:86:2a:b0:19:5a:00:4d:e5:b8:6e:f2:33:09: ba:64:14:53:d5:ee:ad:2a:4d:87:e4:09:24:33:61:d1: 97:ec:95:5b:fc:5a:2c:63:46:17:7d:2b:67:cf:f4:e3: 23:33:81:74:b3:75:66:79:e8:64:81:05:9b:a5:7f:3c: f2:20:40:4e:d0:a9:29:28:2a:2c:df:b6:a5:87:5f:5e: 29:51:85:dd:05:6c:d0:25:18:30:e7:13:c8:96:e5:33: a4:d4:de:c4:4a:91:32:88:db:6d:14:5e:2b:6a:c9:75: d3:a8:85:cb:14:c6:9a:1f:c8:5e:4a:47:8d:dc:38:fa: e6:d3:cf:5e:a7:41:cf:13:19:d7:b3:59:8e:01:f2:2f: 90:bd:b9:cd:da:04:5a:35:14:8f:5c:12:50:87:16:65: c9:9b:50:c6:62:3e:ab:d1:d6:29:13:0e:e5:5e:63:5f Fingerprint (SHA-256): 7D:C9:3D:E6:03:31:F4:76:CE:9B:0A:74:49:2A:67:3B:C8:1E:C3:7E:E6:C8:7A:55:22:47:DE:41:00:17:32:03 Fingerprint (SHA1): 4D:84:A9:4F:E9:60:1D:87:F2:0A:6F:5E:2E:6B:3B:6B:ED:85:C2:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193285 (0x1315c305) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:bc:b4:48:2b:a7:e2:d0:d5:64:4a:7a:83:b2:b4:08: 95:6a:72:d2:44:38:f4:3f:80:e0:ac:f1:6b:30:67:8b: 8b:b6:67:4d:20:f1:54:ec:22:de:15:c5:3d:f5:5d:bf: 3f:8c:66:17:30:e3:6c:59:71:d8:d0:84:ef:93:21:dc: c9:1b:eb:bb:59:03:60:dc:19:50:ab:a7:ea:c9:73:2e: 9c:af:bb:e8:7b:08:4d:82:b6:ee:83:db:81:24:98:b6: b1:ff:91:ae:89:ad:ab:26:8b:3a:c6:62:47:cc:e2:59: f1:3f:87:fb:11:96:b0:2d:00:c3:5b:04:61:14:69:b8: a7:30:a9:93:2f:fb:8c:5f:d1:65:e8:e1:bc:2a:23:ce: c6:17:45:05:42:3e:3a:ad:79:8c:40:91:98:cc:97:67: ae:1b:ba:df:08:52:7a:df:b8:32:32:27:6f:ca:05:4f: 37:a8:d2:fb:7a:28:5c:87:47:18:94:df:10:f1:82:d3: 2c:d6:79:66:59:3b:4a:5a:76:a0:db:de:3f:c5:2f:a9: e3:2c:5d:09:71:06:19:e4:31:f7:e1:ba:82:4f:96:06: 2f:91:44:3e:1f:81:a5:2c:92:a7:f1:49:51:56:38:60: 1d:dc:66:e4:73:36:0d:aa:49:9e:13:90:85:59:99:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:70:fa:f6:03:9e:d7:8e:54:06:69:30:7a:b7:79:08: d0:d9:c4:d7:f4:b6:a9:be:e3:30:65:b3:74:90:2c:fe: d4:b5:64:3f:7f:ac:ef:d0:d2:ae:60:3c:c3:41:24:ee: 8a:22:fb:61:84:69:5d:77:d2:4e:45:ca:ef:a0:a8:28: 8d:9f:50:2b:fd:40:97:d3:fe:c9:dd:84:04:41:04:3a: 92:57:99:64:dc:96:8f:d0:8a:3f:f7:3c:24:73:71:dc: 82:19:60:56:b9:b2:25:48:1a:49:f5:6c:a9:f6:e8:15: 1f:cb:1d:ac:02:db:47:e6:98:70:8d:8f:c3:2a:7e:68: 9b:12:85:13:32:04:c0:b9:ca:8f:73:c1:d7:d2:e7:65: c8:00:a2:55:7c:f5:85:d5:0f:54:2b:83:ec:97:ea:30: f7:2b:dc:c2:b2:8f:2d:fd:df:83:97:c1:ee:c5:f5:db: 74:69:de:a0:82:23:6b:e8:83:e5:a3:65:01:83:12:98: 1d:cf:5a:eb:d7:bb:d6:3a:d1:30:61:66:d7:40:7d:4b: 87:23:6d:fb:e9:a4:ce:4c:1d:40:ed:45:96:e9:26:6a: 2c:a2:28:c5:f0:13:d7:cf:d2:d4:98:cf:2b:14:d4:9c: bc:50:12:0b:0c:3b:2f:35:be:60:2b:73:8e:12:82:74 Fingerprint (SHA-256): 6F:2E:4F:1F:1E:75:7A:0D:91:DA:2E:48:AA:D8:33:F7:8A:7F:3D:22:39:FA:F1:DB:EA:23:1F:07:1A:8D:F6:BE Fingerprint (SHA1): 2C:F1:7A:B3:A5:36:07:74:55:4B:B0:97:E4:9D:8C:06:60:A3:BF:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193285 (0x1315c305) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:33:48 2023 Not After : Mon Mar 20 19:33:48 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:bc:b4:48:2b:a7:e2:d0:d5:64:4a:7a:83:b2:b4:08: 95:6a:72:d2:44:38:f4:3f:80:e0:ac:f1:6b:30:67:8b: 8b:b6:67:4d:20:f1:54:ec:22:de:15:c5:3d:f5:5d:bf: 3f:8c:66:17:30:e3:6c:59:71:d8:d0:84:ef:93:21:dc: c9:1b:eb:bb:59:03:60:dc:19:50:ab:a7:ea:c9:73:2e: 9c:af:bb:e8:7b:08:4d:82:b6:ee:83:db:81:24:98:b6: b1:ff:91:ae:89:ad:ab:26:8b:3a:c6:62:47:cc:e2:59: f1:3f:87:fb:11:96:b0:2d:00:c3:5b:04:61:14:69:b8: a7:30:a9:93:2f:fb:8c:5f:d1:65:e8:e1:bc:2a:23:ce: c6:17:45:05:42:3e:3a:ad:79:8c:40:91:98:cc:97:67: ae:1b:ba:df:08:52:7a:df:b8:32:32:27:6f:ca:05:4f: 37:a8:d2:fb:7a:28:5c:87:47:18:94:df:10:f1:82:d3: 2c:d6:79:66:59:3b:4a:5a:76:a0:db:de:3f:c5:2f:a9: e3:2c:5d:09:71:06:19:e4:31:f7:e1:ba:82:4f:96:06: 2f:91:44:3e:1f:81:a5:2c:92:a7:f1:49:51:56:38:60: 1d:dc:66:e4:73:36:0d:aa:49:9e:13:90:85:59:99:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:70:fa:f6:03:9e:d7:8e:54:06:69:30:7a:b7:79:08: d0:d9:c4:d7:f4:b6:a9:be:e3:30:65:b3:74:90:2c:fe: d4:b5:64:3f:7f:ac:ef:d0:d2:ae:60:3c:c3:41:24:ee: 8a:22:fb:61:84:69:5d:77:d2:4e:45:ca:ef:a0:a8:28: 8d:9f:50:2b:fd:40:97:d3:fe:c9:dd:84:04:41:04:3a: 92:57:99:64:dc:96:8f:d0:8a:3f:f7:3c:24:73:71:dc: 82:19:60:56:b9:b2:25:48:1a:49:f5:6c:a9:f6:e8:15: 1f:cb:1d:ac:02:db:47:e6:98:70:8d:8f:c3:2a:7e:68: 9b:12:85:13:32:04:c0:b9:ca:8f:73:c1:d7:d2:e7:65: c8:00:a2:55:7c:f5:85:d5:0f:54:2b:83:ec:97:ea:30: f7:2b:dc:c2:b2:8f:2d:fd:df:83:97:c1:ee:c5:f5:db: 74:69:de:a0:82:23:6b:e8:83:e5:a3:65:01:83:12:98: 1d:cf:5a:eb:d7:bb:d6:3a:d1:30:61:66:d7:40:7d:4b: 87:23:6d:fb:e9:a4:ce:4c:1d:40:ed:45:96:e9:26:6a: 2c:a2:28:c5:f0:13:d7:cf:d2:d4:98:cf:2b:14:d4:9c: bc:50:12:0b:0c:3b:2f:35:be:60:2b:73:8e:12:82:74 Fingerprint (SHA-256): 6F:2E:4F:1F:1E:75:7A:0D:91:DA:2E:48:AA:D8:33:F7:8A:7F:3D:22:39:FA:F1:DB:EA:23:1F:07:1A:8D:F6:BE Fingerprint (SHA1): 2C:F1:7A:B3:A5:36:07:74:55:4B:B0:97:E4:9D:8C:06:60:A3:BF:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193288 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320193289 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193290 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 320193291 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320193292 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320193293 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 320193294 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193288 (0x1315c308) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:53 2023 Not After : Mon Mar 20 19:33:53 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:86:6f:d4:0d:5e:68:01:2a:ef:4e:13:0f:b4:61:f1: ba:9c:6b:a1:d9:bb:89:c2:8f:90:a0:ae:d8:b1:67:96: b7:aa:0c:4e:f1:e0:b5:56:42:0c:a4:ff:df:69:0e:df: 32:17:20:2c:f3:8d:43:a9:c0:a3:4e:ec:41:9e:b7:e0: 9c:cc:f8:dc:ff:55:af:81:fc:bd:0e:81:b3:74:fa:ed: b2:e8:ca:ad:ce:c9:ae:b1:df:42:83:f6:8b:f5:08:36: cf:89:7c:6c:4e:4d:e3:a4:dd:62:7a:10:0d:7a:14:07: 1c:de:8d:89:2b:bf:68:ba:44:63:20:d4:75:da:82:47: 0b:76:19:79:37:d6:ac:ef:c8:c7:2c:b6:3e:f1:c4:b7: 18:82:3f:d7:3b:ba:2b:87:4e:ae:10:5e:8a:2c:6d:b3: 36:a3:57:5d:a0:12:30:18:74:22:f4:8c:bd:de:e8:7b: 28:6b:21:0c:d0:39:f8:9b:e7:b6:da:f5:1d:fb:11:74: 17:c5:cf:72:b8:0e:0e:6e:3b:21:23:48:67:8a:69:d3: 3e:f0:3d:f9:58:12:fa:47:ad:e2:23:ef:9e:63:1b:1b: 21:42:df:d6:10:5e:86:d3:23:2c:62:78:e6:b8:23:b4: 98:7b:b3:94:61:9c:9b:ae:29:ce:38:ff:7f:5c:b3:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:1f:77:ed:0a:b7:4e:9c:26:44:95:a0:68:fe:67:5d: 74:4e:0b:8c:88:f7:db:d2:c0:84:a2:28:b5:dd:4f:02: 7a:25:e9:3f:2b:b3:c1:64:5f:af:5b:f5:98:b8:21:f8: 99:a0:d2:c5:4b:25:ad:4e:1f:2d:25:61:c1:95:d0:56: ae:ea:50:c9:0c:f0:b1:4d:bc:90:6d:93:51:1d:83:1a: 0c:ef:d8:8c:c1:fc:b9:84:74:a4:d6:f7:23:9b:ae:22: f9:de:47:42:79:cb:bd:1c:4b:2b:7d:d4:f5:39:95:f2: 89:53:b0:cd:cf:f2:7a:7f:45:31:7a:e3:63:5f:e6:ee: 7d:3d:69:01:c2:fd:53:50:79:61:d7:28:e8:42:78:50: 02:f6:74:ba:9f:a2:2e:6c:e5:73:0f:45:6d:a9:a9:e3: 40:77:83:d6:47:21:50:db:bd:4d:6a:37:7c:6d:b6:5e: b3:b5:f4:ef:9d:56:51:96:80:cd:1b:30:19:8c:d9:0e: ba:e5:ee:11:64:c0:43:fb:72:65:79:9a:a5:05:e3:17: 13:f4:aa:a6:ec:c6:ba:50:33:35:08:c6:ab:a4:62:19: 62:d2:8a:e9:71:c8:c0:61:8f:98:09:94:df:01:0c:c1: e9:4c:67:26:c1:c2:46:1e:48:e8:e7:a0:ee:4b:63:f4 Fingerprint (SHA-256): B8:A7:5E:F2:96:35:EE:E1:94:6D:C2:C0:8C:AC:16:B3:B9:B5:2A:0E:7E:30:07:29:A8:95:B0:5D:BC:05:AF:8B Fingerprint (SHA1): CD:0E:FB:94:B5:3D:C3:BD:7D:D1:BE:3D:8F:B0:98:31:70:A6:7E:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193288 (0x1315c308) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:53 2023 Not After : Mon Mar 20 19:33:53 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:86:6f:d4:0d:5e:68:01:2a:ef:4e:13:0f:b4:61:f1: ba:9c:6b:a1:d9:bb:89:c2:8f:90:a0:ae:d8:b1:67:96: b7:aa:0c:4e:f1:e0:b5:56:42:0c:a4:ff:df:69:0e:df: 32:17:20:2c:f3:8d:43:a9:c0:a3:4e:ec:41:9e:b7:e0: 9c:cc:f8:dc:ff:55:af:81:fc:bd:0e:81:b3:74:fa:ed: b2:e8:ca:ad:ce:c9:ae:b1:df:42:83:f6:8b:f5:08:36: cf:89:7c:6c:4e:4d:e3:a4:dd:62:7a:10:0d:7a:14:07: 1c:de:8d:89:2b:bf:68:ba:44:63:20:d4:75:da:82:47: 0b:76:19:79:37:d6:ac:ef:c8:c7:2c:b6:3e:f1:c4:b7: 18:82:3f:d7:3b:ba:2b:87:4e:ae:10:5e:8a:2c:6d:b3: 36:a3:57:5d:a0:12:30:18:74:22:f4:8c:bd:de:e8:7b: 28:6b:21:0c:d0:39:f8:9b:e7:b6:da:f5:1d:fb:11:74: 17:c5:cf:72:b8:0e:0e:6e:3b:21:23:48:67:8a:69:d3: 3e:f0:3d:f9:58:12:fa:47:ad:e2:23:ef:9e:63:1b:1b: 21:42:df:d6:10:5e:86:d3:23:2c:62:78:e6:b8:23:b4: 98:7b:b3:94:61:9c:9b:ae:29:ce:38:ff:7f:5c:b3:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:1f:77:ed:0a:b7:4e:9c:26:44:95:a0:68:fe:67:5d: 74:4e:0b:8c:88:f7:db:d2:c0:84:a2:28:b5:dd:4f:02: 7a:25:e9:3f:2b:b3:c1:64:5f:af:5b:f5:98:b8:21:f8: 99:a0:d2:c5:4b:25:ad:4e:1f:2d:25:61:c1:95:d0:56: ae:ea:50:c9:0c:f0:b1:4d:bc:90:6d:93:51:1d:83:1a: 0c:ef:d8:8c:c1:fc:b9:84:74:a4:d6:f7:23:9b:ae:22: f9:de:47:42:79:cb:bd:1c:4b:2b:7d:d4:f5:39:95:f2: 89:53:b0:cd:cf:f2:7a:7f:45:31:7a:e3:63:5f:e6:ee: 7d:3d:69:01:c2:fd:53:50:79:61:d7:28:e8:42:78:50: 02:f6:74:ba:9f:a2:2e:6c:e5:73:0f:45:6d:a9:a9:e3: 40:77:83:d6:47:21:50:db:bd:4d:6a:37:7c:6d:b6:5e: b3:b5:f4:ef:9d:56:51:96:80:cd:1b:30:19:8c:d9:0e: ba:e5:ee:11:64:c0:43:fb:72:65:79:9a:a5:05:e3:17: 13:f4:aa:a6:ec:c6:ba:50:33:35:08:c6:ab:a4:62:19: 62:d2:8a:e9:71:c8:c0:61:8f:98:09:94:df:01:0c:c1: e9:4c:67:26:c1:c2:46:1e:48:e8:e7:a0:ee:4b:63:f4 Fingerprint (SHA-256): B8:A7:5E:F2:96:35:EE:E1:94:6D:C2:C0:8C:AC:16:B3:B9:B5:2A:0E:7E:30:07:29:A8:95:B0:5D:BC:05:AF:8B Fingerprint (SHA1): CD:0E:FB:94:B5:3D:C3:BD:7D:D1:BE:3D:8F:B0:98:31:70:A6:7E:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193295 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320193296 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 320193297 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 320193298 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 320193299 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 320193300 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 320193301 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 320193302 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 320193303 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 320193304 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 320193305 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 320193306 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 320193307 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 320193308 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 320193309 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 320193310 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 320193311 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 320193312 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 320193313 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 320193314 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 320193315 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 320193316 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 320193317 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 320193318 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 320193319 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 320193320 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 320193321 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 320193322 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 320193323 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 320193324 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193295 (0x1315c30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:33:59 2023 Not After : Mon Mar 20 19:33:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a7:cc:12:18:42:48:d6:ae:6a:8b:a5:e3:87:86:35: b8:97:73:96:fd:8d:d2:a1:9f:6d:05:88:f7:5e:ec:45: 51:44:e3:d5:9c:1d:6b:57:c8:55:63:70:c8:08:07:1a: f3:30:be:ed:71:d8:5f:a0:cc:c4:38:d8:c0:a3:44:f7: 97:bc:1b:4e:86:2c:e4:c1:c6:78:bf:05:7c:60:d4:28: ee:91:87:24:2d:f9:86:02:67:aa:36:14:94:ab:84:6c: 75:96:33:0b:01:43:7a:5e:00:08:44:fe:34:dd:2d:68: 38:10:92:75:b9:8c:d7:0e:da:fc:32:b5:26:22:dc:9d: c4:bc:54:5b:7c:ef:47:2d:75:bf:59:f0:a9:06:9d:8f: e0:a5:28:a3:7d:b5:72:fe:af:c0:a7:19:b6:33:68:16: a0:4f:56:d9:07:eb:9d:5e:a3:9d:57:ad:35:3d:a6:64: 6a:31:d8:d4:dc:39:12:c9:4e:95:50:b7:74:b2:44:62: c1:00:28:dd:7a:10:4d:b7:95:e6:de:3e:7d:67:f8:5d: c1:16:93:d5:f3:3b:f9:d6:45:76:13:52:44:46:9c:8a: 63:4d:a7:25:b6:5c:03:08:44:0d:9c:0c:45:35:43:95: 93:ad:fc:88:24:a7:32:e2:3a:04:f1:ea:b1:a8:70:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7d:a3:d3:0a:a1:34:42:42:1c:13:35:37:19:85:cd: 08:a5:ea:06:ec:39:f5:7c:92:87:a8:a2:f6:80:1e:34: 9e:8f:7a:f8:92:3c:12:65:67:75:c2:ad:07:21:fa:22: 04:89:dc:54:45:22:d9:24:ae:ac:10:d7:1b:fd:b1:a0: 53:4e:48:64:19:b4:02:2f:c6:a9:ae:93:30:db:c9:f8: 9f:c1:02:77:10:85:f2:ed:66:89:de:f3:2f:1c:35:3d: e9:ba:af:c5:e8:eb:62:da:53:5a:af:83:39:17:f2:cd: 6e:3b:0c:3b:df:1a:5a:b2:d5:a6:68:b1:a3:6a:30:94: 03:b2:d9:08:e7:c1:3a:ca:9f:ac:d6:b0:92:aa:0e:51: 31:58:dd:63:c3:23:54:32:71:22:27:39:07:ce:aa:78: 89:69:2c:cd:b1:e5:7e:d6:b0:53:04:6b:61:e0:b7:8b: d0:0d:0f:84:2a:b3:d7:0c:45:be:72:c5:44:8b:d8:6a: 4f:67:c6:6e:51:85:9c:90:35:c6:f4:ac:c0:d8:d3:0c: e4:e1:d1:11:1b:f1:37:66:c2:a2:ce:27:fe:76:5f:e8: 1d:12:1d:64:8a:af:10:d8:f8:f0:b8:81:84:73:84:2b: 22:68:db:05:96:41:3c:fd:d5:b5:07:87:10:75:84:dc Fingerprint (SHA-256): 77:D8:AA:56:17:0F:43:66:43:A1:73:F3:25:3B:28:D1:8F:9C:96:23:F6:FC:DA:17:A3:71:73:CD:B0:5D:3D:7D Fingerprint (SHA1): 5C:88:0D:C0:27:44:03:76:26:E6:DB:38:DB:63:44:E3:A2:18:F7:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193325 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 320193326 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 320193327 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 320193328 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 320193329 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 320193330 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 320193331 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193325 (0x1315c32d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:22 2023 Not After : Mon Mar 20 19:34:22 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:18:3b:41:53:01:b0:04:01:8b:25:f3:53:44:72:29: 27:d0:6c:12:d6:2e:c9:a9:82:c3:80:2e:1a:a0:d0:10: 7a:37:d1:c9:11:16:12:b3:87:be:09:fb:c9:9b:0e:90: ea:54:81:98:a1:f4:b5:38:a3:c9:89:c9:99:f5:27:dc: d8:c7:73:49:2b:3d:df:e6:31:41:b3:3b:e1:d7:23:c5: 20:52:23:b9:d9:ff:d6:15:46:6e:93:2d:bf:4e:c9:72: cd:06:0b:5c:a3:c0:0f:65:5e:10:7e:40:db:8f:18:b2: 9f:2c:2d:96:d7:af:2d:cc:9b:5c:02:4a:84:4d:0e:eb: ee:96:4e:20:4f:4e:9c:00:8b:54:d9:93:bc:26:98:2e: 36:27:9d:bc:5e:4f:43:69:1a:bd:2b:f0:28:2e:8b:ff: b1:a3:b4:73:66:15:77:0f:de:45:18:61:81:fd:87:57: 1b:dc:b5:93:5b:6d:c7:1a:87:51:17:c6:10:99:9f:4d: 07:0b:b0:25:83:03:26:f6:65:95:15:1d:b8:82:4e:f2: 0b:6e:3a:6e:4f:d2:cb:26:c8:57:96:3a:de:61:11:99: a9:9a:94:4b:ae:ff:05:f7:62:84:ad:80:50:5a:dd:99: 4f:4f:71:bd:33:91:7b:70:b0:da:60:3c:04:57:77:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:2b:cb:4c:f8:b2:e6:55:70:1d:d9:53:0d:5a:dc:8a: 00:60:a1:d7:1f:46:72:78:d0:68:37:1b:f0:d6:f8:28: 08:25:9d:7f:ef:e1:74:7d:05:f0:31:0b:6f:0e:53:5e: fb:6d:1f:f4:d4:7b:9c:6e:f9:92:04:5b:dd:57:07:d7: 76:b7:3f:7b:f8:40:4b:f0:fb:67:73:df:4c:1a:d8:64: 44:37:1f:a3:1c:a5:41:57:10:a1:0e:ce:4c:24:58:72: 30:22:65:94:c0:96:eb:69:82:7c:ee:7c:9d:10:21:e9: 08:be:78:be:49:a7:0a:52:5d:8d:6f:68:aa:85:df:06: 5f:6a:e7:f5:74:31:83:05:11:9e:66:e2:2f:55:ce:04: 12:7a:bd:51:38:e4:b8:3e:07:2e:1e:3f:3a:32:ff:e6: 0f:48:b0:92:60:d3:56:26:92:a3:a8:fe:c4:31:72:09: f4:1b:78:53:c7:3e:64:be:24:f6:1c:ea:94:14:ff:ba: b4:cf:42:d2:a5:de:5d:c0:c4:d0:4e:05:8f:ea:7a:b6: ea:ce:f7:37:4b:64:d2:6a:bc:b9:d8:13:da:69:30:83: cc:0d:30:bb:a1:f3:ab:46:56:d5:24:8e:26:9c:f4:3a: 31:6c:7a:af:50:bd:8a:35:25:d1:9b:e5:36:00:20:dc Fingerprint (SHA-256): 34:ED:7A:85:49:E3:0C:1C:83:FA:B9:9C:01:5C:6B:1B:64:F2:A0:2B:2A:88:17:3D:C1:8E:44:3D:30:7E:90:8B Fingerprint (SHA1): 7D:BA:69:44:6C:D5:89:01:FB:F6:96:50:12:05:76:AE:34:99:00:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193325 (0x1315c32d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:22 2023 Not After : Mon Mar 20 19:34:22 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:18:3b:41:53:01:b0:04:01:8b:25:f3:53:44:72:29: 27:d0:6c:12:d6:2e:c9:a9:82:c3:80:2e:1a:a0:d0:10: 7a:37:d1:c9:11:16:12:b3:87:be:09:fb:c9:9b:0e:90: ea:54:81:98:a1:f4:b5:38:a3:c9:89:c9:99:f5:27:dc: d8:c7:73:49:2b:3d:df:e6:31:41:b3:3b:e1:d7:23:c5: 20:52:23:b9:d9:ff:d6:15:46:6e:93:2d:bf:4e:c9:72: cd:06:0b:5c:a3:c0:0f:65:5e:10:7e:40:db:8f:18:b2: 9f:2c:2d:96:d7:af:2d:cc:9b:5c:02:4a:84:4d:0e:eb: ee:96:4e:20:4f:4e:9c:00:8b:54:d9:93:bc:26:98:2e: 36:27:9d:bc:5e:4f:43:69:1a:bd:2b:f0:28:2e:8b:ff: b1:a3:b4:73:66:15:77:0f:de:45:18:61:81:fd:87:57: 1b:dc:b5:93:5b:6d:c7:1a:87:51:17:c6:10:99:9f:4d: 07:0b:b0:25:83:03:26:f6:65:95:15:1d:b8:82:4e:f2: 0b:6e:3a:6e:4f:d2:cb:26:c8:57:96:3a:de:61:11:99: a9:9a:94:4b:ae:ff:05:f7:62:84:ad:80:50:5a:dd:99: 4f:4f:71:bd:33:91:7b:70:b0:da:60:3c:04:57:77:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:2b:cb:4c:f8:b2:e6:55:70:1d:d9:53:0d:5a:dc:8a: 00:60:a1:d7:1f:46:72:78:d0:68:37:1b:f0:d6:f8:28: 08:25:9d:7f:ef:e1:74:7d:05:f0:31:0b:6f:0e:53:5e: fb:6d:1f:f4:d4:7b:9c:6e:f9:92:04:5b:dd:57:07:d7: 76:b7:3f:7b:f8:40:4b:f0:fb:67:73:df:4c:1a:d8:64: 44:37:1f:a3:1c:a5:41:57:10:a1:0e:ce:4c:24:58:72: 30:22:65:94:c0:96:eb:69:82:7c:ee:7c:9d:10:21:e9: 08:be:78:be:49:a7:0a:52:5d:8d:6f:68:aa:85:df:06: 5f:6a:e7:f5:74:31:83:05:11:9e:66:e2:2f:55:ce:04: 12:7a:bd:51:38:e4:b8:3e:07:2e:1e:3f:3a:32:ff:e6: 0f:48:b0:92:60:d3:56:26:92:a3:a8:fe:c4:31:72:09: f4:1b:78:53:c7:3e:64:be:24:f6:1c:ea:94:14:ff:ba: b4:cf:42:d2:a5:de:5d:c0:c4:d0:4e:05:8f:ea:7a:b6: ea:ce:f7:37:4b:64:d2:6a:bc:b9:d8:13:da:69:30:83: cc:0d:30:bb:a1:f3:ab:46:56:d5:24:8e:26:9c:f4:3a: 31:6c:7a:af:50:bd:8a:35:25:d1:9b:e5:36:00:20:dc Fingerprint (SHA-256): 34:ED:7A:85:49:E3:0C:1C:83:FA:B9:9C:01:5C:6B:1B:64:F2:A0:2B:2A:88:17:3D:C1:8E:44:3D:30:7E:90:8B Fingerprint (SHA1): 7D:BA:69:44:6C:D5:89:01:FB:F6:96:50:12:05:76:AE:34:99:00:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193332 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193333 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193334 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320193335 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193332 (0x1315c334) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:28 2023 Not After : Mon Mar 20 19:34:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:c2:1e:f7:9b:08:a7:eb:12:93:5c:f9:33:d9:f3:07: 2b:0c:fd:a1:15:7f:ef:bc:47:f2:4f:d6:09:5e:6d:cd: 1f:b2:64:61:e2:3b:01:24:5e:3d:45:7c:9e:17:00:05: ba:e1:f0:fe:e6:d2:40:73:f5:8a:0d:08:83:9d:f7:80: 23:fe:ce:6e:51:af:c4:2c:17:dc:b8:90:6b:72:85:fd: da:33:9e:15:b1:e2:25:53:0b:97:81:6d:17:b7:e2:6a: 53:b0:06:20:e7:05:b8:44:a6:5f:80:64:38:c7:fc:c6: b6:11:bc:43:2d:29:92:45:1c:7b:af:d1:50:59:69:12: 75:8a:f7:e0:f5:5d:b7:38:78:42:c1:fa:91:bd:b7:2a: 3d:de:32:c2:2b:fa:2f:1a:63:30:e2:db:5c:32:01:e3: 64:e6:d4:66:bd:90:ca:da:47:99:48:d8:29:90:22:75: 8b:20:7c:b2:19:8f:69:9f:83:d1:b0:02:c6:80:c9:4b: ce:f1:6f:ca:a0:bf:01:bf:4d:71:c9:8f:21:65:9f:42: cf:44:5b:64:3f:bb:48:3d:dd:c7:99:75:e4:79:87:6a: 2e:80:50:9c:50:62:d7:6c:f5:41:a0:3e:df:05:5f:ed: 54:47:7a:1e:75:b3:e6:54:5b:a8:1f:7f:f1:c6:45:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b9:04:d8:1e:84:4c:85:d3:00:e3:0a:08:2e:7e:49: 12:14:fd:02:3a:5a:7d:95:98:cb:e8:bd:fb:3b:e4:03: 9d:fa:ab:ab:47:53:bb:a6:b7:19:b5:ac:5b:91:f2:96: 1a:21:98:3c:e3:84:22:c4:21:e9:31:f0:87:c9:d5:ea: 8e:93:89:db:4f:6d:60:b5:60:4b:f7:05:31:d9:96:2a: 57:4f:3c:10:f0:2a:32:35:2e:b2:3b:b6:13:14:73:df: c1:fa:4e:57:ca:05:8f:43:9a:40:b9:c5:18:4d:ef:55: fd:3a:6f:1d:e0:be:3e:7c:31:cf:85:6f:a3:17:3b:0e: 30:9b:cd:22:59:bd:48:ec:23:23:bd:68:8e:cb:6d:c2: 0f:63:b6:da:35:99:ba:35:25:ab:ad:6a:79:d9:0d:2c: 24:f1:88:f7:38:4f:e4:fe:99:15:ac:f0:33:c3:a8:b2: 83:54:73:04:09:5b:78:fc:3a:3e:e3:12:b9:1b:9e:a9: 0b:9b:ed:08:c7:8f:56:86:f4:e0:18:45:80:a9:1e:6c: ae:cb:3c:72:9f:2e:fc:e9:7b:c0:95:68:e7:c5:43:d5: c7:c5:ed:b8:6d:d2:b1:ac:e6:25:f3:71:1d:48:0c:67: 4f:70:4e:91:69:77:8f:14:86:2d:36:96:94:cc:75:93 Fingerprint (SHA-256): B6:4C:8F:FF:60:F8:88:7B:16:25:41:01:09:29:9B:3B:1B:3F:9C:9C:51:84:F2:71:15:0E:D2:39:59:14:49:19 Fingerprint (SHA1): A7:40:A9:EA:70:C2:C8:23:42:12:78:25:A2:B8:06:84:10:81:92:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193333 (0x1315c335) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:28 2023 Not After : Mon Mar 20 19:34:28 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:77:b4:72:b1:f7:f6:1f:eb:60:ed:01:b3:01:b4:5a: 50:ac:5a:57:70:14:15:61:5f:6d:fd:94:59:b5:8c:d1: 2d:ed:82:34:6d:a5:c4:a8:d1:81:ec:0c:eb:74:7b:19: df:00:10:5b:2c:1a:ee:90:af:e1:23:cf:1c:54:fc:b7: a0:69:23:c5:f9:86:cb:a0:55:74:34:4e:6e:4b:db:8c: c1:ed:b4:01:44:01:bb:ef:96:33:a9:98:e1:c3:01:ee: fe:47:61:53:f5:5e:78:a1:e9:95:27:1c:a1:ea:60:62: c0:5e:1f:94:db:f4:14:27:83:6b:49:26:ff:3d:b7:0a: 47:a4:e0:f5:1b:58:ac:58:a6:29:38:6c:c2:f0:ed:57: cd:b7:41:1f:fe:e5:f2:65:a0:eb:4e:93:a9:77:e5:34: 7e:ed:26:30:4c:64:5b:09:75:da:60:e7:f4:f5:bc:9b: db:8d:61:d0:cb:33:f8:41:5e:2b:da:75:63:82:cd:5a: ee:a1:08:6c:58:a2:80:1b:30:6b:e4:3f:d8:88:e3:58: a5:f9:2a:8e:ca:98:8e:f1:cc:61:5e:db:d2:31:3d:5b: 6d:b8:7f:17:ff:2b:94:6e:06:65:6f:f3:68:31:9b:85: 54:23:c0:c6:b4:48:78:39:53:a6:da:97:2d:fb:56:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:72:63:15:87:70:ed:0e:65:3c:ad:ba:81:d8:1f:ff: 35:c6:82:a3:66:b5:7a:89:9e:2f:dd:18:cd:bd:fe:f5: 72:a1:6d:de:55:8a:2d:2f:71:d7:5f:0b:e1:c7:97:7e: fd:e0:db:c1:76:d9:29:d1:78:76:c4:fa:da:0b:2c:34: d6:1d:ce:58:fc:60:9a:51:ec:6f:31:5e:e1:0b:26:6f: b1:f2:a2:91:3a:d0:b8:fb:f5:e8:54:ea:d2:4d:3f:4c: 70:65:43:a9:e4:68:7a:54:49:4c:39:b2:69:aa:cc:1c: 3d:1d:ae:51:d8:72:66:a9:b2:26:5f:e0:cb:1c:90:04: df:d5:58:8f:37:aa:6f:f0:da:d1:01:97:51:d3:05:ad: 04:c6:dc:7c:88:56:a8:75:db:75:13:4c:25:9d:6f:3a: ee:7e:21:1e:cd:b9:32:c1:dd:68:6c:3f:8a:a9:92:16: 19:14:c5:8f:94:32:5e:d2:ac:c5:0e:98:f4:6b:4a:cf: 81:63:ba:fc:eb:94:24:6e:0e:10:75:75:e1:45:fd:60: 63:a5:5a:0e:0a:e0:67:a8:e7:8d:38:9d:6e:92:17:b1: 9b:80:ee:8f:86:85:47:7c:9d:5c:d5:e9:66:2f:16:69: 06:e9:76:b6:3d:35:43:42:f6:0f:f7:f8:cd:cb:f9:9b Fingerprint (SHA-256): 9C:A1:FD:5F:17:81:48:4F:5E:E5:2D:59:F3:A3:04:E7:04:E2:5F:8A:A4:33:FB:4D:EC:01:C5:51:3C:5D:F3:4C Fingerprint (SHA1): E9:3D:7B:52:76:3A:C5:83:08:4E:E0:C5:EB:76:95:C3:B3:00:80:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193334 (0x1315c336) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:34:29 2023 Not After : Mon Mar 20 19:34:29 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:55:46:82:cd:35:01:15:aa:41:fd:83:70:19:88:10: 2d:bd:ee:e8:6b:d2:59:62:7c:5c:79:e0:2d:12:7c:5d: 29:5d:a5:5d:ed:af:af:16:6b:ed:8e:67:9e:36:f3:5b: 4f:80:cf:1e:48:32:20:fe:c8:e9:58:6d:e6:9c:6a:0d: e2:60:3d:89:a9:0c:01:94:52:c6:a0:c6:d7:19:dd:d5: 7d:9a:f7:13:c6:d1:4d:07:9c:6e:1e:c7:4d:ca:2d:72: 56:00:39:cb:68:04:47:4c:1f:f5:8f:a0:ca:10:63:bb: 2f:9c:34:e2:ef:41:78:a8:0e:14:b6:17:12:d9:4b:68: c3:3b:e7:02:8e:0d:14:f4:c7:69:46:19:c5:b2:14:7c: 6f:92:52:5a:d7:36:d1:64:46:e6:6a:04:2b:84:c6:8a: 0f:4a:03:c9:39:41:a3:65:bd:61:37:b0:27:4e:f2:a9: 15:db:df:0e:24:85:77:bb:ad:bb:df:b9:a5:29:33:dd: 04:ff:86:8e:f7:cd:1d:d0:a0:3c:64:90:de:4c:e9:1a: 36:b4:92:c1:fc:95:de:c2:99:e1:57:87:a2:dc:7f:72: dc:84:a4:6a:80:04:26:15:d8:be:00:25:0d:b1:04:4e: 1d:fd:e9:44:2e:25:d0:14:42:bb:ee:69:c4:1b:01:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:9f:83:9a:70:4d:88:51:71:f7:f3:9e:33:87:7d:15: 77:6c:7c:d8:d7:ce:f3:0d:e4:1d:ef:26:1d:8a:3a:9d: 00:61:28:89:58:37:37:06:5c:b4:07:58:41:02:4d:96: fa:f0:37:4a:9f:5e:78:c0:76:b6:fa:17:e0:b6:5a:e4: 2f:f1:8e:0b:38:58:47:62:68:c4:6f:fd:74:8a:53:e3: a1:e2:92:7e:33:10:68:ff:aa:d6:a6:a4:d2:25:29:e8: ea:04:ad:3e:61:6e:0d:87:3a:3e:b0:44:8e:86:62:f3: 5b:a1:6c:1b:5d:44:e8:95:19:17:ad:16:d1:f2:5e:7e: 6c:7e:23:7f:a3:33:97:00:cc:21:3d:4e:37:3d:90:19: 7a:ce:13:17:16:07:c2:5e:6b:08:8b:6a:54:95:1f:2b: 8a:d7:1e:31:52:75:bd:4e:ed:e1:d2:99:bd:ed:44:5c: ee:28:4e:7a:63:99:13:75:3d:31:ac:8d:82:e4:7b:97: 04:4d:52:57:3b:3b:a9:68:1d:49:3b:d6:e6:d7:b8:ac: 0b:72:e1:5f:a5:6a:4d:4b:af:ed:e2:65:64:00:ea:9d: b9:74:e6:e6:eb:f9:b4:fa:da:e0:ad:5d:65:1e:d7:07: 6f:99:66:3b:69:70:09:63:fe:09:19:5c:86:97:03:5d Fingerprint (SHA-256): C4:22:EC:3D:22:9C:75:ED:18:EF:04:70:14:C2:D8:20:95:89:D5:42:BE:EF:76:33:06:27:48:CF:45:66:2D:0D Fingerprint (SHA1): 73:7B:B3:EC:F2:BB:5C:20:74:40:D4:0D:60:89:1D:19:A6:D2:34:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193336 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193337 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193338 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 320193339 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 320193340 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193336 (0x1315c338) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:32 2023 Not After : Mon Mar 20 19:34:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:fd:4f:56:82:c6:f8:b5:7e:d5:a0:65:fe:ed:d1:85: c2:16:ac:ba:5c:11:5f:29:76:23:0e:21:d3:8e:f5:cd: b7:1b:7f:7f:64:4f:91:03:27:c5:cd:e2:ba:c1:2c:9e: b8:f5:62:2c:8f:e3:79:ce:23:a6:0c:2d:b8:69:3e:9d: 7b:5a:fd:7b:99:5c:a6:56:6c:b3:3d:fa:86:f1:52:6a: e5:48:70:10:98:71:20:d7:f3:be:63:2c:84:f7:36:bb: 7a:7e:de:74:c7:90:e6:e3:94:4a:58:a6:b4:39:13:0b: 72:22:4b:e6:5b:8e:95:f5:32:bd:22:19:7d:75:fc:a4: f5:07:27:16:d2:8b:e2:ee:fa:7d:71:4e:df:6b:cf:3e: 19:8f:7c:17:71:d0:ee:2c:54:97:72:a8:2d:71:18:2f: 81:07:41:af:3c:13:6d:95:f5:08:30:40:26:d7:15:d6: 24:cd:c1:4f:14:75:25:cf:50:bd:a9:ae:48:b7:81:ca: cf:55:c1:c1:38:e5:f0:a5:73:93:7f:63:e4:af:ff:38: 87:19:82:e4:0a:25:f8:1a:59:17:db:b4:88:fb:02:63: a9:fb:22:ab:06:b2:bc:ec:f4:54:08:b9:cd:84:b7:6f: 96:1a:c5:0d:ff:0c:8d:14:56:b5:40:45:ea:de:39:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f7:90:87:15:32:64:13:2f:3b:95:d0:0c:eb:5a:7c: 27:ce:4e:d1:fe:84:a9:37:b6:85:86:17:06:66:9f:90: 5e:86:e9:05:ba:91:6e:c6:aa:7c:d2:2d:00:e0:ea:08: 43:b9:57:88:e4:04:ce:c9:c6:5c:1e:ba:19:f3:79:75: ab:69:4a:2e:ba:6c:05:39:f2:bb:24:72:38:81:8f:c1: 41:ea:aa:2d:a2:7b:ac:18:a7:91:c2:38:7b:5a:d0:d4: 1b:a5:24:12:a8:69:55:db:1b:0c:21:a2:e4:da:7f:e5: da:fa:a8:07:d7:05:54:33:30:5d:6e:ad:cd:53:df:8b: 6c:b1:7d:34:eb:dd:86:15:26:71:5e:98:25:f4:1d:7d: f3:87:37:cd:17:37:40:66:c1:ed:fd:c9:5f:6e:f9:94: 31:68:b1:b7:04:18:ab:18:b1:4d:ab:b1:11:9a:c3:63: 5c:30:3a:97:ed:4a:31:fe:c1:da:40:a6:b3:45:96:82: de:7f:12:5b:e5:e5:cc:0c:f9:55:22:79:03:69:ea:6d: 4d:d2:98:fa:3a:06:fd:ad:33:9c:31:d2:38:fa:22:cc: 43:db:4d:13:01:c8:21:d6:3d:09:8f:76:0c:69:c6:ab: c6:e8:cf:e8:20:cb:05:c3:d3:7d:1f:3f:c4:22:79:9c Fingerprint (SHA-256): 03:35:91:35:10:FC:F1:3D:85:20:54:B8:75:A6:7D:BB:C0:15:35:14:36:35:70:F2:BB:87:20:40:09:C7:13:A5 Fingerprint (SHA1): 1B:7B:B2:CE:13:8B:1C:9F:47:33:C4:CC:4F:03:F2:B4:B8:45:C6:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193337 (0x1315c339) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:32 2023 Not After : Mon Mar 20 19:34:32 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:ee:5f:01:ea:db:11:b0:d0:4d:d0:b2:13:f0:aa:1e: 00:32:e7:0d:4f:03:be:3b:eb:97:95:4b:6c:3e:1c:fe: 68:df:4f:67:eb:90:35:a6:5b:a2:73:f8:f5:d7:9a:05: 51:9d:3c:0e:53:08:78:7a:4b:7b:67:77:d0:4d:e0:71: bc:fc:26:ac:c1:0c:9d:ff:d7:04:ad:f7:ac:dc:88:cb: bc:c2:02:c2:2a:68:82:44:10:52:34:b4:fa:f6:93:43: 44:c2:b4:c8:21:6b:b1:05:93:a1:24:22:d3:72:29:1b: 12:d5:bc:a6:f7:9d:81:8c:3b:4b:d2:02:df:dc:a3:d2: 74:ec:3e:58:50:f2:81:30:98:62:fc:e9:21:bc:cb:44: 04:75:36:92:56:83:ab:e5:de:83:94:29:52:ac:75:5d: e4:3e:82:63:a1:ef:15:f5:79:f4:2a:a0:24:09:d9:63: 3e:44:aa:11:af:14:be:fd:f9:f6:d6:e7:08:4c:9a:24: b1:c0:47:73:1d:7f:c0:d6:a0:b5:15:8d:10:7d:08:91: 5c:77:66:35:24:76:40:31:bd:ce:70:3a:46:38:19:cf: 45:60:43:ef:62:6a:38:37:11:e6:22:ac:dc:a6:6d:c8: 07:1a:cd:c8:70:ad:0e:2c:e6:21:6a:8a:15:f7:d2:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:a5:17:38:3f:80:bb:3b:8e:32:a2:6c:75:91:8f:37: 80:f9:35:c7:68:17:d5:92:46:14:ea:de:4a:0b:3d:d3: 8d:3a:c6:1e:f7:83:b8:c5:bb:a2:71:8f:a2:cf:94:19: 6c:3f:34:be:27:bc:6e:d8:ec:b7:dc:54:f8:fc:e6:7d: 5b:16:77:e2:c2:7b:0d:87:12:4b:c9:2f:ad:21:33:e0: af:56:70:37:63:42:1b:18:70:98:25:80:a2:c6:32:80: e9:c3:67:17:e0:2f:05:42:63:ff:76:09:e5:ab:4a:61: 4f:c3:65:0a:a8:4e:de:56:80:d1:a5:9b:9c:e9:25:9f: a3:93:be:ea:99:14:2a:89:13:53:6f:c4:d5:04:d6:69: ba:74:7c:96:56:71:b4:ac:c9:96:95:73:80:4f:64:f8: 74:53:69:68:6e:c3:5d:91:39:1d:ca:35:2a:6a:98:d7: 93:3c:41:1c:da:f1:74:f4:14:dd:4e:64:88:77:34:cc: 2f:ed:c2:37:ed:84:f6:c1:86:54:4a:b2:c4:a6:d9:8e: b7:f8:f1:8c:9d:9c:eb:a6:f9:39:4f:e1:05:7a:a0:eb: 59:19:be:cf:e4:45:2f:33:a7:a3:bb:1a:f6:d8:33:b3: 86:8e:a7:3d:7e:20:36:93:05:b9:e3:fa:31:e9:b4:6d Fingerprint (SHA-256): DA:AD:1C:35:C8:13:DA:94:34:62:09:0F:94:F5:05:C6:B4:D7:C8:E8:A5:F1:8A:9A:2A:B6:27:13:77:0C:83:03 Fingerprint (SHA1): B8:75:5D:FD:65:98:77:43:21:F6:36:CB:A9:05:6B:23:5C:12:BD:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193338 (0x1315c33a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:34:33 2023 Not After : Mon Mar 20 19:34:33 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:28:eb:db:a9:89:1e:b8:58:47:cf:57:1d:d1:3d:42: 8f:cd:dd:de:2f:ba:06:32:e4:f5:62:2a:9b:0f:5c:08: 44:02:17:d2:7a:fc:85:8e:12:a9:fc:c9:71:ca:99:07: 08:85:07:ca:02:43:cf:b8:7f:8b:7f:b8:5b:5d:12:02: db:83:7d:d2:11:9a:18:fe:51:8d:d0:53:28:51:0a:40: 81:06:84:af:c7:b7:d7:91:59:9d:b1:05:ff:b9:11:07: e4:a6:28:5f:5d:66:3e:46:46:8d:93:b3:c2:07:1f:27: b0:b5:4e:80:b2:c6:da:6b:20:f3:9a:b6:5a:1c:b2:e7: 41:d5:ea:d0:90:9e:ce:ba:8c:de:5c:5e:87:a6:5c:d4: eb:e2:a5:c4:aa:66:54:03:ff:97:49:e3:0f:e8:a3:1a: 0a:5e:3d:d1:43:f0:e3:f9:31:bc:35:81:cf:53:b1:a2: b5:63:70:e7:2d:d5:68:ae:38:c4:a7:3b:6d:87:3b:e8: db:90:16:17:1f:69:19:2f:53:d1:ff:f1:e6:9f:98:37: ae:e7:25:56:14:1a:7b:b1:6c:5e:45:e7:55:eb:1f:fc: 8d:ec:d3:84:b6:3c:11:d7:ad:62:91:b0:9b:e6:6a:d0: d6:70:e8:4d:40:12:1d:3b:06:bc:8f:6c:77:b3:2a:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:ba:03:6a:56:12:4f:f0:37:1e:cf:a1:43:5f:0a:e0: aa:3c:06:5f:31:b9:d7:fd:fa:88:4f:8c:90:e7:c1:28: 59:27:57:49:78:28:1f:81:fe:c4:83:4d:35:ac:62:18: fc:b8:67:8d:e2:39:35:93:3d:f9:0b:2f:9a:f8:b4:47: 6f:ce:72:e2:c3:2d:58:a9:2c:76:ba:0b:fb:4b:b1:39: 70:46:10:fa:69:b5:7d:04:70:51:ca:fa:28:d8:9d:cd: 76:5e:c4:7c:23:63:eb:5b:f1:73:f3:8b:3e:21:87:95: cd:95:06:e5:26:ad:bc:82:db:dc:21:2f:e8:b1:6a:6a: ce:c6:7a:4b:c7:16:a2:3d:ab:49:b2:f5:85:d1:f1:c8: a6:0a:54:c4:41:13:4f:a0:79:5c:a4:46:ff:62:9c:ba: 22:d2:c8:17:b2:01:81:9c:c7:02:7f:ed:6c:b2:02:d9: c3:4e:b8:e5:1f:65:18:e7:17:19:b5:fd:0f:db:37:ea: 22:22:5a:d9:8d:f9:e1:96:62:bc:ed:0a:63:64:6b:f0: 10:73:27:ce:79:86:da:a1:68:db:4d:3a:f1:05:99:a6: d8:c6:e6:9d:61:d9:a8:1f:9f:65:76:11:5a:6f:00:2c: 6d:26:40:64:1d:03:f0:74:1b:bf:0d:e2:79:0a:cf:c9 Fingerprint (SHA-256): 11:CB:14:C3:1A:90:86:19:97:5B:93:70:42:7E:A9:12:83:C7:51:A2:13:38:21:8B:7C:47:E3:DB:BF:C8:03:1A Fingerprint (SHA1): 2D:EB:32:99:64:D3:9A:F9:40:4D:99:25:27:8E:1F:5D:08:92:DC:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193341 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193342 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193343 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA1Root-320193234.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320193344 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193341 (0x1315c33d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:36 2023 Not After : Mon Mar 20 19:34:36 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:42:48:69:8b:6e:d9:0f:5e:7d:8a:38:39:ad:f7:03: 15:2d:1d:1d:75:c5:06:45:05:3c:da:2f:e5:aa:1b:1d: 09:70:4a:b4:83:cd:54:72:de:c6:f1:5f:d7:30:2b:84: f3:59:b0:4f:35:4b:37:35:12:f6:0e:7e:af:3f:ad:a2: d0:f2:82:81:a7:ed:cf:59:19:8e:40:ab:0e:2a:92:f5: 70:4a:51:c7:0e:35:33:d6:68:dd:c6:6a:05:ed:fb:55: 22:c8:af:9c:e9:03:61:da:6c:5e:dd:84:56:10:42:76: b2:80:b7:0f:93:1a:0d:c6:5a:19:6c:1e:a4:2f:ea:20: 08:9f:01:e1:b7:e7:16:83:23:ef:7e:50:b8:5d:eb:29: 0c:2b:4e:a4:4e:6a:28:d9:98:b6:d8:f0:37:be:63:0d: 48:86:66:59:47:e1:90:45:69:ac:e7:12:d5:1a:55:4e: b1:dc:39:19:e0:16:6b:6f:90:7c:d4:7b:1d:2d:fe:d1: fc:ee:41:80:c6:31:c9:bf:58:99:f2:6d:4a:47:f5:4c: ea:d3:78:73:fd:fe:d7:4f:0b:ea:9b:e7:15:b9:39:a3: eb:78:de:20:ab:75:53:95:fb:d3:1c:05:b6:c2:fb:75: b1:2c:1a:a6:17:62:8d:7c:ba:93:26:9e:a7:18:c5:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:25:c3:98:6a:59:e6:bb:23:b0:f9:41:44:78:79:70: 95:7e:6b:f3:87:70:28:64:6a:20:74:2c:b1:99:61:ab: 30:7b:ea:84:2d:8c:82:ac:c3:6f:78:0e:aa:e1:8d:cb: bb:d0:36:73:51:6a:be:c1:a0:88:f7:d9:4e:45:56:f4: ba:40:41:ac:51:81:43:fe:19:70:20:d0:85:ad:6c:8e: 1b:8c:71:76:09:fa:00:ed:38:9f:7c:66:f8:c4:17:7e: 58:5a:ad:47:52:c0:6b:20:e5:df:ae:ba:d7:37:cd:1e: 70:9d:60:51:ea:7b:7a:1e:e1:e9:df:9e:23:f1:f6:07: 15:6c:35:73:5e:ff:30:39:ff:68:f8:aa:30:b8:39:4e: f9:38:ff:3f:d8:f7:99:d8:c6:52:05:89:34:82:36:c9: eb:1c:43:e0:6c:00:10:68:aa:b0:14:52:01:f6:3d:18: 02:0f:c5:9e:6c:a6:9a:8c:3e:af:57:31:7d:f6:2f:0d: 50:1a:cb:29:58:1a:55:b8:9f:2f:e7:76:6f:e0:d7:0a: e5:15:3f:d9:f5:05:84:fe:f2:55:c1:9b:15:b7:eb:8b: a0:60:9a:28:19:39:7b:05:06:b5:83:74:1e:d1:f3:cc: 74:fd:2e:2d:ee:88:87:29:44:d1:0b:6c:a4:35:74:7c Fingerprint (SHA-256): B3:88:B6:F3:BD:FF:53:8B:D0:1D:96:53:04:C7:8D:B5:FB:74:25:66:A5:10:00:95:90:33:A4:5D:92:CB:51:B8 Fingerprint (SHA1): 98:9F:BB:38:BC:50:91:0A:0C:0A:F4:91:61:6C:CA:32:69:30:44:96 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193345 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193346 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320193347 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320193348 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320193349 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320193235.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193350 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193346 (0x1315c342) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:40 2023 Not After : Mon Mar 20 19:34:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:da:0d:2c:2a:da:96:9b:78:f1:08:25:ed:86:9c:0f: ac:f2:3d:34:ac:2e:d3:0d:51:55:47:6b:cb:9a:a7:8b: 1e:5c:1f:37:29:dd:da:61:36:fa:df:b3:69:a0:35:61: 02:be:98:b8:95:ab:a8:5c:ee:9e:6c:60:4f:1c:5e:7d: 9e:b7:f3:ff:6e:fd:f4:4e:e7:bc:a3:8e:c9:ef:0e:03: ab:a2:98:0a:45:6d:07:58:19:dd:a6:ce:64:54:55:19: 97:df:00:46:ce:9d:39:c1:ca:c1:44:d1:63:de:69:50: 92:3a:fb:ea:6e:12:ca:d9:d1:ab:b7:e1:e3:09:b7:27: 15:b3:80:04:09:77:bc:e6:bc:22:6d:e2:15:df:1a:e9: 5d:dd:c1:06:d9:9b:2d:9d:e8:a6:7a:be:ad:91:81:da: 5b:50:ba:91:ed:2d:65:f3:97:3d:f9:b5:d3:61:10:46: 0d:7a:5a:ac:80:ef:c8:74:15:39:56:cd:e5:3b:b6:f6: 81:d9:cc:36:c8:38:27:f1:4d:a5:f0:76:36:9b:2e:6e: d4:d8:db:5d:93:9e:cf:61:b3:8e:75:c1:f3:ab:b8:59: 5c:1f:cd:70:2c:63:07:59:b7:15:37:e1:39:4e:d6:61: 85:57:ec:b0:dd:62:18:58:57:f4:a3:52:fd:74:9f:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:d1:bd:28:ba:86:52:79:27:a9:9e:9b:ce:fe:77:17: 38:fa:47:fb:d4:e1:ba:27:bb:20:31:3e:68:57:84:bf: 01:ef:47:f5:76:36:d2:4a:04:92:69:47:72:1e:a0:87: 70:25:2c:f3:f8:96:13:4d:50:d9:ea:70:1c:8a:2a:13: 50:a2:db:1b:bf:a0:4e:d6:9a:31:80:b2:c4:e0:86:d9: 94:2f:e8:34:19:9e:1b:24:c8:21:d2:aa:54:b3:d3:b2: 94:66:19:b0:a4:1a:6e:dd:9a:4e:9a:01:ba:d5:f8:c9: 40:78:84:43:72:43:ba:a8:4f:1f:0b:f4:10:ff:9b:b7: a1:cd:b4:9a:be:5f:ab:c9:a3:ac:6d:c0:cc:b3:9a:f4: 07:b2:a0:2d:ce:1f:2c:80:b0:8b:98:a9:2f:4b:30:ce: be:8c:6a:43:f2:d4:a7:5a:d5:82:66:37:41:f2:fe:76: 97:a9:0e:4d:ad:4e:22:e7:b9:d4:43:e0:49:1b:75:7c: c2:04:eb:53:a4:6f:3a:eb:9e:71:15:01:19:08:81:81: 4d:01:6a:a5:e4:24:83:fd:26:13:23:a1:6e:e8:28:63: 98:43:b4:4d:29:7b:87:6f:85:c9:dc:ce:33:14:09:b9: de:cd:99:ff:5b:03:2f:8d:42:d6:a0:cb:49:b9:74:24 Fingerprint (SHA-256): 60:40:7F:AB:DA:18:92:B8:C6:45:02:35:CD:D7:03:1F:17:12:99:36:94:12:67:48:30:C1:3B:F5:AE:7C:05:5B Fingerprint (SHA1): AB:E5:AA:18:61:81:AB:A2:5F:B1:31:78:37:40:A8:24:9F:C9:59:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193346 (0x1315c342) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:40 2023 Not After : Mon Mar 20 19:34:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:da:0d:2c:2a:da:96:9b:78:f1:08:25:ed:86:9c:0f: ac:f2:3d:34:ac:2e:d3:0d:51:55:47:6b:cb:9a:a7:8b: 1e:5c:1f:37:29:dd:da:61:36:fa:df:b3:69:a0:35:61: 02:be:98:b8:95:ab:a8:5c:ee:9e:6c:60:4f:1c:5e:7d: 9e:b7:f3:ff:6e:fd:f4:4e:e7:bc:a3:8e:c9:ef:0e:03: ab:a2:98:0a:45:6d:07:58:19:dd:a6:ce:64:54:55:19: 97:df:00:46:ce:9d:39:c1:ca:c1:44:d1:63:de:69:50: 92:3a:fb:ea:6e:12:ca:d9:d1:ab:b7:e1:e3:09:b7:27: 15:b3:80:04:09:77:bc:e6:bc:22:6d:e2:15:df:1a:e9: 5d:dd:c1:06:d9:9b:2d:9d:e8:a6:7a:be:ad:91:81:da: 5b:50:ba:91:ed:2d:65:f3:97:3d:f9:b5:d3:61:10:46: 0d:7a:5a:ac:80:ef:c8:74:15:39:56:cd:e5:3b:b6:f6: 81:d9:cc:36:c8:38:27:f1:4d:a5:f0:76:36:9b:2e:6e: d4:d8:db:5d:93:9e:cf:61:b3:8e:75:c1:f3:ab:b8:59: 5c:1f:cd:70:2c:63:07:59:b7:15:37:e1:39:4e:d6:61: 85:57:ec:b0:dd:62:18:58:57:f4:a3:52:fd:74:9f:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:d1:bd:28:ba:86:52:79:27:a9:9e:9b:ce:fe:77:17: 38:fa:47:fb:d4:e1:ba:27:bb:20:31:3e:68:57:84:bf: 01:ef:47:f5:76:36:d2:4a:04:92:69:47:72:1e:a0:87: 70:25:2c:f3:f8:96:13:4d:50:d9:ea:70:1c:8a:2a:13: 50:a2:db:1b:bf:a0:4e:d6:9a:31:80:b2:c4:e0:86:d9: 94:2f:e8:34:19:9e:1b:24:c8:21:d2:aa:54:b3:d3:b2: 94:66:19:b0:a4:1a:6e:dd:9a:4e:9a:01:ba:d5:f8:c9: 40:78:84:43:72:43:ba:a8:4f:1f:0b:f4:10:ff:9b:b7: a1:cd:b4:9a:be:5f:ab:c9:a3:ac:6d:c0:cc:b3:9a:f4: 07:b2:a0:2d:ce:1f:2c:80:b0:8b:98:a9:2f:4b:30:ce: be:8c:6a:43:f2:d4:a7:5a:d5:82:66:37:41:f2:fe:76: 97:a9:0e:4d:ad:4e:22:e7:b9:d4:43:e0:49:1b:75:7c: c2:04:eb:53:a4:6f:3a:eb:9e:71:15:01:19:08:81:81: 4d:01:6a:a5:e4:24:83:fd:26:13:23:a1:6e:e8:28:63: 98:43:b4:4d:29:7b:87:6f:85:c9:dc:ce:33:14:09:b9: de:cd:99:ff:5b:03:2f:8d:42:d6:a0:cb:49:b9:74:24 Fingerprint (SHA-256): 60:40:7F:AB:DA:18:92:B8:C6:45:02:35:CD:D7:03:1F:17:12:99:36:94:12:67:48:30:C1:3B:F5:AE:7C:05:5B Fingerprint (SHA1): AB:E5:AA:18:61:81:AB:A2:5F:B1:31:78:37:40:A8:24:9F:C9:59:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193351 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193352 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320193353 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320193354 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320193355 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320193236.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193356 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320193357 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-BridgeNavy-320193237.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320193358 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193352 (0x1315c348) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:44 2023 Not After : Mon Mar 20 19:34:44 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:1b:91:89:4f:35:05:7f:3f:9a:96:9b:1a:4e:6b:1d: ad:9f:26:39:f0:5e:21:7c:2a:1c:13:ce:ad:05:41:3e: b0:0e:2f:f7:d4:73:48:1b:3f:5c:ab:f9:c4:0b:3a:b8: 90:d3:a8:a1:0e:b7:87:24:99:51:09:9e:9d:f5:41:3f: ba:e3:4c:ee:ad:29:04:f8:2e:d6:c4:26:10:25:46:52: 2e:b6:fa:34:b5:24:76:a6:56:1a:a6:4f:b7:d4:9e:2a: d9:35:8c:aa:91:28:0a:78:36:80:c2:39:da:e8:47:84: 8c:39:9f:e6:14:a6:08:46:5d:1f:7c:04:0f:7c:36:b8: 6c:a9:18:5a:73:da:9a:bd:21:e1:4d:7e:b8:05:95:d7: bc:9d:54:72:0f:dc:54:1e:33:a5:a2:cb:b9:9a:f0:a1: d8:ca:0f:52:c9:ea:1a:6f:bd:a1:3b:49:1a:90:2e:9e: d9:e7:ee:7a:40:02:ef:0d:30:64:c1:72:c4:d6:29:3e: ec:06:52:5b:99:fb:2f:f0:d8:a9:0a:ef:a3:5d:b5:5b: 87:70:18:1a:09:e8:d6:88:82:a4:de:8c:7d:a9:e4:e1: b6:1d:eb:45:64:78:e7:9f:bc:c1:c2:f7:16:0b:7b:3f: 80:50:bd:a1:b4:89:be:e1:85:3b:48:3e:1a:6e:3b:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:d1:0d:63:4b:12:c3:6b:77:4d:40:a7:1a:44:e5:ca: 7a:8a:f1:96:29:cf:dd:83:55:dc:f5:bf:33:d6:be:c0: 29:87:7f:1f:ae:82:02:a5:ff:b5:6e:4d:20:1a:ac:9a: 26:40:f9:fc:55:2b:70:3d:1b:b5:44:80:a4:2d:cb:6e: e4:c6:41:f9:fd:20:85:33:8a:c2:72:7e:85:43:37:5d: 2c:42:bd:5c:18:21:d6:d6:c8:8f:da:f7:9d:b7:81:1f: 10:9b:99:bb:be:f9:51:b5:f7:dc:34:db:08:fc:ff:7b: 4d:bf:ba:ed:d0:0a:c4:1b:9b:6b:99:9f:28:54:43:e0: ea:97:96:66:56:77:c3:d4:50:8e:25:11:92:db:85:29: 02:9a:a6:e3:f0:45:d0:fa:94:87:42:12:0d:77:72:d9: 03:99:46:3f:ce:6b:ad:8f:bf:d3:ca:db:12:9c:25:4c: 2f:2e:e1:3c:fa:6e:83:13:62:f1:e5:89:1d:5c:f5:dd: 4c:f4:d1:2f:81:23:6b:35:4a:60:f5:79:fd:61:96:16: 97:b7:81:c8:67:70:88:53:61:00:9e:8c:5a:d5:fa:62: d9:26:e1:3f:c3:c5:c7:ae:77:29:2a:78:4b:67:dc:c0: e7:13:c7:8e:41:b0:d9:24:42:50:d9:4e:f9:8e:c4:0b Fingerprint (SHA-256): 74:23:5A:6C:CC:60:D2:D1:44:B5:B3:A8:9B:15:DB:E1:88:1F:A2:5E:91:12:3D:87:69:A0:85:67:5E:1E:66:F3 Fingerprint (SHA1): 80:D3:75:DF:D4:D5:2F:DA:F4:EF:95:80:78:F1:73:C6:20:C3:4F:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193352 (0x1315c348) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:44 2023 Not After : Mon Mar 20 19:34:44 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:1b:91:89:4f:35:05:7f:3f:9a:96:9b:1a:4e:6b:1d: ad:9f:26:39:f0:5e:21:7c:2a:1c:13:ce:ad:05:41:3e: b0:0e:2f:f7:d4:73:48:1b:3f:5c:ab:f9:c4:0b:3a:b8: 90:d3:a8:a1:0e:b7:87:24:99:51:09:9e:9d:f5:41:3f: ba:e3:4c:ee:ad:29:04:f8:2e:d6:c4:26:10:25:46:52: 2e:b6:fa:34:b5:24:76:a6:56:1a:a6:4f:b7:d4:9e:2a: d9:35:8c:aa:91:28:0a:78:36:80:c2:39:da:e8:47:84: 8c:39:9f:e6:14:a6:08:46:5d:1f:7c:04:0f:7c:36:b8: 6c:a9:18:5a:73:da:9a:bd:21:e1:4d:7e:b8:05:95:d7: bc:9d:54:72:0f:dc:54:1e:33:a5:a2:cb:b9:9a:f0:a1: d8:ca:0f:52:c9:ea:1a:6f:bd:a1:3b:49:1a:90:2e:9e: d9:e7:ee:7a:40:02:ef:0d:30:64:c1:72:c4:d6:29:3e: ec:06:52:5b:99:fb:2f:f0:d8:a9:0a:ef:a3:5d:b5:5b: 87:70:18:1a:09:e8:d6:88:82:a4:de:8c:7d:a9:e4:e1: b6:1d:eb:45:64:78:e7:9f:bc:c1:c2:f7:16:0b:7b:3f: 80:50:bd:a1:b4:89:be:e1:85:3b:48:3e:1a:6e:3b:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:d1:0d:63:4b:12:c3:6b:77:4d:40:a7:1a:44:e5:ca: 7a:8a:f1:96:29:cf:dd:83:55:dc:f5:bf:33:d6:be:c0: 29:87:7f:1f:ae:82:02:a5:ff:b5:6e:4d:20:1a:ac:9a: 26:40:f9:fc:55:2b:70:3d:1b:b5:44:80:a4:2d:cb:6e: e4:c6:41:f9:fd:20:85:33:8a:c2:72:7e:85:43:37:5d: 2c:42:bd:5c:18:21:d6:d6:c8:8f:da:f7:9d:b7:81:1f: 10:9b:99:bb:be:f9:51:b5:f7:dc:34:db:08:fc:ff:7b: 4d:bf:ba:ed:d0:0a:c4:1b:9b:6b:99:9f:28:54:43:e0: ea:97:96:66:56:77:c3:d4:50:8e:25:11:92:db:85:29: 02:9a:a6:e3:f0:45:d0:fa:94:87:42:12:0d:77:72:d9: 03:99:46:3f:ce:6b:ad:8f:bf:d3:ca:db:12:9c:25:4c: 2f:2e:e1:3c:fa:6e:83:13:62:f1:e5:89:1d:5c:f5:dd: 4c:f4:d1:2f:81:23:6b:35:4a:60:f5:79:fd:61:96:16: 97:b7:81:c8:67:70:88:53:61:00:9e:8c:5a:d5:fa:62: d9:26:e1:3f:c3:c5:c7:ae:77:29:2a:78:4b:67:dc:c0: e7:13:c7:8e:41:b0:d9:24:42:50:d9:4e:f9:8e:c4:0b Fingerprint (SHA-256): 74:23:5A:6C:CC:60:D2:D1:44:B5:B3:A8:9B:15:DB:E1:88:1F:A2:5E:91:12:3D:87:69:A0:85:67:5E:1E:66:F3 Fingerprint (SHA1): 80:D3:75:DF:D4:D5:2F:DA:F4:EF:95:80:78:F1:73:C6:20:C3:4F:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193351 (0x1315c347) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:34:44 2023 Not After : Mon Mar 20 19:34:44 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:39:5b:4f:71:43:20:f7:ac:8e:8b:d1:4f:59:85:11: 77:d5:fe:f7:eb:13:d3:5a:8b:e2:f8:7a:79:d2:35:41: b0:27:38:45:f4:4a:0f:e5:67:2e:dd:17:b7:75:ac:7e: a1:7e:c4:c1:5d:80:08:31:27:6f:83:35:6a:d6:80:16: 1c:02:48:33:b7:dd:42:f1:68:14:57:a0:ca:61:a2:fc: dd:8a:f9:7f:3b:c1:79:70:23:31:42:c9:a0:b3:2b:24: c1:ca:ac:9e:83:87:06:fa:68:36:a8:1a:39:c6:ec:a1: 74:88:08:f7:5f:e7:57:f4:8f:7b:d7:4e:99:93:04:95: 58:6d:a1:6c:29:f7:5e:13:15:43:b1:dc:f6:54:74:ee: d6:43:d7:b9:64:de:ed:bd:cb:1f:40:42:39:64:69:69: be:0c:22:ed:36:5c:fc:3b:17:64:85:f9:83:a7:5e:aa: ed:59:ba:9a:8c:16:a9:14:dc:30:db:ba:4c:51:4a:9b: ec:f2:38:1a:01:33:a7:86:0b:02:8e:18:30:1d:76:d0: b2:88:b2:02:eb:dd:de:22:3b:9d:61:2b:95:45:40:c7: 38:52:75:37:27:95:d0:da:0d:26:86:56:e0:78:59:ca: 43:ee:bd:98:1e:02:52:60:5c:b3:b9:5c:2b:8d:41:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:9a:49:a0:f5:7f:e0:c0:36:22:4f:67:7b:10:76:bf: ce:ee:04:05:53:0e:8c:f8:9b:39:c8:8e:fb:36:93:08: c8:1e:d2:a6:85:f1:99:76:2a:67:43:f3:1e:74:64:7b: b4:f6:0c:10:56:ec:1e:f6:6c:77:6f:22:11:95:27:98: 56:c9:59:38:f7:00:5f:b8:2b:ba:d1:4f:a1:1d:4e:ee: 06:8a:a1:9b:e5:cb:a8:5c:a2:c7:b1:d8:81:65:58:e1: bd:a6:6f:2c:9b:6f:4f:3d:e7:38:a6:26:53:fa:49:f4: 5d:15:68:7a:cc:73:49:f6:49:c7:57:e4:f6:d6:49:1b: eb:83:5b:f1:3c:51:8b:e1:07:ff:43:ba:88:d4:01:86: 7d:39:11:c1:04:cf:05:53:27:e9:2e:9c:02:bc:13:be: 0a:a6:f2:f4:5d:ef:1d:25:cf:a5:57:23:8f:92:6a:97: 8f:f5:ef:9a:57:d6:c7:b7:08:b9:95:be:48:b3:17:83: 0b:ed:4e:ae:26:de:67:69:4a:93:bb:37:99:f2:ce:42: ba:0b:f7:d5:c5:40:f5:91:a5:f0:26:fb:9f:ce:f4:c7: 4b:df:73:8d:69:1a:ca:8e:dc:7a:a6:78:cb:5f:8a:4b: db:96:13:40:02:2d:1c:24:4a:f7:bf:94:27:8d:17:b9 Fingerprint (SHA-256): 46:54:41:AF:50:29:53:AF:73:5E:B1:30:CF:ED:55:E8:66:97:37:0E:82:B2:10:94:6D:23:53:C1:D9:EF:99:4B Fingerprint (SHA1): AF:7D:EA:F5:CF:41:FF:C8:A7:88:54:E7:69:27:35:A2:0B:C0:D8:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193352 (0x1315c348) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:44 2023 Not After : Mon Mar 20 19:34:44 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:1b:91:89:4f:35:05:7f:3f:9a:96:9b:1a:4e:6b:1d: ad:9f:26:39:f0:5e:21:7c:2a:1c:13:ce:ad:05:41:3e: b0:0e:2f:f7:d4:73:48:1b:3f:5c:ab:f9:c4:0b:3a:b8: 90:d3:a8:a1:0e:b7:87:24:99:51:09:9e:9d:f5:41:3f: ba:e3:4c:ee:ad:29:04:f8:2e:d6:c4:26:10:25:46:52: 2e:b6:fa:34:b5:24:76:a6:56:1a:a6:4f:b7:d4:9e:2a: d9:35:8c:aa:91:28:0a:78:36:80:c2:39:da:e8:47:84: 8c:39:9f:e6:14:a6:08:46:5d:1f:7c:04:0f:7c:36:b8: 6c:a9:18:5a:73:da:9a:bd:21:e1:4d:7e:b8:05:95:d7: bc:9d:54:72:0f:dc:54:1e:33:a5:a2:cb:b9:9a:f0:a1: d8:ca:0f:52:c9:ea:1a:6f:bd:a1:3b:49:1a:90:2e:9e: d9:e7:ee:7a:40:02:ef:0d:30:64:c1:72:c4:d6:29:3e: ec:06:52:5b:99:fb:2f:f0:d8:a9:0a:ef:a3:5d:b5:5b: 87:70:18:1a:09:e8:d6:88:82:a4:de:8c:7d:a9:e4:e1: b6:1d:eb:45:64:78:e7:9f:bc:c1:c2:f7:16:0b:7b:3f: 80:50:bd:a1:b4:89:be:e1:85:3b:48:3e:1a:6e:3b:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:d1:0d:63:4b:12:c3:6b:77:4d:40:a7:1a:44:e5:ca: 7a:8a:f1:96:29:cf:dd:83:55:dc:f5:bf:33:d6:be:c0: 29:87:7f:1f:ae:82:02:a5:ff:b5:6e:4d:20:1a:ac:9a: 26:40:f9:fc:55:2b:70:3d:1b:b5:44:80:a4:2d:cb:6e: e4:c6:41:f9:fd:20:85:33:8a:c2:72:7e:85:43:37:5d: 2c:42:bd:5c:18:21:d6:d6:c8:8f:da:f7:9d:b7:81:1f: 10:9b:99:bb:be:f9:51:b5:f7:dc:34:db:08:fc:ff:7b: 4d:bf:ba:ed:d0:0a:c4:1b:9b:6b:99:9f:28:54:43:e0: ea:97:96:66:56:77:c3:d4:50:8e:25:11:92:db:85:29: 02:9a:a6:e3:f0:45:d0:fa:94:87:42:12:0d:77:72:d9: 03:99:46:3f:ce:6b:ad:8f:bf:d3:ca:db:12:9c:25:4c: 2f:2e:e1:3c:fa:6e:83:13:62:f1:e5:89:1d:5c:f5:dd: 4c:f4:d1:2f:81:23:6b:35:4a:60:f5:79:fd:61:96:16: 97:b7:81:c8:67:70:88:53:61:00:9e:8c:5a:d5:fa:62: d9:26:e1:3f:c3:c5:c7:ae:77:29:2a:78:4b:67:dc:c0: e7:13:c7:8e:41:b0:d9:24:42:50:d9:4e:f9:8e:c4:0b Fingerprint (SHA-256): 74:23:5A:6C:CC:60:D2:D1:44:B5:B3:A8:9B:15:DB:E1:88:1F:A2:5E:91:12:3D:87:69:A0:85:67:5E:1E:66:F3 Fingerprint (SHA1): 80:D3:75:DF:D4:D5:2F:DA:F4:EF:95:80:78:F1:73:C6:20:C3:4F:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193352 (0x1315c348) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:44 2023 Not After : Mon Mar 20 19:34:44 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:1b:91:89:4f:35:05:7f:3f:9a:96:9b:1a:4e:6b:1d: ad:9f:26:39:f0:5e:21:7c:2a:1c:13:ce:ad:05:41:3e: b0:0e:2f:f7:d4:73:48:1b:3f:5c:ab:f9:c4:0b:3a:b8: 90:d3:a8:a1:0e:b7:87:24:99:51:09:9e:9d:f5:41:3f: ba:e3:4c:ee:ad:29:04:f8:2e:d6:c4:26:10:25:46:52: 2e:b6:fa:34:b5:24:76:a6:56:1a:a6:4f:b7:d4:9e:2a: d9:35:8c:aa:91:28:0a:78:36:80:c2:39:da:e8:47:84: 8c:39:9f:e6:14:a6:08:46:5d:1f:7c:04:0f:7c:36:b8: 6c:a9:18:5a:73:da:9a:bd:21:e1:4d:7e:b8:05:95:d7: bc:9d:54:72:0f:dc:54:1e:33:a5:a2:cb:b9:9a:f0:a1: d8:ca:0f:52:c9:ea:1a:6f:bd:a1:3b:49:1a:90:2e:9e: d9:e7:ee:7a:40:02:ef:0d:30:64:c1:72:c4:d6:29:3e: ec:06:52:5b:99:fb:2f:f0:d8:a9:0a:ef:a3:5d:b5:5b: 87:70:18:1a:09:e8:d6:88:82:a4:de:8c:7d:a9:e4:e1: b6:1d:eb:45:64:78:e7:9f:bc:c1:c2:f7:16:0b:7b:3f: 80:50:bd:a1:b4:89:be:e1:85:3b:48:3e:1a:6e:3b:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:d1:0d:63:4b:12:c3:6b:77:4d:40:a7:1a:44:e5:ca: 7a:8a:f1:96:29:cf:dd:83:55:dc:f5:bf:33:d6:be:c0: 29:87:7f:1f:ae:82:02:a5:ff:b5:6e:4d:20:1a:ac:9a: 26:40:f9:fc:55:2b:70:3d:1b:b5:44:80:a4:2d:cb:6e: e4:c6:41:f9:fd:20:85:33:8a:c2:72:7e:85:43:37:5d: 2c:42:bd:5c:18:21:d6:d6:c8:8f:da:f7:9d:b7:81:1f: 10:9b:99:bb:be:f9:51:b5:f7:dc:34:db:08:fc:ff:7b: 4d:bf:ba:ed:d0:0a:c4:1b:9b:6b:99:9f:28:54:43:e0: ea:97:96:66:56:77:c3:d4:50:8e:25:11:92:db:85:29: 02:9a:a6:e3:f0:45:d0:fa:94:87:42:12:0d:77:72:d9: 03:99:46:3f:ce:6b:ad:8f:bf:d3:ca:db:12:9c:25:4c: 2f:2e:e1:3c:fa:6e:83:13:62:f1:e5:89:1d:5c:f5:dd: 4c:f4:d1:2f:81:23:6b:35:4a:60:f5:79:fd:61:96:16: 97:b7:81:c8:67:70:88:53:61:00:9e:8c:5a:d5:fa:62: d9:26:e1:3f:c3:c5:c7:ae:77:29:2a:78:4b:67:dc:c0: e7:13:c7:8e:41:b0:d9:24:42:50:d9:4e:f9:8e:c4:0b Fingerprint (SHA-256): 74:23:5A:6C:CC:60:D2:D1:44:B5:B3:A8:9B:15:DB:E1:88:1F:A2:5E:91:12:3D:87:69:A0:85:67:5E:1E:66:F3 Fingerprint (SHA1): 80:D3:75:DF:D4:D5:2F:DA:F4:EF:95:80:78:F1:73:C6:20:C3:4F:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193359 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193360 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 320193361 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 320193362 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 320193363 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 320193364 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320193365 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320193366 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193367 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320193368 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193359 (0x1315c34f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:34:49 2023 Not After : Mon Mar 20 19:34:49 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:48:e4:89:c4:07:d1:d6:47:8f:29:2d:fe:2f:c3:fb: 95:29:a0:85:0d:03:27:48:10:29:6c:1a:f8:b2:85:1c: 4f:2d:7e:8c:67:6c:ba:28:aa:de:92:be:d6:3e:75:20: b8:40:1e:c4:89:e0:1a:d7:ef:4b:d2:cf:75:4d:e8:c5: 0f:e5:98:54:93:65:63:7d:c6:f7:29:88:20:95:ec:0e: ee:b3:48:ad:fd:e3:f3:53:14:57:28:c7:0d:49:ce:f9: 76:ca:83:5a:db:6d:0c:0d:f9:05:dd:ff:7c:7b:29:fd: 30:f5:be:57:ac:da:95:8f:c6:4b:0f:38:be:9d:b4:cf: 75:e6:75:7f:3e:00:2d:f7:4d:ec:59:17:14:c4:21:55: 1e:15:57:6b:ea:7e:5f:be:09:b5:db:27:33:e0:42:c4: 97:76:0d:3d:d3:af:c9:6a:ab:12:61:4b:4c:2d:db:3d: db:32:50:dc:01:c6:b4:3f:42:37:81:28:14:04:7f:6b: 17:c0:28:87:e2:22:14:97:1b:cf:a1:76:10:fc:92:75: 1a:2c:98:ef:0c:30:67:c2:1e:58:1c:0c:62:f3:b6:a3: 48:d9:e1:cc:1a:65:ec:30:08:41:e3:54:da:26:83:2e: 34:8c:c7:fc:c6:3e:92:4a:2d:9b:2e:98:ea:3d:95:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:c6:01:97:ce:f7:9b:a1:91:45:4f:e3:25:d2:35:59: 33:44:df:6c:0d:62:db:87:87:2b:e4:a6:8c:35:a2:23: 86:8c:96:ff:1a:77:20:a2:2f:1b:96:d7:14:54:12:e1: 4c:51:e4:db:df:87:71:da:89:35:c9:b7:cc:ac:76:33: 5f:f8:f8:84:6e:08:2d:67:36:c6:dd:63:ca:86:0d:cd: 9d:4f:8a:99:82:8d:b9:86:d1:36:48:78:5d:6f:d2:dc: 75:df:f4:68:45:d3:0e:11:f9:49:d7:41:9e:14:df:fa: c2:7c:5f:74:88:90:9f:de:52:3c:70:df:64:53:63:f7: f5:3d:17:66:b8:cf:b5:d7:fb:3b:09:2b:b2:b9:fc:35: 96:c5:a1:2c:e4:d6:07:f9:98:34:ee:29:5e:4d:9f:59: 90:08:b0:bf:e0:26:b9:d9:13:d5:06:ae:b2:b7:53:ed: 37:e1:ab:2b:5b:1b:41:4e:85:23:41:c1:fa:3d:a6:34: 69:33:f9:18:c6:ba:bb:c8:82:9a:5e:6c:85:95:7f:76: 3e:09:89:0c:2b:9a:ce:39:67:93:e2:c4:06:9e:56:c5: d3:eb:dd:f2:41:b7:1f:33:95:58:52:63:f6:15:8e:26: 1d:05:35:e7:e4:df:28:e3:78:77:8b:e3:0e:bc:cf:64 Fingerprint (SHA-256): 33:8E:CB:EE:CB:41:8E:6F:81:84:42:28:F4:9A:DC:E8:94:26:73:71:B5:32:6B:6F:D6:77:B3:AA:63:77:BF:29 Fingerprint (SHA1): DC:13:46:69:62:57:0D:77:17:E0:35:19:27:39:D9:E4:78:35:5B:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193360 (0x1315c350) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:34:50 2023 Not After : Mon Mar 20 19:34:50 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:d8:12:57:fb:84:1f:71:bf:6e:8f:b7:f1:a0:d5:b5: 75:e5:0c:66:65:1a:26:17:3c:05:5e:88:30:b7:11:39: 29:04:48:83:4e:d5:bf:3b:0e:8f:bf:de:bc:e4:20:0a: c4:b2:23:97:00:45:0a:88:f4:b8:fd:32:30:63:a8:5e: 90:42:90:88:f5:55:e6:72:17:d7:24:e2:d8:0b:bc:01: 6e:0c:60:7d:e1:35:05:77:6f:9c:00:79:d9:19:d3:4d: a7:c7:b2:8b:a2:62:e0:54:50:d5:3c:2a:28:8b:4a:e2: 70:90:f7:0d:0a:34:a5:7c:1d:12:df:0e:22:5c:7b:b2: c2:b4:8b:be:96:e0:70:f0:2c:48:ec:dc:da:2b:df:b0: 21:60:07:3a:b2:ac:5a:5e:82:47:d0:73:94:85:0e:66: a2:52:a9:27:b6:d6:c5:8e:68:81:e4:7a:55:ac:5a:ba: 8a:0f:9e:07:14:c8:fa:52:eb:eb:fc:4a:df:8c:55:2d: 6b:e0:5f:4b:05:83:e7:6e:a4:35:01:c3:ac:47:b2:17: d5:33:0e:d2:ab:f4:c3:fa:2d:6a:09:5a:f8:ce:f5:f7: 33:67:a7:0b:26:bb:99:52:67:fb:88:5e:c3:70:2a:09: d0:8a:4c:84:b7:83:c8:fd:aa:6d:cd:15:88:6e:11:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:ee:5b:88:48:a8:fe:e0:4f:ba:17:43:cb:1e:8a:c7: b7:2f:0a:8b:94:98:3b:97:a5:69:78:c5:6e:8a:55:3b: c8:e6:c5:3e:f5:dc:1e:46:2e:4d:d6:f9:d9:08:c9:43: cc:4e:aa:bf:93:02:c4:9c:37:bd:f4:28:5f:30:42:63: 79:fc:fb:cd:9f:fa:09:a8:83:46:44:d4:85:e4:24:89: fe:36:45:58:fd:36:97:b6:04:80:23:57:86:87:7a:b2: 09:04:51:51:02:f9:91:1f:34:1b:95:02:26:f5:7d:52: 05:49:e2:e3:72:a1:52:cb:5e:b4:c5:e1:46:0c:de:60: 6b:6b:ff:cb:89:98:3c:03:6e:1c:c8:a2:67:ba:1b:68: fe:a2:cf:a9:d5:e0:15:8d:34:0b:a2:cf:f2:0c:9e:ae: f2:37:b4:5d:71:66:0d:1f:0c:0b:4f:f5:58:85:a6:2f: d0:98:60:51:cd:f3:fc:ea:b7:1c:82:de:36:6a:de:35: 14:63:c6:da:5b:d6:9b:54:b1:66:46:d3:b8:a6:26:57: a3:e6:7b:90:6d:3f:87:04:10:98:36:d8:10:05:5b:89: d3:e8:ed:e6:93:54:ea:0d:40:73:07:24:9b:ce:bc:3d: 27:53:47:1f:9c:e4:89:cd:f2:f6:69:1d:bd:51:f1:af Fingerprint (SHA-256): A6:F0:0E:57:C7:DD:AB:D8:C1:19:A4:F0:CB:DC:15:98:35:C9:24:66:FB:F7:27:5C:36:B9:64:FF:17:DE:48:2B Fingerprint (SHA1): 65:72:07:61:52:1C:9A:F6:7A:AB:40:62:CF:CD:17:61:2E:3B:89:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193369 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193370 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193371 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 320193372 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320193373 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 320193374 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 320193375 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 320193376 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 320193377 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193369 (0x1315c359) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:59 2023 Not After : Mon Mar 20 19:34:59 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9d:e6:bc:d8:d8:7d:d4:81:07:e2:d4:51:76:b5:81:24: 7c:db:b3:bf:64:1c:40:b0:ce:86:b3:0c:b7:ce:63:d7: b5:48:8f:b3:41:17:31:93:05:a3:29:36:0c:3d:2a:81: 8c:2c:6b:5b:84:8b:71:15:8f:43:49:37:a8:b9:c7:2c: 05:42:20:36:50:15:3c:a2:46:56:bc:2e:fe:4c:99:ee: 38:ef:91:75:29:76:69:eb:e8:39:d9:c6:9e:78:e0:b5: b6:89:70:0d:00:b4:c6:c6:e8:0e:98:34:f9:39:7f:68: a3:a8:c6:c7:c0:e2:86:4b:4d:94:53:42:7f:9f:f3:50: f1:90:c2:ad:8a:39:02:b8:89:c1:28:47:81:78:0b:2b: f2:4f:e7:03:e2:36:b1:05:26:d8:86:58:ee:51:c1:1c: c7:73:94:7a:09:48:29:56:ff:97:43:e9:85:0b:ae:d5: 23:d1:9e:d6:85:f3:66:5a:6c:70:88:de:93:81:bf:12: a0:ab:76:ac:20:23:a0:2c:a8:27:b1:a3:47:68:82:58: a1:0c:4c:2b:72:ce:72:14:ff:eb:72:48:90:e9:f2:8f: 8e:31:15:f0:5a:0b:d8:ad:50:06:dd:ff:47:e6:a3:f9: 8e:22:b4:41:8f:20:94:0f:63:b6:7b:c0:48:4a:c4:77 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:a5:68:ea:93:aa:b9:af:94:f4:f6:d6: 13:35:58:9c:8d:d3:20:87:4b:c2:c6:40:ae:6d:4e:fc: d2:02:1d:00:e0:f9:0d:e5:0b:92:2c:5d:e2:a6:fa:8e: 77:b6:a2:a9:3e:6f:ba:71:95:a6:6f:5d:08:41:e1:b3 Fingerprint (SHA-256): 74:87:08:91:D6:5B:E8:B0:97:8D:5E:06:42:19:84:69:B6:DE:A3:5B:0B:ED:11:52:B8:E0:D3:7B:DD:55:93:8D Fingerprint (SHA1): 5A:A9:11:76:21:97:A7:E6:FF:E7:40:D7:71:39:70:52:65:7E:7B:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193369 (0x1315c359) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:59 2023 Not After : Mon Mar 20 19:34:59 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9d:e6:bc:d8:d8:7d:d4:81:07:e2:d4:51:76:b5:81:24: 7c:db:b3:bf:64:1c:40:b0:ce:86:b3:0c:b7:ce:63:d7: b5:48:8f:b3:41:17:31:93:05:a3:29:36:0c:3d:2a:81: 8c:2c:6b:5b:84:8b:71:15:8f:43:49:37:a8:b9:c7:2c: 05:42:20:36:50:15:3c:a2:46:56:bc:2e:fe:4c:99:ee: 38:ef:91:75:29:76:69:eb:e8:39:d9:c6:9e:78:e0:b5: b6:89:70:0d:00:b4:c6:c6:e8:0e:98:34:f9:39:7f:68: a3:a8:c6:c7:c0:e2:86:4b:4d:94:53:42:7f:9f:f3:50: f1:90:c2:ad:8a:39:02:b8:89:c1:28:47:81:78:0b:2b: f2:4f:e7:03:e2:36:b1:05:26:d8:86:58:ee:51:c1:1c: c7:73:94:7a:09:48:29:56:ff:97:43:e9:85:0b:ae:d5: 23:d1:9e:d6:85:f3:66:5a:6c:70:88:de:93:81:bf:12: a0:ab:76:ac:20:23:a0:2c:a8:27:b1:a3:47:68:82:58: a1:0c:4c:2b:72:ce:72:14:ff:eb:72:48:90:e9:f2:8f: 8e:31:15:f0:5a:0b:d8:ad:50:06:dd:ff:47:e6:a3:f9: 8e:22:b4:41:8f:20:94:0f:63:b6:7b:c0:48:4a:c4:77 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:a5:68:ea:93:aa:b9:af:94:f4:f6:d6: 13:35:58:9c:8d:d3:20:87:4b:c2:c6:40:ae:6d:4e:fc: d2:02:1d:00:e0:f9:0d:e5:0b:92:2c:5d:e2:a6:fa:8e: 77:b6:a2:a9:3e:6f:ba:71:95:a6:6f:5d:08:41:e1:b3 Fingerprint (SHA-256): 74:87:08:91:D6:5B:E8:B0:97:8D:5E:06:42:19:84:69:B6:DE:A3:5B:0B:ED:11:52:B8:E0:D3:7B:DD:55:93:8D Fingerprint (SHA1): 5A:A9:11:76:21:97:A7:E6:FF:E7:40:D7:71:39:70:52:65:7E:7B:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193369 (0x1315c359) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:59 2023 Not After : Mon Mar 20 19:34:59 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9d:e6:bc:d8:d8:7d:d4:81:07:e2:d4:51:76:b5:81:24: 7c:db:b3:bf:64:1c:40:b0:ce:86:b3:0c:b7:ce:63:d7: b5:48:8f:b3:41:17:31:93:05:a3:29:36:0c:3d:2a:81: 8c:2c:6b:5b:84:8b:71:15:8f:43:49:37:a8:b9:c7:2c: 05:42:20:36:50:15:3c:a2:46:56:bc:2e:fe:4c:99:ee: 38:ef:91:75:29:76:69:eb:e8:39:d9:c6:9e:78:e0:b5: b6:89:70:0d:00:b4:c6:c6:e8:0e:98:34:f9:39:7f:68: a3:a8:c6:c7:c0:e2:86:4b:4d:94:53:42:7f:9f:f3:50: f1:90:c2:ad:8a:39:02:b8:89:c1:28:47:81:78:0b:2b: f2:4f:e7:03:e2:36:b1:05:26:d8:86:58:ee:51:c1:1c: c7:73:94:7a:09:48:29:56:ff:97:43:e9:85:0b:ae:d5: 23:d1:9e:d6:85:f3:66:5a:6c:70:88:de:93:81:bf:12: a0:ab:76:ac:20:23:a0:2c:a8:27:b1:a3:47:68:82:58: a1:0c:4c:2b:72:ce:72:14:ff:eb:72:48:90:e9:f2:8f: 8e:31:15:f0:5a:0b:d8:ad:50:06:dd:ff:47:e6:a3:f9: 8e:22:b4:41:8f:20:94:0f:63:b6:7b:c0:48:4a:c4:77 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:a5:68:ea:93:aa:b9:af:94:f4:f6:d6: 13:35:58:9c:8d:d3:20:87:4b:c2:c6:40:ae:6d:4e:fc: d2:02:1d:00:e0:f9:0d:e5:0b:92:2c:5d:e2:a6:fa:8e: 77:b6:a2:a9:3e:6f:ba:71:95:a6:6f:5d:08:41:e1:b3 Fingerprint (SHA-256): 74:87:08:91:D6:5B:E8:B0:97:8D:5E:06:42:19:84:69:B6:DE:A3:5B:0B:ED:11:52:B8:E0:D3:7B:DD:55:93:8D Fingerprint (SHA1): 5A:A9:11:76:21:97:A7:E6:FF:E7:40:D7:71:39:70:52:65:7E:7B:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193369 (0x1315c359) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:34:59 2023 Not After : Mon Mar 20 19:34:59 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9d:e6:bc:d8:d8:7d:d4:81:07:e2:d4:51:76:b5:81:24: 7c:db:b3:bf:64:1c:40:b0:ce:86:b3:0c:b7:ce:63:d7: b5:48:8f:b3:41:17:31:93:05:a3:29:36:0c:3d:2a:81: 8c:2c:6b:5b:84:8b:71:15:8f:43:49:37:a8:b9:c7:2c: 05:42:20:36:50:15:3c:a2:46:56:bc:2e:fe:4c:99:ee: 38:ef:91:75:29:76:69:eb:e8:39:d9:c6:9e:78:e0:b5: b6:89:70:0d:00:b4:c6:c6:e8:0e:98:34:f9:39:7f:68: a3:a8:c6:c7:c0:e2:86:4b:4d:94:53:42:7f:9f:f3:50: f1:90:c2:ad:8a:39:02:b8:89:c1:28:47:81:78:0b:2b: f2:4f:e7:03:e2:36:b1:05:26:d8:86:58:ee:51:c1:1c: c7:73:94:7a:09:48:29:56:ff:97:43:e9:85:0b:ae:d5: 23:d1:9e:d6:85:f3:66:5a:6c:70:88:de:93:81:bf:12: a0:ab:76:ac:20:23:a0:2c:a8:27:b1:a3:47:68:82:58: a1:0c:4c:2b:72:ce:72:14:ff:eb:72:48:90:e9:f2:8f: 8e:31:15:f0:5a:0b:d8:ad:50:06:dd:ff:47:e6:a3:f9: 8e:22:b4:41:8f:20:94:0f:63:b6:7b:c0:48:4a:c4:77 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:a5:68:ea:93:aa:b9:af:94:f4:f6:d6: 13:35:58:9c:8d:d3:20:87:4b:c2:c6:40:ae:6d:4e:fc: d2:02:1d:00:e0:f9:0d:e5:0b:92:2c:5d:e2:a6:fa:8e: 77:b6:a2:a9:3e:6f:ba:71:95:a6:6f:5d:08:41:e1:b3 Fingerprint (SHA-256): 74:87:08:91:D6:5B:E8:B0:97:8D:5E:06:42:19:84:69:B6:DE:A3:5B:0B:ED:11:52:B8:E0:D3:7B:DD:55:93:8D Fingerprint (SHA1): 5A:A9:11:76:21:97:A7:E6:FF:E7:40:D7:71:39:70:52:65:7E:7B:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320193509Z nextupdate=20240320193509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 19:35:09 2023 Next Update: Wed Mar 20 19:35:09 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193509Z nextupdate=20240320193509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:35:09 2023 Next Update: Wed Mar 20 19:35:09 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320193509Z nextupdate=20240320193509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 19:35:09 2023 Next Update: Wed Mar 20 19:35:09 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320193509Z nextupdate=20240320193509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 19:35:09 2023 Next Update: Wed Mar 20 19:35:09 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320193510Z addcert 14 20230320193510Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 19:35:10 2023 Next Update: Wed Mar 20 19:35:09 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 20 19:35:10 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193511Z addcert 15 20230320193511Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:35:11 2023 Next Update: Wed Mar 20 19:35:09 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 20 19:35:11 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:04 2023 Not After : Mon Mar 20 19:35:04 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:11:28:c3:3e:66:4c:a0:b6:43:13:37:ba:c2:42:9a: 46:32:cb:e8:da:29:2b:58:e1:a3:21:ec:da:f7:40:a7: 63:e5:d5:5c:71:6c:57:d8:11:4a:1f:09:60:58:44:90: c3:ff:23:38:d6:3e:c5:3b:fc:16:36:ad:b1:a5:88:45: 42:bd:db:e5:04:d2:d2:69:5f:7d:b4:86:57:8a:c6:54: 11:ba:45:10:e3:59:2d:1a:ca:f0:6c:26:3e:cf:b7:2c: bb:b2:7e:ad:40:81:31:0c:4b:cb:9b:91:de:2d:bd:9b: 23:c7:95:c9:19:e7:35:74:1b:ee:00:cb:56:0d:83:f8: d8:ff:18:21:be:4b:17:4e:09:0f:ff:3c:18:cb:18:81: 6e:38:77:2b:c8:0a:ef:73:48:77:ef:0a:f2:f9:c2:5c: 83:18:b6:97:62:5b:7f:fb:a7:dc:ec:9d:72:45:d1:c4: 3f:c3:30:13:11:54:ce:5b:fd:7d:16:b8:74:88:30:54: bb:f7:1c:24:91:39:06:32:5e:dc:c0:e9:35:0c:a6:56: f4:bc:97:78:b7:0b:50:15:f8:ce:d7:aa:98:c3:33:89: bb:4e:6b:3e:76:23:61:c0:82:86:5a:6e:30:a4:84:6f: 88:8b:36:a9:48:f0:52:62:74:3e:ff:f4:c4:80:ec:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:8e:5b:af:20:e9:b6:8f:53:a0:5d:fa:98:48:27:1c: 2e:bf:0d:bf:6b:92:18:11:ad:fd:3e:a7:f6:70:98:3a: bf:54:09:a1:a8:33:4e:88:cb:ff:77:e1:23:0a:7a:8d: 5d:76:9f:3f:4d:34:e3:0c:57:8b:8b:5d:b5:8c:5c:84: f3:56:42:48:d7:57:da:89:58:98:bd:10:06:f6:d2:a2: b0:16:f2:c4:bf:b0:6c:97:25:47:ac:27:3b:60:c9:c0: e2:ad:4f:01:49:75:f4:f5:1b:b8:da:ec:b2:6b:e2:fb: 5e:fb:22:5a:21:80:de:c5:b5:02:56:95:65:6e:25:1e: 41:41:14:03:ff:06:c1:f3:3c:ce:59:bb:6b:43:9b:f5: f5:1b:92:2a:37:d7:5b:29:5d:54:20:39:06:b6:8d:55: 7f:ff:e9:48:c2:03:42:b7:d0:71:80:e5:cf:2d:b7:11: 5e:42:5e:d2:fa:25:a2:33:ad:49:dc:31:59:59:77:7c: 16:4a:7b:e1:d0:01:00:54:c6:4d:e0:27:b3:1a:ff:5a: ab:3b:64:86:f6:30:61:97:d0:f0:91:19:e5:a0:bc:23: 4a:6e:e1:73:ca:cf:9a:e3:8f:9b:cb:5a:c3:91:ae:63: 3b:56:8b:64:fd:56:6c:8c:2c:58:13:1d:83:2e:25:4f Fingerprint (SHA-256): CC:C6:50:F7:44:88:1F:C1:EC:B9:A6:6F:3B:75:E4:51:10:56:4B:1E:48:85:E5:AB:8D:55:01:ED:79:FF:E2:F1 Fingerprint (SHA1): CD:86:4E:82:B8:16:B4:1A:D6:B6:C2:40:B2:90:15:EF:88:F2:4F:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:04 2023 Not After : Mon Mar 20 19:35:04 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:11:28:c3:3e:66:4c:a0:b6:43:13:37:ba:c2:42:9a: 46:32:cb:e8:da:29:2b:58:e1:a3:21:ec:da:f7:40:a7: 63:e5:d5:5c:71:6c:57:d8:11:4a:1f:09:60:58:44:90: c3:ff:23:38:d6:3e:c5:3b:fc:16:36:ad:b1:a5:88:45: 42:bd:db:e5:04:d2:d2:69:5f:7d:b4:86:57:8a:c6:54: 11:ba:45:10:e3:59:2d:1a:ca:f0:6c:26:3e:cf:b7:2c: bb:b2:7e:ad:40:81:31:0c:4b:cb:9b:91:de:2d:bd:9b: 23:c7:95:c9:19:e7:35:74:1b:ee:00:cb:56:0d:83:f8: d8:ff:18:21:be:4b:17:4e:09:0f:ff:3c:18:cb:18:81: 6e:38:77:2b:c8:0a:ef:73:48:77:ef:0a:f2:f9:c2:5c: 83:18:b6:97:62:5b:7f:fb:a7:dc:ec:9d:72:45:d1:c4: 3f:c3:30:13:11:54:ce:5b:fd:7d:16:b8:74:88:30:54: bb:f7:1c:24:91:39:06:32:5e:dc:c0:e9:35:0c:a6:56: f4:bc:97:78:b7:0b:50:15:f8:ce:d7:aa:98:c3:33:89: bb:4e:6b:3e:76:23:61:c0:82:86:5a:6e:30:a4:84:6f: 88:8b:36:a9:48:f0:52:62:74:3e:ff:f4:c4:80:ec:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:8e:5b:af:20:e9:b6:8f:53:a0:5d:fa:98:48:27:1c: 2e:bf:0d:bf:6b:92:18:11:ad:fd:3e:a7:f6:70:98:3a: bf:54:09:a1:a8:33:4e:88:cb:ff:77:e1:23:0a:7a:8d: 5d:76:9f:3f:4d:34:e3:0c:57:8b:8b:5d:b5:8c:5c:84: f3:56:42:48:d7:57:da:89:58:98:bd:10:06:f6:d2:a2: b0:16:f2:c4:bf:b0:6c:97:25:47:ac:27:3b:60:c9:c0: e2:ad:4f:01:49:75:f4:f5:1b:b8:da:ec:b2:6b:e2:fb: 5e:fb:22:5a:21:80:de:c5:b5:02:56:95:65:6e:25:1e: 41:41:14:03:ff:06:c1:f3:3c:ce:59:bb:6b:43:9b:f5: f5:1b:92:2a:37:d7:5b:29:5d:54:20:39:06:b6:8d:55: 7f:ff:e9:48:c2:03:42:b7:d0:71:80:e5:cf:2d:b7:11: 5e:42:5e:d2:fa:25:a2:33:ad:49:dc:31:59:59:77:7c: 16:4a:7b:e1:d0:01:00:54:c6:4d:e0:27:b3:1a:ff:5a: ab:3b:64:86:f6:30:61:97:d0:f0:91:19:e5:a0:bc:23: 4a:6e:e1:73:ca:cf:9a:e3:8f:9b:cb:5a:c3:91:ae:63: 3b:56:8b:64:fd:56:6c:8c:2c:58:13:1d:83:2e:25:4f Fingerprint (SHA-256): CC:C6:50:F7:44:88:1F:C1:EC:B9:A6:6F:3B:75:E4:51:10:56:4B:1E:48:85:E5:AB:8D:55:01:ED:79:FF:E2:F1 Fingerprint (SHA1): CD:86:4E:82:B8:16:B4:1A:D6:B6:C2:40:B2:90:15:EF:88:F2:4F:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193378 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 320193379 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193254.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193238.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193254.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 320193380 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193254.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193239.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 320193381 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193254.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193240.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193254.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193241.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320193519Z nextupdate=20240320193519Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 19:35:19 2023 Next Update: Wed Mar 20 19:35:19 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193519Z nextupdate=20240320193519Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:35:19 2023 Next Update: Wed Mar 20 19:35:19 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320193519Z nextupdate=20240320193519Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 19:35:19 2023 Next Update: Wed Mar 20 19:35:19 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320193519Z nextupdate=20240320193519Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 19:35:19 2023 Next Update: Wed Mar 20 19:35:19 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193520Z addcert 20 20230320193520Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:35:20 2023 Next Update: Wed Mar 20 19:35:19 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 19:35:20 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193521Z addcert 40 20230320193521Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:35:21 2023 Next Update: Wed Mar 20 19:35:19 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 19:35:20 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 19:35:21 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193378 (0x1315c362) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:13 2023 Not After : Mon Mar 20 19:35:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:bf:ce:d5:eb:9a:40:e3:b0:a6:3f:ef:9d:a1:73:e6: 1a:62:cb:6c:29:d3:81:50:ee:2d:6f:74:37:63:db:f3: dd:e6:8f:31:2e:c6:44:4c:ba:c3:8d:f1:15:65:f6:c6: 5a:74:b4:b8:d3:ee:5c:39:99:b7:6f:b4:4f:d0:80:db: 51:02:ab:ed:fa:2a:b0:35:80:e3:52:ad:0d:e6:4a:26: 47:89:58:9c:45:ff:38:a4:16:7e:8d:2d:c2:b8:05:fa: 53:00:48:65:79:49:49:ef:eb:db:59:95:55:54:5f:53: 1a:5f:01:6e:88:e5:81:55:e8:05:ea:fd:8a:7a:77:65: 34:80:26:0b:20:c0:ba:3e:2b:ce:4f:bc:5f:34:41:a3: bd:a8:7c:4d:fb:0c:b0:de:0a:49:20:78:21:a1:71:f8: 5b:39:59:cf:06:ea:33:26:2a:d5:5a:23:cd:53:a1:80: 41:79:b8:75:74:a1:51:6c:c5:7d:da:fd:34:a6:b2:42: 63:5e:bc:b1:2b:73:39:38:99:29:6e:fa:58:b2:da:bd: 1c:11:19:2a:cd:07:35:17:70:60:52:ff:51:b4:07:24: e4:d1:d4:96:d7:bf:8c:55:a6:5d:eb:39:fd:e1:00:a1: ff:92:a1:cb:7d:5c:a7:67:52:f7:6b:89:b2:14:41:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:53:1b:84:80:4f:1b:fd:69:d7:ba:5c:c5:91:14:c8: 61:89:92:a0:58:e4:ab:c0:f6:a8:60:9a:0e:8f:e1:60: aa:23:8b:c5:60:89:4d:c3:ca:84:5e:37:a6:d3:db:6a: 08:d8:5a:56:d8:cc:05:f7:86:95:24:e5:14:ec:d8:8f: 48:40:58:03:2c:73:73:51:e2:cd:e2:f0:0b:ea:a9:f5: dd:8f:13:b3:f5:c5:8a:40:b6:0b:ba:2d:ca:2e:62:01: 30:09:12:95:9b:6a:bd:21:26:c4:f7:3c:94:44:3f:6f: 4c:37:4d:67:cd:d2:90:5e:cf:c0:9b:5a:ac:7d:3f:fd: 90:bd:fa:96:4a:26:5d:a2:37:8c:a3:53:e7:58:10:34: 88:ec:65:4f:d9:79:c6:16:a5:ad:aa:b7:3f:f1:06:5d: 7c:99:e3:4c:d5:66:91:93:6c:15:45:c6:b7:0f:fc:d5: 1a:17:59:b6:96:75:bf:97:ac:a8:ce:2f:c7:69:5c:55: d3:ee:07:21:8b:d8:88:74:bf:5b:7f:ed:92:08:d4:34: 24:b6:08:2c:93:2c:97:bc:37:a7:a3:d8:f1:57:5b:ca: bb:af:fb:5c:b5:05:8f:90:44:47:2f:ee:5e:e9:50:62: b5:78:ca:d5:4b:b2:b0:54:2f:eb:ea:af:78:ec:fe:15 Fingerprint (SHA-256): AC:A5:29:9E:F1:8B:BD:03:51:5E:DB:6B:13:DA:9B:F5:1C:F9:C7:78:B0:05:0A:AA:0A:8B:80:22:51:4E:58:BD Fingerprint (SHA1): 8B:4B:03:69:AB:5B:C8:84:6E:F8:D9:F3:25:87:82:15:57:EC:B3:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193378 (0x1315c362) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:13 2023 Not After : Mon Mar 20 19:35:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:bf:ce:d5:eb:9a:40:e3:b0:a6:3f:ef:9d:a1:73:e6: 1a:62:cb:6c:29:d3:81:50:ee:2d:6f:74:37:63:db:f3: dd:e6:8f:31:2e:c6:44:4c:ba:c3:8d:f1:15:65:f6:c6: 5a:74:b4:b8:d3:ee:5c:39:99:b7:6f:b4:4f:d0:80:db: 51:02:ab:ed:fa:2a:b0:35:80:e3:52:ad:0d:e6:4a:26: 47:89:58:9c:45:ff:38:a4:16:7e:8d:2d:c2:b8:05:fa: 53:00:48:65:79:49:49:ef:eb:db:59:95:55:54:5f:53: 1a:5f:01:6e:88:e5:81:55:e8:05:ea:fd:8a:7a:77:65: 34:80:26:0b:20:c0:ba:3e:2b:ce:4f:bc:5f:34:41:a3: bd:a8:7c:4d:fb:0c:b0:de:0a:49:20:78:21:a1:71:f8: 5b:39:59:cf:06:ea:33:26:2a:d5:5a:23:cd:53:a1:80: 41:79:b8:75:74:a1:51:6c:c5:7d:da:fd:34:a6:b2:42: 63:5e:bc:b1:2b:73:39:38:99:29:6e:fa:58:b2:da:bd: 1c:11:19:2a:cd:07:35:17:70:60:52:ff:51:b4:07:24: e4:d1:d4:96:d7:bf:8c:55:a6:5d:eb:39:fd:e1:00:a1: ff:92:a1:cb:7d:5c:a7:67:52:f7:6b:89:b2:14:41:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:53:1b:84:80:4f:1b:fd:69:d7:ba:5c:c5:91:14:c8: 61:89:92:a0:58:e4:ab:c0:f6:a8:60:9a:0e:8f:e1:60: aa:23:8b:c5:60:89:4d:c3:ca:84:5e:37:a6:d3:db:6a: 08:d8:5a:56:d8:cc:05:f7:86:95:24:e5:14:ec:d8:8f: 48:40:58:03:2c:73:73:51:e2:cd:e2:f0:0b:ea:a9:f5: dd:8f:13:b3:f5:c5:8a:40:b6:0b:ba:2d:ca:2e:62:01: 30:09:12:95:9b:6a:bd:21:26:c4:f7:3c:94:44:3f:6f: 4c:37:4d:67:cd:d2:90:5e:cf:c0:9b:5a:ac:7d:3f:fd: 90:bd:fa:96:4a:26:5d:a2:37:8c:a3:53:e7:58:10:34: 88:ec:65:4f:d9:79:c6:16:a5:ad:aa:b7:3f:f1:06:5d: 7c:99:e3:4c:d5:66:91:93:6c:15:45:c6:b7:0f:fc:d5: 1a:17:59:b6:96:75:bf:97:ac:a8:ce:2f:c7:69:5c:55: d3:ee:07:21:8b:d8:88:74:bf:5b:7f:ed:92:08:d4:34: 24:b6:08:2c:93:2c:97:bc:37:a7:a3:d8:f1:57:5b:ca: bb:af:fb:5c:b5:05:8f:90:44:47:2f:ee:5e:e9:50:62: b5:78:ca:d5:4b:b2:b0:54:2f:eb:ea:af:78:ec:fe:15 Fingerprint (SHA-256): AC:A5:29:9E:F1:8B:BD:03:51:5E:DB:6B:13:DA:9B:F5:1C:F9:C7:78:B0:05:0A:AA:0A:8B:80:22:51:4E:58:BD Fingerprint (SHA1): 8B:4B:03:69:AB:5B:C8:84:6E:F8:D9:F3:25:87:82:15:57:EC:B3:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193382 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320193383 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193384 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 320193385 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193386 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 320193387 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 320193388 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193382 (0x1315c366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:35:23 2023 Not After : Mon Mar 20 19:35:23 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:05:d4:31:a1:c6:8d:fe:9e:2c:fa:7f:9c:25:1c:9f: 5f:0a:32:b8:e8:06:74:2e:12:bb:81:3f:bd:6a:60:bb: 27:9f:18:ce:aa:f6:3a:d0:76:c0:d4:88:cc:01:52:c1: 8e:b7:ac:3b:10:03:31:63:e5:3b:93:7a:b5:63:b0:f4: b8:1f:9f:7d:84:de:e8:53:98:71:81:eb:51:21:8b:e0: 4f:03:0f:0c:8d:68:33:1b:da:e6:85:0a:7f:65:05:56: e0:e3:b1:d7:39:75:d1:7b:d6:45:84:d4:ff:66:aa:cb: 94:49:38:db:f2:76:3a:c4:e1:94:f4:c4:b1:31:da:1d: 54:f0:b8:74:ec:3d:c1:e0:f6:3f:70:ba:eb:6e:f2:5d: 74:f1:5d:8c:0a:94:ff:0b:73:b4:c4:24:80:58:66:a1: 9d:13:57:32:27:60:bc:e3:25:e5:e1:6c:cf:5e:a7:1a: 1b:5d:6d:3f:ae:1a:fa:2b:65:31:b8:01:5a:39:f8:5c: ac:1e:c0:da:70:16:cf:0a:14:74:34:03:23:9b:98:81: 91:29:d2:17:f7:56:64:9f:25:c3:b0:ec:09:64:d2:6b: a5:ca:35:bc:bc:36:84:cd:54:44:f0:e1:f7:53:83:41: c3:f6:f9:6d:b0:a0:36:5b:78:17:0c:be:1b:86:9b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:fc:02:aa:f0:e0:2d:b6:86:a2:4b:64:6a:ee:26:4f: c6:dc:b8:62:26:0f:2f:18:b3:6e:6b:c5:f8:47:05:34: 6a:d6:7c:1b:2e:cc:17:1a:91:c9:c9:57:7a:71:81:14: 97:57:62:1e:7a:c3:b3:8d:77:0e:75:ca:79:25:10:fe: 45:e3:5f:ae:cc:00:9f:dd:44:82:34:b7:24:89:6d:f3: 57:cb:a8:13:10:ca:03:5c:be:7d:70:dd:0d:61:c4:b3: 19:b8:05:52:5c:b0:ae:0f:46:36:31:78:61:e8:81:00: 54:4a:a0:ef:b7:ad:31:6c:47:48:bd:4f:98:cd:6e:de: d9:47:a5:a7:4b:b6:b8:a9:9e:44:9d:40:ca:22:ee:b8: 5f:09:80:81:f7:a2:ce:d4:21:ac:41:67:41:19:36:e3: 44:8b:c6:f1:88:c9:9d:0c:39:2a:57:42:05:ab:55:96: 46:45:c0:a4:a0:7d:70:7c:8b:95:9b:8d:f2:ad:67:bc: e2:6b:9a:31:9c:30:de:77:3c:67:c4:46:e8:c9:f7:28: 60:45:03:a7:18:c5:c8:26:5d:e4:72:ae:6e:b8:a6:6e: 68:02:4c:11:13:4d:18:38:0f:7b:76:45:36:5f:18:0a: b6:50:e1:59:4d:65:36:08:13:d7:d2:cc:19:a0:25:4c Fingerprint (SHA-256): 2D:04:6E:C4:FC:3F:F1:60:70:26:8C:5A:59:4C:24:70:5C:D3:11:0E:B1:47:6B:70:47:8F:0F:55:51:88:51:94 Fingerprint (SHA1): 21:33:ED:7D:EA:F4:E4:5A:DA:91:DD:FD:EB:16:22:EE:FE:48:FE:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193384 (0x1315c368) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:24 2023 Not After : Mon Mar 20 19:35:24 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:4b:58:5d:d2:b0:cc:7b:e1:c5:9a:cb:3a:e9:8b:4b: 3e:45:bb:61:42:d6:a0:88:d5:a4:50:1a:b1:b8:9f:ed: e1:bc:bb:e3:63:b2:c3:0f:fb:b1:4f:5f:e5:96:d3:c1: 59:36:ce:58:c5:df:f5:8c:f0:c0:f7:d6:f8:a0:33:2f: ec:71:fb:85:b9:08:f6:0b:08:0d:7d:df:78:a2:3c:cf: c8:af:d9:36:89:dd:b0:72:72:4b:aa:e1:29:91:3b:3c: 8e:36:f4:88:09:e3:e5:a5:bc:c4:74:4d:fe:10:9c:7e: 8c:e3:6e:16:44:6b:77:d3:3c:12:28:d9:3b:70:0d:f1: dc:c0:c0:aa:81:45:c7:59:f7:7e:9d:d3:88:3c:be:c4: bf:d0:4c:c3:08:0c:c7:2d:19:78:69:ec:8c:cc:ce:cd: 42:c5:74:3f:4b:35:d3:d7:d3:2b:70:3d:d3:75:4b:58: ff:3a:39:15:63:7c:cd:79:7a:70:de:2e:c7:93:34:73: 5d:bc:03:53:39:84:c5:1b:d2:89:ab:0e:29:e6:7c:d5: 0e:c1:d4:22:96:0f:38:25:51:d5:3e:8b:44:37:53:96: 0e:d0:6a:6e:6a:f6:8a:2c:ea:ce:80:f6:5e:1f:89:c5: 19:49:29:79:11:2b:27:3e:cd:6e:d2:c7:0a:72:2b:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:c7:34:3e:a8:3e:5d:bf:60:7f:5f:02:b4:07:b9:8c: 06:cc:56:8d:f4:18:51:27:52:f4:64:68:20:8e:95:eb: bc:1f:23:14:39:d0:c0:98:b8:c4:92:11:24:ed:75:e0: bd:87:02:12:fc:7c:18:d0:48:48:5c:79:1b:2e:49:cb: 2c:52:11:bb:e1:7e:cd:8e:17:e1:01:01:ba:bb:c9:43: d3:bf:0d:56:68:1a:3c:30:0d:a9:55:dc:a9:0d:ef:b4: 0b:b2:84:44:95:90:ba:17:a4:e6:58:df:50:cc:4f:88: 7f:0b:39:25:cf:0d:e0:ec:da:cc:4e:b9:34:fe:79:dc: 53:13:4e:ec:8b:6e:3a:29:03:e3:fe:5f:29:f7:55:f5: f5:7f:eb:12:12:de:d1:82:4e:16:aa:a4:b9:7b:fd:50: f4:6a:fe:b7:d2:04:f2:f3:ed:05:37:ab:54:7c:94:b5: 08:06:12:fc:2a:4c:c8:77:36:5f:af:e6:43:a7:c3:79: 3c:08:44:84:1f:7e:68:9e:36:12:d2:aa:26:fe:8b:65: 41:25:1a:c5:33:6f:3d:5f:3f:78:8c:21:3c:a1:c1:a7: 92:74:39:0d:e3:7c:eb:ac:37:26:7b:c9:55:7d:08:37: eb:f7:fa:9d:9e:15:89:8b:66:be:3e:be:af:ee:c0:5a Fingerprint (SHA-256): 83:B8:82:88:65:1C:02:4A:56:E6:9F:11:17:2F:D2:90:AC:CD:B0:AF:58:E5:85:E8:1A:46:BC:95:0F:83:13:00 Fingerprint (SHA1): 44:29:C4:95:1D:BE:90:67:4C:51:83:D9:C2:62:20:20:C8:23:BF:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193382 (0x1315c366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:35:23 2023 Not After : Mon Mar 20 19:35:23 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:05:d4:31:a1:c6:8d:fe:9e:2c:fa:7f:9c:25:1c:9f: 5f:0a:32:b8:e8:06:74:2e:12:bb:81:3f:bd:6a:60:bb: 27:9f:18:ce:aa:f6:3a:d0:76:c0:d4:88:cc:01:52:c1: 8e:b7:ac:3b:10:03:31:63:e5:3b:93:7a:b5:63:b0:f4: b8:1f:9f:7d:84:de:e8:53:98:71:81:eb:51:21:8b:e0: 4f:03:0f:0c:8d:68:33:1b:da:e6:85:0a:7f:65:05:56: e0:e3:b1:d7:39:75:d1:7b:d6:45:84:d4:ff:66:aa:cb: 94:49:38:db:f2:76:3a:c4:e1:94:f4:c4:b1:31:da:1d: 54:f0:b8:74:ec:3d:c1:e0:f6:3f:70:ba:eb:6e:f2:5d: 74:f1:5d:8c:0a:94:ff:0b:73:b4:c4:24:80:58:66:a1: 9d:13:57:32:27:60:bc:e3:25:e5:e1:6c:cf:5e:a7:1a: 1b:5d:6d:3f:ae:1a:fa:2b:65:31:b8:01:5a:39:f8:5c: ac:1e:c0:da:70:16:cf:0a:14:74:34:03:23:9b:98:81: 91:29:d2:17:f7:56:64:9f:25:c3:b0:ec:09:64:d2:6b: a5:ca:35:bc:bc:36:84:cd:54:44:f0:e1:f7:53:83:41: c3:f6:f9:6d:b0:a0:36:5b:78:17:0c:be:1b:86:9b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:fc:02:aa:f0:e0:2d:b6:86:a2:4b:64:6a:ee:26:4f: c6:dc:b8:62:26:0f:2f:18:b3:6e:6b:c5:f8:47:05:34: 6a:d6:7c:1b:2e:cc:17:1a:91:c9:c9:57:7a:71:81:14: 97:57:62:1e:7a:c3:b3:8d:77:0e:75:ca:79:25:10:fe: 45:e3:5f:ae:cc:00:9f:dd:44:82:34:b7:24:89:6d:f3: 57:cb:a8:13:10:ca:03:5c:be:7d:70:dd:0d:61:c4:b3: 19:b8:05:52:5c:b0:ae:0f:46:36:31:78:61:e8:81:00: 54:4a:a0:ef:b7:ad:31:6c:47:48:bd:4f:98:cd:6e:de: d9:47:a5:a7:4b:b6:b8:a9:9e:44:9d:40:ca:22:ee:b8: 5f:09:80:81:f7:a2:ce:d4:21:ac:41:67:41:19:36:e3: 44:8b:c6:f1:88:c9:9d:0c:39:2a:57:42:05:ab:55:96: 46:45:c0:a4:a0:7d:70:7c:8b:95:9b:8d:f2:ad:67:bc: e2:6b:9a:31:9c:30:de:77:3c:67:c4:46:e8:c9:f7:28: 60:45:03:a7:18:c5:c8:26:5d:e4:72:ae:6e:b8:a6:6e: 68:02:4c:11:13:4d:18:38:0f:7b:76:45:36:5f:18:0a: b6:50:e1:59:4d:65:36:08:13:d7:d2:cc:19:a0:25:4c Fingerprint (SHA-256): 2D:04:6E:C4:FC:3F:F1:60:70:26:8C:5A:59:4C:24:70:5C:D3:11:0E:B1:47:6B:70:47:8F:0F:55:51:88:51:94 Fingerprint (SHA1): 21:33:ED:7D:EA:F4:E4:5A:DA:91:DD:FD:EB:16:22:EE:FE:48:FE:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193382 (0x1315c366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:35:23 2023 Not After : Mon Mar 20 19:35:23 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:05:d4:31:a1:c6:8d:fe:9e:2c:fa:7f:9c:25:1c:9f: 5f:0a:32:b8:e8:06:74:2e:12:bb:81:3f:bd:6a:60:bb: 27:9f:18:ce:aa:f6:3a:d0:76:c0:d4:88:cc:01:52:c1: 8e:b7:ac:3b:10:03:31:63:e5:3b:93:7a:b5:63:b0:f4: b8:1f:9f:7d:84:de:e8:53:98:71:81:eb:51:21:8b:e0: 4f:03:0f:0c:8d:68:33:1b:da:e6:85:0a:7f:65:05:56: e0:e3:b1:d7:39:75:d1:7b:d6:45:84:d4:ff:66:aa:cb: 94:49:38:db:f2:76:3a:c4:e1:94:f4:c4:b1:31:da:1d: 54:f0:b8:74:ec:3d:c1:e0:f6:3f:70:ba:eb:6e:f2:5d: 74:f1:5d:8c:0a:94:ff:0b:73:b4:c4:24:80:58:66:a1: 9d:13:57:32:27:60:bc:e3:25:e5:e1:6c:cf:5e:a7:1a: 1b:5d:6d:3f:ae:1a:fa:2b:65:31:b8:01:5a:39:f8:5c: ac:1e:c0:da:70:16:cf:0a:14:74:34:03:23:9b:98:81: 91:29:d2:17:f7:56:64:9f:25:c3:b0:ec:09:64:d2:6b: a5:ca:35:bc:bc:36:84:cd:54:44:f0:e1:f7:53:83:41: c3:f6:f9:6d:b0:a0:36:5b:78:17:0c:be:1b:86:9b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:fc:02:aa:f0:e0:2d:b6:86:a2:4b:64:6a:ee:26:4f: c6:dc:b8:62:26:0f:2f:18:b3:6e:6b:c5:f8:47:05:34: 6a:d6:7c:1b:2e:cc:17:1a:91:c9:c9:57:7a:71:81:14: 97:57:62:1e:7a:c3:b3:8d:77:0e:75:ca:79:25:10:fe: 45:e3:5f:ae:cc:00:9f:dd:44:82:34:b7:24:89:6d:f3: 57:cb:a8:13:10:ca:03:5c:be:7d:70:dd:0d:61:c4:b3: 19:b8:05:52:5c:b0:ae:0f:46:36:31:78:61:e8:81:00: 54:4a:a0:ef:b7:ad:31:6c:47:48:bd:4f:98:cd:6e:de: d9:47:a5:a7:4b:b6:b8:a9:9e:44:9d:40:ca:22:ee:b8: 5f:09:80:81:f7:a2:ce:d4:21:ac:41:67:41:19:36:e3: 44:8b:c6:f1:88:c9:9d:0c:39:2a:57:42:05:ab:55:96: 46:45:c0:a4:a0:7d:70:7c:8b:95:9b:8d:f2:ad:67:bc: e2:6b:9a:31:9c:30:de:77:3c:67:c4:46:e8:c9:f7:28: 60:45:03:a7:18:c5:c8:26:5d:e4:72:ae:6e:b8:a6:6e: 68:02:4c:11:13:4d:18:38:0f:7b:76:45:36:5f:18:0a: b6:50:e1:59:4d:65:36:08:13:d7:d2:cc:19:a0:25:4c Fingerprint (SHA-256): 2D:04:6E:C4:FC:3F:F1:60:70:26:8C:5A:59:4C:24:70:5C:D3:11:0E:B1:47:6B:70:47:8F:0F:55:51:88:51:94 Fingerprint (SHA1): 21:33:ED:7D:EA:F4:E4:5A:DA:91:DD:FD:EB:16:22:EE:FE:48:FE:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193384 (0x1315c368) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:24 2023 Not After : Mon Mar 20 19:35:24 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:4b:58:5d:d2:b0:cc:7b:e1:c5:9a:cb:3a:e9:8b:4b: 3e:45:bb:61:42:d6:a0:88:d5:a4:50:1a:b1:b8:9f:ed: e1:bc:bb:e3:63:b2:c3:0f:fb:b1:4f:5f:e5:96:d3:c1: 59:36:ce:58:c5:df:f5:8c:f0:c0:f7:d6:f8:a0:33:2f: ec:71:fb:85:b9:08:f6:0b:08:0d:7d:df:78:a2:3c:cf: c8:af:d9:36:89:dd:b0:72:72:4b:aa:e1:29:91:3b:3c: 8e:36:f4:88:09:e3:e5:a5:bc:c4:74:4d:fe:10:9c:7e: 8c:e3:6e:16:44:6b:77:d3:3c:12:28:d9:3b:70:0d:f1: dc:c0:c0:aa:81:45:c7:59:f7:7e:9d:d3:88:3c:be:c4: bf:d0:4c:c3:08:0c:c7:2d:19:78:69:ec:8c:cc:ce:cd: 42:c5:74:3f:4b:35:d3:d7:d3:2b:70:3d:d3:75:4b:58: ff:3a:39:15:63:7c:cd:79:7a:70:de:2e:c7:93:34:73: 5d:bc:03:53:39:84:c5:1b:d2:89:ab:0e:29:e6:7c:d5: 0e:c1:d4:22:96:0f:38:25:51:d5:3e:8b:44:37:53:96: 0e:d0:6a:6e:6a:f6:8a:2c:ea:ce:80:f6:5e:1f:89:c5: 19:49:29:79:11:2b:27:3e:cd:6e:d2:c7:0a:72:2b:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:c7:34:3e:a8:3e:5d:bf:60:7f:5f:02:b4:07:b9:8c: 06:cc:56:8d:f4:18:51:27:52:f4:64:68:20:8e:95:eb: bc:1f:23:14:39:d0:c0:98:b8:c4:92:11:24:ed:75:e0: bd:87:02:12:fc:7c:18:d0:48:48:5c:79:1b:2e:49:cb: 2c:52:11:bb:e1:7e:cd:8e:17:e1:01:01:ba:bb:c9:43: d3:bf:0d:56:68:1a:3c:30:0d:a9:55:dc:a9:0d:ef:b4: 0b:b2:84:44:95:90:ba:17:a4:e6:58:df:50:cc:4f:88: 7f:0b:39:25:cf:0d:e0:ec:da:cc:4e:b9:34:fe:79:dc: 53:13:4e:ec:8b:6e:3a:29:03:e3:fe:5f:29:f7:55:f5: f5:7f:eb:12:12:de:d1:82:4e:16:aa:a4:b9:7b:fd:50: f4:6a:fe:b7:d2:04:f2:f3:ed:05:37:ab:54:7c:94:b5: 08:06:12:fc:2a:4c:c8:77:36:5f:af:e6:43:a7:c3:79: 3c:08:44:84:1f:7e:68:9e:36:12:d2:aa:26:fe:8b:65: 41:25:1a:c5:33:6f:3d:5f:3f:78:8c:21:3c:a1:c1:a7: 92:74:39:0d:e3:7c:eb:ac:37:26:7b:c9:55:7d:08:37: eb:f7:fa:9d:9e:15:89:8b:66:be:3e:be:af:ee:c0:5a Fingerprint (SHA-256): 83:B8:82:88:65:1C:02:4A:56:E6:9F:11:17:2F:D2:90:AC:CD:B0:AF:58:E5:85:E8:1A:46:BC:95:0F:83:13:00 Fingerprint (SHA1): 44:29:C4:95:1D:BE:90:67:4C:51:83:D9:C2:62:20:20:C8:23:BF:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193382 (0x1315c366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:35:23 2023 Not After : Mon Mar 20 19:35:23 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:05:d4:31:a1:c6:8d:fe:9e:2c:fa:7f:9c:25:1c:9f: 5f:0a:32:b8:e8:06:74:2e:12:bb:81:3f:bd:6a:60:bb: 27:9f:18:ce:aa:f6:3a:d0:76:c0:d4:88:cc:01:52:c1: 8e:b7:ac:3b:10:03:31:63:e5:3b:93:7a:b5:63:b0:f4: b8:1f:9f:7d:84:de:e8:53:98:71:81:eb:51:21:8b:e0: 4f:03:0f:0c:8d:68:33:1b:da:e6:85:0a:7f:65:05:56: e0:e3:b1:d7:39:75:d1:7b:d6:45:84:d4:ff:66:aa:cb: 94:49:38:db:f2:76:3a:c4:e1:94:f4:c4:b1:31:da:1d: 54:f0:b8:74:ec:3d:c1:e0:f6:3f:70:ba:eb:6e:f2:5d: 74:f1:5d:8c:0a:94:ff:0b:73:b4:c4:24:80:58:66:a1: 9d:13:57:32:27:60:bc:e3:25:e5:e1:6c:cf:5e:a7:1a: 1b:5d:6d:3f:ae:1a:fa:2b:65:31:b8:01:5a:39:f8:5c: ac:1e:c0:da:70:16:cf:0a:14:74:34:03:23:9b:98:81: 91:29:d2:17:f7:56:64:9f:25:c3:b0:ec:09:64:d2:6b: a5:ca:35:bc:bc:36:84:cd:54:44:f0:e1:f7:53:83:41: c3:f6:f9:6d:b0:a0:36:5b:78:17:0c:be:1b:86:9b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:fc:02:aa:f0:e0:2d:b6:86:a2:4b:64:6a:ee:26:4f: c6:dc:b8:62:26:0f:2f:18:b3:6e:6b:c5:f8:47:05:34: 6a:d6:7c:1b:2e:cc:17:1a:91:c9:c9:57:7a:71:81:14: 97:57:62:1e:7a:c3:b3:8d:77:0e:75:ca:79:25:10:fe: 45:e3:5f:ae:cc:00:9f:dd:44:82:34:b7:24:89:6d:f3: 57:cb:a8:13:10:ca:03:5c:be:7d:70:dd:0d:61:c4:b3: 19:b8:05:52:5c:b0:ae:0f:46:36:31:78:61:e8:81:00: 54:4a:a0:ef:b7:ad:31:6c:47:48:bd:4f:98:cd:6e:de: d9:47:a5:a7:4b:b6:b8:a9:9e:44:9d:40:ca:22:ee:b8: 5f:09:80:81:f7:a2:ce:d4:21:ac:41:67:41:19:36:e3: 44:8b:c6:f1:88:c9:9d:0c:39:2a:57:42:05:ab:55:96: 46:45:c0:a4:a0:7d:70:7c:8b:95:9b:8d:f2:ad:67:bc: e2:6b:9a:31:9c:30:de:77:3c:67:c4:46:e8:c9:f7:28: 60:45:03:a7:18:c5:c8:26:5d:e4:72:ae:6e:b8:a6:6e: 68:02:4c:11:13:4d:18:38:0f:7b:76:45:36:5f:18:0a: b6:50:e1:59:4d:65:36:08:13:d7:d2:cc:19:a0:25:4c Fingerprint (SHA-256): 2D:04:6E:C4:FC:3F:F1:60:70:26:8C:5A:59:4C:24:70:5C:D3:11:0E:B1:47:6B:70:47:8F:0F:55:51:88:51:94 Fingerprint (SHA1): 21:33:ED:7D:EA:F4:E4:5A:DA:91:DD:FD:EB:16:22:EE:FE:48:FE:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193386 (0x1315c36a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 19:35:25 2023 Not After : Mon Mar 20 19:35:25 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:fb:48:7c:44:1e:e8:cc:ff:3b:65:b7:43:07:09:76: 20:fc:05:48:26:4e:d7:80:a6:76:9a:2b:5b:eb:2d:e4: 68:55:82:fb:74:a0:a0:72:e3:79:fc:3b:6f:85:eb:4e: 0b:9c:17:0b:27:35:3d:b1:39:79:df:14:d2:a9:37:31: 67:50:4d:18:00:47:48:9a:92:d9:99:92:d2:a0:ed:ae: 7a:49:94:3e:6d:6d:c5:d9:ea:e7:70:a3:4a:b4:65:ef: 51:76:32:25:04:ad:5f:ab:e7:0a:c9:f9:47:2f:6b:48: bd:90:67:e1:b7:d1:e4:9c:69:89:5d:60:9c:8f:a3:c7: e0:cf:14:6f:5a:d6:7f:e9:76:0a:d6:62:3e:48:34:83: ca:50:03:f8:b7:42:aa:99:4c:b1:ca:61:77:ae:2d:e5: 57:ad:10:0d:52:fc:c2:c0:1d:46:f2:b2:01:b4:75:1e: 4b:e9:8e:ff:b4:32:66:80:81:22:04:45:d4:14:d0:c6: c1:22:c3:fd:94:4f:9c:98:50:aa:9e:d7:93:63:78:78: 6c:48:11:08:82:4a:07:1c:ef:82:8d:9a:f4:ba:66:4f: 67:6c:84:f7:21:9c:34:34:4d:1d:47:df:b7:66:70:d5: de:4e:d8:3a:c3:75:90:1e:96:9a:d5:52:d7:c2:5b:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:af:92:44:55:88:7c:a3:31:96:76:86:56:ec:72:96: 9a:c3:c6:03:c3:15:63:1d:e0:2b:79:f6:b1:7a:20:89: c6:71:ef:ce:2e:45:0a:fa:74:ff:ef:ca:28:89:46:08: 87:19:83:34:0b:42:fa:26:00:00:d9:18:67:1b:c0:af: 8a:ae:99:0f:33:75:35:1b:a3:cf:98:4f:0c:88:3f:80: 06:c5:82:5c:ec:a7:c9:86:75:65:dd:51:f2:c4:2d:1e: 55:5a:18:75:0f:4c:f9:6c:a1:49:cf:c1:60:46:c2:84: bc:72:e0:c9:df:34:30:04:c0:3d:f7:fd:27:6d:25:ab: 28:6f:1e:4d:45:9f:37:42:15:79:e6:6a:25:2a:f8:7e: fb:10:93:24:fb:0c:d1:89:96:f3:52:f2:5e:dd:a0:9b: 37:94:f8:3d:5c:5e:be:df:79:b6:88:c3:61:33:a2:aa: a4:96:b5:03:a8:21:03:86:9f:6f:40:c7:8a:e2:2a:16: 03:5a:1e:63:e1:c5:c3:b4:d5:0a:6b:07:9c:4a:ea:0b: c5:10:1d:30:2a:c9:33:95:3d:01:a6:19:14:78:91:24: e1:46:56:85:c7:b8:d4:a5:84:f6:e2:08:5b:25:27:36: 52:40:8d:fe:2a:2f:d2:cf:5c:f5:2e:15:e0:f5:cf:88 Fingerprint (SHA-256): 4F:AE:29:20:96:62:7D:0E:FD:33:5F:9C:BD:B4:D0:2A:4D:49:E0:63:FF:35:E1:8E:3D:61:58:F4:EF:6F:07:B6 Fingerprint (SHA1): 21:9D:DC:04:5C:98:C4:C3:7D:A7:5F:95:03:1C:93:B2:63:23:7B:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193382 (0x1315c366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:35:23 2023 Not After : Mon Mar 20 19:35:23 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:05:d4:31:a1:c6:8d:fe:9e:2c:fa:7f:9c:25:1c:9f: 5f:0a:32:b8:e8:06:74:2e:12:bb:81:3f:bd:6a:60:bb: 27:9f:18:ce:aa:f6:3a:d0:76:c0:d4:88:cc:01:52:c1: 8e:b7:ac:3b:10:03:31:63:e5:3b:93:7a:b5:63:b0:f4: b8:1f:9f:7d:84:de:e8:53:98:71:81:eb:51:21:8b:e0: 4f:03:0f:0c:8d:68:33:1b:da:e6:85:0a:7f:65:05:56: e0:e3:b1:d7:39:75:d1:7b:d6:45:84:d4:ff:66:aa:cb: 94:49:38:db:f2:76:3a:c4:e1:94:f4:c4:b1:31:da:1d: 54:f0:b8:74:ec:3d:c1:e0:f6:3f:70:ba:eb:6e:f2:5d: 74:f1:5d:8c:0a:94:ff:0b:73:b4:c4:24:80:58:66:a1: 9d:13:57:32:27:60:bc:e3:25:e5:e1:6c:cf:5e:a7:1a: 1b:5d:6d:3f:ae:1a:fa:2b:65:31:b8:01:5a:39:f8:5c: ac:1e:c0:da:70:16:cf:0a:14:74:34:03:23:9b:98:81: 91:29:d2:17:f7:56:64:9f:25:c3:b0:ec:09:64:d2:6b: a5:ca:35:bc:bc:36:84:cd:54:44:f0:e1:f7:53:83:41: c3:f6:f9:6d:b0:a0:36:5b:78:17:0c:be:1b:86:9b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:fc:02:aa:f0:e0:2d:b6:86:a2:4b:64:6a:ee:26:4f: c6:dc:b8:62:26:0f:2f:18:b3:6e:6b:c5:f8:47:05:34: 6a:d6:7c:1b:2e:cc:17:1a:91:c9:c9:57:7a:71:81:14: 97:57:62:1e:7a:c3:b3:8d:77:0e:75:ca:79:25:10:fe: 45:e3:5f:ae:cc:00:9f:dd:44:82:34:b7:24:89:6d:f3: 57:cb:a8:13:10:ca:03:5c:be:7d:70:dd:0d:61:c4:b3: 19:b8:05:52:5c:b0:ae:0f:46:36:31:78:61:e8:81:00: 54:4a:a0:ef:b7:ad:31:6c:47:48:bd:4f:98:cd:6e:de: d9:47:a5:a7:4b:b6:b8:a9:9e:44:9d:40:ca:22:ee:b8: 5f:09:80:81:f7:a2:ce:d4:21:ac:41:67:41:19:36:e3: 44:8b:c6:f1:88:c9:9d:0c:39:2a:57:42:05:ab:55:96: 46:45:c0:a4:a0:7d:70:7c:8b:95:9b:8d:f2:ad:67:bc: e2:6b:9a:31:9c:30:de:77:3c:67:c4:46:e8:c9:f7:28: 60:45:03:a7:18:c5:c8:26:5d:e4:72:ae:6e:b8:a6:6e: 68:02:4c:11:13:4d:18:38:0f:7b:76:45:36:5f:18:0a: b6:50:e1:59:4d:65:36:08:13:d7:d2:cc:19:a0:25:4c Fingerprint (SHA-256): 2D:04:6E:C4:FC:3F:F1:60:70:26:8C:5A:59:4C:24:70:5C:D3:11:0E:B1:47:6B:70:47:8F:0F:55:51:88:51:94 Fingerprint (SHA1): 21:33:ED:7D:EA:F4:E4:5A:DA:91:DD:FD:EB:16:22:EE:FE:48:FE:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193387 (0x1315c36b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 19:35:26 2023 Not After : Mon Mar 20 19:35:26 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:c3:6d:60:24:e2:68:77:95:fa:6e:ed:c0:42:70:d5: ed:04:e6:94:bb:fd:7a:5d:d7:43:8e:2a:8d:81:03:ac: 6e:fa:92:a0:22:64:17:f9:34:f0:ec:84:57:55:fc:71: 0c:18:55:2a:ae:38:fa:2d:50:cc:60:ad:61:95:bf:d2: b7:a4:31:ac:93:aa:6a:99:2c:19:a2:39:a2:66:ab:a3: 98:1d:97:68:ce:0e:fd:95:db:cc:fd:eb:8a:43:25:9d: 23:af:34:a7:4e:e9:0a:d2:92:36:7e:8e:04:af:d3:d2: 75:ee:75:31:b5:51:e6:0c:a6:08:42:1d:f9:2c:e6:28: d6:57:81:01:d5:b6:16:94:8a:4f:3e:20:e9:05:37:67: c1:48:b5:d1:d4:12:cc:d1:b1:be:2a:c8:65:f5:85:88: 53:42:b4:2e:40:89:f6:b2:15:38:45:18:6e:ef:ea:14: 49:d9:c0:46:26:e6:f9:e5:b9:de:78:6f:71:e0:ea:c1: 07:6f:50:83:8e:85:18:f2:dd:bb:bf:00:56:3c:ca:53: 4c:52:94:0e:fc:88:5e:08:2a:3a:21:0d:36:cb:7d:f1: ea:bb:86:6f:54:80:e0:3b:2f:fa:01:50:ad:75:16:24: 33:14:05:fe:f0:f8:49:a3:c8:1f:85:20:8b:45:3b:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:40:05:28:73:06:69:d6:85:99:a9:5d:4a:b0:4a:8c: e8:27:7d:ae:97:5d:40:47:78:66:9f:bd:63:06:f5:81: 0d:33:36:c2:27:42:a7:73:68:c9:94:2f:1c:c0:6a:0f: 25:3d:3f:dd:ac:07:18:de:03:6b:64:62:c7:86:55:33: f4:82:84:8f:f7:a7:b2:91:84:d8:5e:1b:39:77:3c:98: b1:73:81:a1:6d:7a:51:40:51:3b:e3:16:b1:23:90:ef: 98:10:0c:bc:74:f6:5a:4e:1a:16:05:30:73:cd:f4:5c: 30:70:06:11:1e:50:68:5b:7a:08:5c:29:a1:ef:62:5a: 57:a2:03:06:e0:27:cb:ec:57:c4:29:df:de:a6:a7:bc: 85:1a:40:62:2c:d2:78:d2:74:29:eb:6b:49:1f:f2:9f: 31:9b:0a:9b:19:79:4e:e8:78:88:28:62:c3:a9:a6:40: 2f:c1:56:6a:1f:12:34:1f:a2:49:3e:d7:f4:4c:17:eb: 73:3c:b0:ae:7a:af:c4:66:f1:d7:5d:f5:7b:50:8d:11: c7:1a:b2:53:61:6d:fc:81:c6:c8:0e:1b:e0:30:f9:17: f4:54:ca:7e:f7:40:7a:75:e4:aa:54:47:45:7e:c0:f6: 1a:8d:16:f7:35:0e:b1:a7:d6:7a:e4:f4:16:a9:58:7b Fingerprint (SHA-256): 1A:5D:46:CB:84:D8:DE:93:C2:55:81:64:33:41:BC:ED:C4:34:9E:C6:90:1B:87:0F:14:68:60:73:E6:B1:B6:9D Fingerprint (SHA1): 1C:00:A8:96:F3:28:5E:E8:68:E7:24:C9:5B:F2:09:A4:35:2A:86:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 26563 at Mon Mar 20 19:35:31 UTC 2023 kill -USR1 26563 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 26563 killed at Mon Mar 20 19:35:31 UTC 2023 httpserv starting at Mon Mar 20 19:35:31 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 19:35:31 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 38865 >/dev/null 2>/dev/null httpserv with PID 38865 found at Mon Mar 20 19:35:31 UTC 2023 httpserv with PID 38865 started at Mon Mar 20 19:35:31 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193389 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193390 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320193391 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320193392 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 320193393 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193390 (0x1315c36e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:35:33 2023 Not After : Mon Mar 20 19:35:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:1a:14:e2:f3:44:c1:7f:41:b2:3d:1d:21:bb:2a:3d: c4:cb:50:69:85:20:fb:74:f2:e8:a6:f8:0f:f6:cf:f1: 7e:2d:f2:2c:9e:67:e5:91:d7:d7:f7:6c:2e:d3:fc:83: 9c:bd:9e:88:d3:d7:21:45:bd:b3:64:5c:21:31:3f:0d: 0e:95:5a:82:76:e6:6e:fc:6b:bb:a1:8c:1a:86:82:11: f3:0f:5a:52:7c:e0:bb:f1:80:04:11:e2:95:22:98:63: c2:e6:b5:cb:89:2c:bf:3e:1b:56:3b:a7:b0:1d:fa:40: 98:ce:70:6c:77:61:d5:d7:0a:4b:c6:b3:64:e5:04:d7: 0a:28:aa:76:96:0f:72:b0:98:5e:16:57:42:45:30:ca: 6b:f4:0e:87:a5:5e:e0:35:ff:c9:be:9a:b7:c2:b0:61: 9d:96:1d:5b:7f:0d:86:4b:1a:46:64:5d:32:3a:05:3d: 47:42:6f:b3:bf:3a:7d:df:2a:54:ce:03:76:cf:f8:25: a2:ec:3e:51:8d:c2:76:83:56:7b:de:10:20:c0:d2:47: b4:62:83:c2:8f:3f:98:75:d4:87:e7:52:32:fe:b9:ae: 37:ac:e6:ce:81:6b:4d:f6:3e:4b:92:81:2a:a9:c7:e4: 3f:13:63:5d:7b:95:3d:e0:6a:50:55:bc:1c:99:44:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0f:f1:ae:73:96:38:52:3c:c9:9c:94:3b:83:f7:8d: 92:fa:58:66:69:96:7c:bf:4a:8a:4e:11:2d:1d:e7:de: 52:22:45:4c:50:6b:bd:66:30:33:3d:4c:39:a2:ac:69: 05:ba:41:71:69:34:08:9d:90:9e:6d:b9:ba:04:a3:98: 96:40:43:79:68:a4:4b:d1:8a:43:e4:44:b6:e5:aa:8f: 80:95:c0:cd:60:91:69:57:3f:d3:14:0d:f5:f5:0f:37: 2c:80:85:77:d3:2a:3e:3d:5b:56:cd:67:46:51:1c:b5: 2f:39:f1:48:2b:c5:17:90:b3:3f:d8:4d:4b:c9:78:4d: 3c:58:24:97:a7:47:88:ba:5e:a5:51:c5:46:8a:89:48: 17:b7:95:ac:6b:96:58:97:97:93:50:f6:d6:87:ea:67: c5:6a:ba:a6:e7:21:ee:c8:58:4b:1e:d4:98:45:61:e5: 50:06:7a:d2:d6:9e:03:dd:69:f9:25:fa:01:a8:dc:a0: ee:22:50:fa:1a:16:f5:68:be:83:03:db:ed:cd:96:d1: bb:40:39:d3:32:bb:a7:94:78:c9:84:82:16:3b:af:20: a5:2c:02:6a:b7:f6:e6:8a:d5:6a:5b:be:72:c2:04:7c: 99:af:b5:63:45:43:cf:a2:4c:0a:c3:d6:5e:f3:1a:66 Fingerprint (SHA-256): 9E:D5:74:74:F5:0D:5A:15:5A:B1:84:06:14:A1:53:0A:AC:59:E7:41:D3:22:38:C5:B5:9E:03:FE:95:B9:AF:7E Fingerprint (SHA1): 7A:CC:D9:37:8E:1A:76:37:15:CF:EB:78:AA:45:13:4E:B4:20:54:91 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193389 (0x1315c36d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:35:32 2023 Not After : Mon Mar 20 19:35:32 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e6:97:4a:f7:a8:43:ee:3e:42:5e:92:05:d8:d0:8b: 3b:b8:48:89:85:4f:cc:7d:5a:83:e2:03:ef:a2:ef:5d: 6e:15:18:27:9f:f3:60:49:89:d8:c2:82:fa:36:0a:28: c6:fe:d1:b6:ed:61:18:0c:40:25:37:63:be:2b:f1:e0: f3:f3:74:47:b4:29:f3:11:5f:5d:09:d4:f7:7b:2f:50: 10:8a:38:b7:9d:8c:94:69:ec:3a:13:86:0d:cc:24:65: 78:3c:7b:8d:a0:ef:01:bf:06:0b:cd:8e:62:3d:c0:f6: 18:79:de:fb:d1:e0:fe:18:13:3e:fc:c2:4d:ba:14:ec: 0e:e0:50:1c:52:3b:6f:c0:cf:77:85:09:e4:d8:2c:dd: 05:a2:b0:59:aa:c2:5c:b0:4f:15:f9:70:f3:06:d1:2e: ed:e4:3f:3d:d3:59:c9:6e:87:68:a9:68:17:a2:3c:91: 3f:ff:af:46:ff:60:07:f8:75:9c:19:5c:b3:77:f0:59: d0:85:4b:2e:37:65:f7:06:5c:d8:55:09:91:71:cc:c3: c1:39:8d:47:4b:65:29:bd:1c:5b:78:22:75:80:c2:5f: bb:39:bf:ae:61:7a:5a:b5:93:ce:df:ff:f1:bd:57:96: 2a:48:99:e2:69:7f:46:d8:87:91:52:90:3c:76:29:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:7e:07:c1:70:d4:a0:db:6b:b0:34:5e:bd:d2:38:9b: 35:c4:bd:5e:9a:a1:aa:a8:7d:67:fa:7f:71:6f:a7:41: c4:e0:8a:df:96:5a:8b:73:21:05:1b:ac:8a:9b:5c:05: 62:66:50:ae:1f:ed:72:55:1c:cd:30:99:9b:3d:53:fb: 48:95:3f:37:65:68:37:45:6e:f5:4b:b3:c5:f0:b5:48: 0d:d1:21:3e:77:77:d1:b3:7b:e0:c2:a0:59:e2:36:b2: 8c:45:79:70:ca:62:19:52:62:cc:06:ae:54:55:bf:f9: 88:34:21:a9:2a:80:6c:62:31:15:60:70:11:95:85:20: 67:3e:3a:4b:56:64:51:cf:b1:c2:9d:9d:cc:39:28:f9: c8:89:5e:92:de:21:3d:76:72:75:7a:0f:76:78:75:66: ac:ef:c7:25:13:90:7f:01:5d:d2:26:f5:2a:2c:90:2f: 77:10:99:6c:99:6d:b2:7b:01:c8:bb:8b:6c:18:00:5d: 0a:d0:a1:54:10:84:cc:23:78:4c:aa:5b:c5:00:8c:fa: bf:1c:ac:36:33:72:e6:60:18:83:e5:81:53:48:db:a0: 65:69:9d:2c:65:43:8d:20:39:a1:32:ec:8b:a2:34:52: bf:47:2d:21:3d:72:03:f2:ce:65:94:f5:e0:d9:f8:89 Fingerprint (SHA-256): 21:DC:3F:9A:27:B8:45:60:3E:D6:4E:2B:10:13:B3:06:F0:61:BE:09:63:FA:EA:E5:51:B4:DD:75:AD:63:67:D1 Fingerprint (SHA1): 5B:F8:5D:CC:E2:E3:69:A8:4A:4E:FE:7A:B0:7D:70:E7:7E:42:F5:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193389 (0x1315c36d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:35:32 2023 Not After : Mon Mar 20 19:35:32 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e6:97:4a:f7:a8:43:ee:3e:42:5e:92:05:d8:d0:8b: 3b:b8:48:89:85:4f:cc:7d:5a:83:e2:03:ef:a2:ef:5d: 6e:15:18:27:9f:f3:60:49:89:d8:c2:82:fa:36:0a:28: c6:fe:d1:b6:ed:61:18:0c:40:25:37:63:be:2b:f1:e0: f3:f3:74:47:b4:29:f3:11:5f:5d:09:d4:f7:7b:2f:50: 10:8a:38:b7:9d:8c:94:69:ec:3a:13:86:0d:cc:24:65: 78:3c:7b:8d:a0:ef:01:bf:06:0b:cd:8e:62:3d:c0:f6: 18:79:de:fb:d1:e0:fe:18:13:3e:fc:c2:4d:ba:14:ec: 0e:e0:50:1c:52:3b:6f:c0:cf:77:85:09:e4:d8:2c:dd: 05:a2:b0:59:aa:c2:5c:b0:4f:15:f9:70:f3:06:d1:2e: ed:e4:3f:3d:d3:59:c9:6e:87:68:a9:68:17:a2:3c:91: 3f:ff:af:46:ff:60:07:f8:75:9c:19:5c:b3:77:f0:59: d0:85:4b:2e:37:65:f7:06:5c:d8:55:09:91:71:cc:c3: c1:39:8d:47:4b:65:29:bd:1c:5b:78:22:75:80:c2:5f: bb:39:bf:ae:61:7a:5a:b5:93:ce:df:ff:f1:bd:57:96: 2a:48:99:e2:69:7f:46:d8:87:91:52:90:3c:76:29:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:7e:07:c1:70:d4:a0:db:6b:b0:34:5e:bd:d2:38:9b: 35:c4:bd:5e:9a:a1:aa:a8:7d:67:fa:7f:71:6f:a7:41: c4:e0:8a:df:96:5a:8b:73:21:05:1b:ac:8a:9b:5c:05: 62:66:50:ae:1f:ed:72:55:1c:cd:30:99:9b:3d:53:fb: 48:95:3f:37:65:68:37:45:6e:f5:4b:b3:c5:f0:b5:48: 0d:d1:21:3e:77:77:d1:b3:7b:e0:c2:a0:59:e2:36:b2: 8c:45:79:70:ca:62:19:52:62:cc:06:ae:54:55:bf:f9: 88:34:21:a9:2a:80:6c:62:31:15:60:70:11:95:85:20: 67:3e:3a:4b:56:64:51:cf:b1:c2:9d:9d:cc:39:28:f9: c8:89:5e:92:de:21:3d:76:72:75:7a:0f:76:78:75:66: ac:ef:c7:25:13:90:7f:01:5d:d2:26:f5:2a:2c:90:2f: 77:10:99:6c:99:6d:b2:7b:01:c8:bb:8b:6c:18:00:5d: 0a:d0:a1:54:10:84:cc:23:78:4c:aa:5b:c5:00:8c:fa: bf:1c:ac:36:33:72:e6:60:18:83:e5:81:53:48:db:a0: 65:69:9d:2c:65:43:8d:20:39:a1:32:ec:8b:a2:34:52: bf:47:2d:21:3d:72:03:f2:ce:65:94:f5:e0:d9:f8:89 Fingerprint (SHA-256): 21:DC:3F:9A:27:B8:45:60:3E:D6:4E:2B:10:13:B3:06:F0:61:BE:09:63:FA:EA:E5:51:B4:DD:75:AD:63:67:D1 Fingerprint (SHA1): 5B:F8:5D:CC:E2:E3:69:A8:4A:4E:FE:7A:B0:7D:70:E7:7E:42:F5:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193390 (0x1315c36e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:35:33 2023 Not After : Mon Mar 20 19:35:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:1a:14:e2:f3:44:c1:7f:41:b2:3d:1d:21:bb:2a:3d: c4:cb:50:69:85:20:fb:74:f2:e8:a6:f8:0f:f6:cf:f1: 7e:2d:f2:2c:9e:67:e5:91:d7:d7:f7:6c:2e:d3:fc:83: 9c:bd:9e:88:d3:d7:21:45:bd:b3:64:5c:21:31:3f:0d: 0e:95:5a:82:76:e6:6e:fc:6b:bb:a1:8c:1a:86:82:11: f3:0f:5a:52:7c:e0:bb:f1:80:04:11:e2:95:22:98:63: c2:e6:b5:cb:89:2c:bf:3e:1b:56:3b:a7:b0:1d:fa:40: 98:ce:70:6c:77:61:d5:d7:0a:4b:c6:b3:64:e5:04:d7: 0a:28:aa:76:96:0f:72:b0:98:5e:16:57:42:45:30:ca: 6b:f4:0e:87:a5:5e:e0:35:ff:c9:be:9a:b7:c2:b0:61: 9d:96:1d:5b:7f:0d:86:4b:1a:46:64:5d:32:3a:05:3d: 47:42:6f:b3:bf:3a:7d:df:2a:54:ce:03:76:cf:f8:25: a2:ec:3e:51:8d:c2:76:83:56:7b:de:10:20:c0:d2:47: b4:62:83:c2:8f:3f:98:75:d4:87:e7:52:32:fe:b9:ae: 37:ac:e6:ce:81:6b:4d:f6:3e:4b:92:81:2a:a9:c7:e4: 3f:13:63:5d:7b:95:3d:e0:6a:50:55:bc:1c:99:44:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0f:f1:ae:73:96:38:52:3c:c9:9c:94:3b:83:f7:8d: 92:fa:58:66:69:96:7c:bf:4a:8a:4e:11:2d:1d:e7:de: 52:22:45:4c:50:6b:bd:66:30:33:3d:4c:39:a2:ac:69: 05:ba:41:71:69:34:08:9d:90:9e:6d:b9:ba:04:a3:98: 96:40:43:79:68:a4:4b:d1:8a:43:e4:44:b6:e5:aa:8f: 80:95:c0:cd:60:91:69:57:3f:d3:14:0d:f5:f5:0f:37: 2c:80:85:77:d3:2a:3e:3d:5b:56:cd:67:46:51:1c:b5: 2f:39:f1:48:2b:c5:17:90:b3:3f:d8:4d:4b:c9:78:4d: 3c:58:24:97:a7:47:88:ba:5e:a5:51:c5:46:8a:89:48: 17:b7:95:ac:6b:96:58:97:97:93:50:f6:d6:87:ea:67: c5:6a:ba:a6:e7:21:ee:c8:58:4b:1e:d4:98:45:61:e5: 50:06:7a:d2:d6:9e:03:dd:69:f9:25:fa:01:a8:dc:a0: ee:22:50:fa:1a:16:f5:68:be:83:03:db:ed:cd:96:d1: bb:40:39:d3:32:bb:a7:94:78:c9:84:82:16:3b:af:20: a5:2c:02:6a:b7:f6:e6:8a:d5:6a:5b:be:72:c2:04:7c: 99:af:b5:63:45:43:cf:a2:4c:0a:c3:d6:5e:f3:1a:66 Fingerprint (SHA-256): 9E:D5:74:74:F5:0D:5A:15:5A:B1:84:06:14:A1:53:0A:AC:59:E7:41:D3:22:38:C5:B5:9E:03:FE:95:B9:AF:7E Fingerprint (SHA1): 7A:CC:D9:37:8E:1A:76:37:15:CF:EB:78:AA:45:13:4E:B4:20:54:91 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193390 (0x1315c36e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:35:33 2023 Not After : Mon Mar 20 19:35:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:1a:14:e2:f3:44:c1:7f:41:b2:3d:1d:21:bb:2a:3d: c4:cb:50:69:85:20:fb:74:f2:e8:a6:f8:0f:f6:cf:f1: 7e:2d:f2:2c:9e:67:e5:91:d7:d7:f7:6c:2e:d3:fc:83: 9c:bd:9e:88:d3:d7:21:45:bd:b3:64:5c:21:31:3f:0d: 0e:95:5a:82:76:e6:6e:fc:6b:bb:a1:8c:1a:86:82:11: f3:0f:5a:52:7c:e0:bb:f1:80:04:11:e2:95:22:98:63: c2:e6:b5:cb:89:2c:bf:3e:1b:56:3b:a7:b0:1d:fa:40: 98:ce:70:6c:77:61:d5:d7:0a:4b:c6:b3:64:e5:04:d7: 0a:28:aa:76:96:0f:72:b0:98:5e:16:57:42:45:30:ca: 6b:f4:0e:87:a5:5e:e0:35:ff:c9:be:9a:b7:c2:b0:61: 9d:96:1d:5b:7f:0d:86:4b:1a:46:64:5d:32:3a:05:3d: 47:42:6f:b3:bf:3a:7d:df:2a:54:ce:03:76:cf:f8:25: a2:ec:3e:51:8d:c2:76:83:56:7b:de:10:20:c0:d2:47: b4:62:83:c2:8f:3f:98:75:d4:87:e7:52:32:fe:b9:ae: 37:ac:e6:ce:81:6b:4d:f6:3e:4b:92:81:2a:a9:c7:e4: 3f:13:63:5d:7b:95:3d:e0:6a:50:55:bc:1c:99:44:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0f:f1:ae:73:96:38:52:3c:c9:9c:94:3b:83:f7:8d: 92:fa:58:66:69:96:7c:bf:4a:8a:4e:11:2d:1d:e7:de: 52:22:45:4c:50:6b:bd:66:30:33:3d:4c:39:a2:ac:69: 05:ba:41:71:69:34:08:9d:90:9e:6d:b9:ba:04:a3:98: 96:40:43:79:68:a4:4b:d1:8a:43:e4:44:b6:e5:aa:8f: 80:95:c0:cd:60:91:69:57:3f:d3:14:0d:f5:f5:0f:37: 2c:80:85:77:d3:2a:3e:3d:5b:56:cd:67:46:51:1c:b5: 2f:39:f1:48:2b:c5:17:90:b3:3f:d8:4d:4b:c9:78:4d: 3c:58:24:97:a7:47:88:ba:5e:a5:51:c5:46:8a:89:48: 17:b7:95:ac:6b:96:58:97:97:93:50:f6:d6:87:ea:67: c5:6a:ba:a6:e7:21:ee:c8:58:4b:1e:d4:98:45:61:e5: 50:06:7a:d2:d6:9e:03:dd:69:f9:25:fa:01:a8:dc:a0: ee:22:50:fa:1a:16:f5:68:be:83:03:db:ed:cd:96:d1: bb:40:39:d3:32:bb:a7:94:78:c9:84:82:16:3b:af:20: a5:2c:02:6a:b7:f6:e6:8a:d5:6a:5b:be:72:c2:04:7c: 99:af:b5:63:45:43:cf:a2:4c:0a:c3:d6:5e:f3:1a:66 Fingerprint (SHA-256): 9E:D5:74:74:F5:0D:5A:15:5A:B1:84:06:14:A1:53:0A:AC:59:E7:41:D3:22:38:C5:B5:9E:03:FE:95:B9:AF:7E Fingerprint (SHA1): 7A:CC:D9:37:8E:1A:76:37:15:CF:EB:78:AA:45:13:4E:B4:20:54:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193390 (0x1315c36e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:35:33 2023 Not After : Mon Mar 20 19:35:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:1a:14:e2:f3:44:c1:7f:41:b2:3d:1d:21:bb:2a:3d: c4:cb:50:69:85:20:fb:74:f2:e8:a6:f8:0f:f6:cf:f1: 7e:2d:f2:2c:9e:67:e5:91:d7:d7:f7:6c:2e:d3:fc:83: 9c:bd:9e:88:d3:d7:21:45:bd:b3:64:5c:21:31:3f:0d: 0e:95:5a:82:76:e6:6e:fc:6b:bb:a1:8c:1a:86:82:11: f3:0f:5a:52:7c:e0:bb:f1:80:04:11:e2:95:22:98:63: c2:e6:b5:cb:89:2c:bf:3e:1b:56:3b:a7:b0:1d:fa:40: 98:ce:70:6c:77:61:d5:d7:0a:4b:c6:b3:64:e5:04:d7: 0a:28:aa:76:96:0f:72:b0:98:5e:16:57:42:45:30:ca: 6b:f4:0e:87:a5:5e:e0:35:ff:c9:be:9a:b7:c2:b0:61: 9d:96:1d:5b:7f:0d:86:4b:1a:46:64:5d:32:3a:05:3d: 47:42:6f:b3:bf:3a:7d:df:2a:54:ce:03:76:cf:f8:25: a2:ec:3e:51:8d:c2:76:83:56:7b:de:10:20:c0:d2:47: b4:62:83:c2:8f:3f:98:75:d4:87:e7:52:32:fe:b9:ae: 37:ac:e6:ce:81:6b:4d:f6:3e:4b:92:81:2a:a9:c7:e4: 3f:13:63:5d:7b:95:3d:e0:6a:50:55:bc:1c:99:44:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0f:f1:ae:73:96:38:52:3c:c9:9c:94:3b:83:f7:8d: 92:fa:58:66:69:96:7c:bf:4a:8a:4e:11:2d:1d:e7:de: 52:22:45:4c:50:6b:bd:66:30:33:3d:4c:39:a2:ac:69: 05:ba:41:71:69:34:08:9d:90:9e:6d:b9:ba:04:a3:98: 96:40:43:79:68:a4:4b:d1:8a:43:e4:44:b6:e5:aa:8f: 80:95:c0:cd:60:91:69:57:3f:d3:14:0d:f5:f5:0f:37: 2c:80:85:77:d3:2a:3e:3d:5b:56:cd:67:46:51:1c:b5: 2f:39:f1:48:2b:c5:17:90:b3:3f:d8:4d:4b:c9:78:4d: 3c:58:24:97:a7:47:88:ba:5e:a5:51:c5:46:8a:89:48: 17:b7:95:ac:6b:96:58:97:97:93:50:f6:d6:87:ea:67: c5:6a:ba:a6:e7:21:ee:c8:58:4b:1e:d4:98:45:61:e5: 50:06:7a:d2:d6:9e:03:dd:69:f9:25:fa:01:a8:dc:a0: ee:22:50:fa:1a:16:f5:68:be:83:03:db:ed:cd:96:d1: bb:40:39:d3:32:bb:a7:94:78:c9:84:82:16:3b:af:20: a5:2c:02:6a:b7:f6:e6:8a:d5:6a:5b:be:72:c2:04:7c: 99:af:b5:63:45:43:cf:a2:4c:0a:c3:d6:5e:f3:1a:66 Fingerprint (SHA-256): 9E:D5:74:74:F5:0D:5A:15:5A:B1:84:06:14:A1:53:0A:AC:59:E7:41:D3:22:38:C5:B5:9E:03:FE:95:B9:AF:7E Fingerprint (SHA1): 7A:CC:D9:37:8E:1A:76:37:15:CF:EB:78:AA:45:13:4E:B4:20:54:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193389 (0x1315c36d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:35:32 2023 Not After : Mon Mar 20 19:35:32 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e6:97:4a:f7:a8:43:ee:3e:42:5e:92:05:d8:d0:8b: 3b:b8:48:89:85:4f:cc:7d:5a:83:e2:03:ef:a2:ef:5d: 6e:15:18:27:9f:f3:60:49:89:d8:c2:82:fa:36:0a:28: c6:fe:d1:b6:ed:61:18:0c:40:25:37:63:be:2b:f1:e0: f3:f3:74:47:b4:29:f3:11:5f:5d:09:d4:f7:7b:2f:50: 10:8a:38:b7:9d:8c:94:69:ec:3a:13:86:0d:cc:24:65: 78:3c:7b:8d:a0:ef:01:bf:06:0b:cd:8e:62:3d:c0:f6: 18:79:de:fb:d1:e0:fe:18:13:3e:fc:c2:4d:ba:14:ec: 0e:e0:50:1c:52:3b:6f:c0:cf:77:85:09:e4:d8:2c:dd: 05:a2:b0:59:aa:c2:5c:b0:4f:15:f9:70:f3:06:d1:2e: ed:e4:3f:3d:d3:59:c9:6e:87:68:a9:68:17:a2:3c:91: 3f:ff:af:46:ff:60:07:f8:75:9c:19:5c:b3:77:f0:59: d0:85:4b:2e:37:65:f7:06:5c:d8:55:09:91:71:cc:c3: c1:39:8d:47:4b:65:29:bd:1c:5b:78:22:75:80:c2:5f: bb:39:bf:ae:61:7a:5a:b5:93:ce:df:ff:f1:bd:57:96: 2a:48:99:e2:69:7f:46:d8:87:91:52:90:3c:76:29:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:7e:07:c1:70:d4:a0:db:6b:b0:34:5e:bd:d2:38:9b: 35:c4:bd:5e:9a:a1:aa:a8:7d:67:fa:7f:71:6f:a7:41: c4:e0:8a:df:96:5a:8b:73:21:05:1b:ac:8a:9b:5c:05: 62:66:50:ae:1f:ed:72:55:1c:cd:30:99:9b:3d:53:fb: 48:95:3f:37:65:68:37:45:6e:f5:4b:b3:c5:f0:b5:48: 0d:d1:21:3e:77:77:d1:b3:7b:e0:c2:a0:59:e2:36:b2: 8c:45:79:70:ca:62:19:52:62:cc:06:ae:54:55:bf:f9: 88:34:21:a9:2a:80:6c:62:31:15:60:70:11:95:85:20: 67:3e:3a:4b:56:64:51:cf:b1:c2:9d:9d:cc:39:28:f9: c8:89:5e:92:de:21:3d:76:72:75:7a:0f:76:78:75:66: ac:ef:c7:25:13:90:7f:01:5d:d2:26:f5:2a:2c:90:2f: 77:10:99:6c:99:6d:b2:7b:01:c8:bb:8b:6c:18:00:5d: 0a:d0:a1:54:10:84:cc:23:78:4c:aa:5b:c5:00:8c:fa: bf:1c:ac:36:33:72:e6:60:18:83:e5:81:53:48:db:a0: 65:69:9d:2c:65:43:8d:20:39:a1:32:ec:8b:a2:34:52: bf:47:2d:21:3d:72:03:f2:ce:65:94:f5:e0:d9:f8:89 Fingerprint (SHA-256): 21:DC:3F:9A:27:B8:45:60:3E:D6:4E:2B:10:13:B3:06:F0:61:BE:09:63:FA:EA:E5:51:B4:DD:75:AD:63:67:D1 Fingerprint (SHA1): 5B:F8:5D:CC:E2:E3:69:A8:4A:4E:FE:7A:B0:7D:70:E7:7E:42:F5:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193389 (0x1315c36d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:35:32 2023 Not After : Mon Mar 20 19:35:32 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e6:97:4a:f7:a8:43:ee:3e:42:5e:92:05:d8:d0:8b: 3b:b8:48:89:85:4f:cc:7d:5a:83:e2:03:ef:a2:ef:5d: 6e:15:18:27:9f:f3:60:49:89:d8:c2:82:fa:36:0a:28: c6:fe:d1:b6:ed:61:18:0c:40:25:37:63:be:2b:f1:e0: f3:f3:74:47:b4:29:f3:11:5f:5d:09:d4:f7:7b:2f:50: 10:8a:38:b7:9d:8c:94:69:ec:3a:13:86:0d:cc:24:65: 78:3c:7b:8d:a0:ef:01:bf:06:0b:cd:8e:62:3d:c0:f6: 18:79:de:fb:d1:e0:fe:18:13:3e:fc:c2:4d:ba:14:ec: 0e:e0:50:1c:52:3b:6f:c0:cf:77:85:09:e4:d8:2c:dd: 05:a2:b0:59:aa:c2:5c:b0:4f:15:f9:70:f3:06:d1:2e: ed:e4:3f:3d:d3:59:c9:6e:87:68:a9:68:17:a2:3c:91: 3f:ff:af:46:ff:60:07:f8:75:9c:19:5c:b3:77:f0:59: d0:85:4b:2e:37:65:f7:06:5c:d8:55:09:91:71:cc:c3: c1:39:8d:47:4b:65:29:bd:1c:5b:78:22:75:80:c2:5f: bb:39:bf:ae:61:7a:5a:b5:93:ce:df:ff:f1:bd:57:96: 2a:48:99:e2:69:7f:46:d8:87:91:52:90:3c:76:29:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:7e:07:c1:70:d4:a0:db:6b:b0:34:5e:bd:d2:38:9b: 35:c4:bd:5e:9a:a1:aa:a8:7d:67:fa:7f:71:6f:a7:41: c4:e0:8a:df:96:5a:8b:73:21:05:1b:ac:8a:9b:5c:05: 62:66:50:ae:1f:ed:72:55:1c:cd:30:99:9b:3d:53:fb: 48:95:3f:37:65:68:37:45:6e:f5:4b:b3:c5:f0:b5:48: 0d:d1:21:3e:77:77:d1:b3:7b:e0:c2:a0:59:e2:36:b2: 8c:45:79:70:ca:62:19:52:62:cc:06:ae:54:55:bf:f9: 88:34:21:a9:2a:80:6c:62:31:15:60:70:11:95:85:20: 67:3e:3a:4b:56:64:51:cf:b1:c2:9d:9d:cc:39:28:f9: c8:89:5e:92:de:21:3d:76:72:75:7a:0f:76:78:75:66: ac:ef:c7:25:13:90:7f:01:5d:d2:26:f5:2a:2c:90:2f: 77:10:99:6c:99:6d:b2:7b:01:c8:bb:8b:6c:18:00:5d: 0a:d0:a1:54:10:84:cc:23:78:4c:aa:5b:c5:00:8c:fa: bf:1c:ac:36:33:72:e6:60:18:83:e5:81:53:48:db:a0: 65:69:9d:2c:65:43:8d:20:39:a1:32:ec:8b:a2:34:52: bf:47:2d:21:3d:72:03:f2:ce:65:94:f5:e0:d9:f8:89 Fingerprint (SHA-256): 21:DC:3F:9A:27:B8:45:60:3E:D6:4E:2B:10:13:B3:06:F0:61:BE:09:63:FA:EA:E5:51:B4:DD:75:AD:63:67:D1 Fingerprint (SHA1): 5B:F8:5D:CC:E2:E3:69:A8:4A:4E:FE:7A:B0:7D:70:E7:7E:42:F5:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193394 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193395 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193396 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193397 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193398 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193399 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193400 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193401 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193402 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 320193403 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 320193404 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 320193405 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 320193406 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 320193407 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 320193408 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 320193409 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 320193410 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 320193411 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 320193412 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 320193413 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 320193414 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 320193415 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193416 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193394 (0x1315c372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 20 19:35:37 2023 Not After : Mon Mar 20 19:35:37 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:05:07:b5:43:80:cf:72:61:0f:88:4b:1c:c7:dc:10: 43:85:5a:c4:d5:a8:6e:2e:69:fe:80:5b:d9:8b:1d:86: 78:de:f1:07:87:da:12:67:83:f4:13:f0:d3:64:f0:23: 01:50:8f:f3:c9:d6:3a:e0:c7:37:69:f0:94:e5:73:dc: 0f:ae:49:1e:d7:11:7c:5f:00:6e:45:ce:dd:bd:3c:b4: 8e:0c:69:53:cb:5f:77:8e:2c:13:9e:eb:90:82:67:d7: 45:c3:cd:bc:40:64:ec:90:d7:bc:37:7d:f4:a8:37:c1: dd:52:d7:df:42:76:12:0a:68:67:b8:5d:c9:8c:26:f0: 7b:64:fa:bc:56:73:9f:43:a5:8a:7c:c7:43:f9:b7:f9: 82:59:77:36:35:e4:60:85:de:b0:b1:08:37:bd:95:7a: 85:9a:04:2d:40:2c:f8:e8:a0:6f:45:4d:86:0f:03:bb: 35:f5:10:cf:ab:42:64:46:f7:64:01:0b:ac:6b:0d:c0: 03:00:06:12:fe:46:31:99:4c:9d:d1:81:f3:8b:7c:55: 9e:af:05:7a:1a:0d:78:7f:f5:37:f1:fd:1c:db:1f:11: 06:3e:8e:29:5f:86:9c:0c:bf:b1:13:0e:85:0d:b1:4a: 61:94:b3:47:1a:52:70:9d:89:8b:9e:80:ce:cd:fd:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:e2:be:66:2f:f7:36:17:51:d2:17:9b:ca:12:c2:f3: 71:9a:ca:95:26:98:48:d4:21:1b:1e:65:2e:5e:11:2f: 7e:b7:b9:5d:29:f7:3d:8a:aa:59:f9:14:0e:7f:9e:cc: f9:65:52:c1:8d:54:3a:a6:7a:7d:7c:2a:bd:6b:ba:28: 26:3e:4e:92:71:8e:17:a6:73:81:fd:c1:81:f5:20:9a: 41:b1:b6:5b:a8:68:17:f5:73:5a:87:82:af:1f:a7:41: 1a:7c:f6:4d:8c:83:01:2e:90:47:b9:83:74:5e:a3:94: c2:04:31:0c:a4:a0:f2:85:33:9c:6c:d8:86:3e:b1:e7: 37:0f:1d:33:d8:48:04:b5:6b:39:18:4b:e4:3a:c0:e4: c0:4f:08:35:b2:91:74:39:a5:37:c6:57:4b:3c:d3:be: 53:f6:36:aa:b2:a4:bd:14:70:51:55:cc:1c:75:13:d0: c0:a7:da:1b:65:19:c1:27:9a:ea:aa:16:bf:8e:9a:5f: da:8d:b8:1b:34:ba:90:3f:de:8b:b3:a6:20:7d:79:e1: f2:ee:84:27:d9:67:5d:97:80:e8:87:b3:0e:a1:93:34: 0f:f5:1d:c4:b2:9e:fe:cb:43:e3:53:35:22:c4:aa:02: 42:c7:a7:25:5e:c8:39:d8:c5:ef:ea:86:88:a0:1b:6c Fingerprint (SHA-256): 54:0A:D3:A7:AD:B4:3A:A4:09:F1:C9:5E:D4:54:90:AA:AF:98:72:14:F5:D5:EA:CB:52:84:3F:0D:DC:96:08:BA Fingerprint (SHA1): DC:09:23:58:66:30:D7:CA:38:BC:95:1D:95:99:BD:C6:1D:DC:3F:8E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193395 (0x1315c373) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 20 19:35:38 2023 Not After : Mon Mar 20 19:35:38 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d1:df:b4:eb:e5:00:f4:d3:c8:3d:79:db:a7:d4:c4: 55:f4:f0:a8:4b:fc:ea:e2:7a:a5:6a:8e:71:f9:97:b7: fd:65:53:19:bd:c8:b8:53:e1:e0:fe:4d:b6:fd:d0:01: 5e:7c:12:97:c7:01:0b:89:8d:dd:70:51:51:65:4f:d0: c4:57:53:1a:01:f3:46:43:76:da:79:6d:a2:ed:83:a2: 13:95:d4:fb:d0:ef:db:5c:fa:08:67:93:c8:61:dd:d3: e9:2d:44:95:0c:6d:a1:a6:04:00:bd:39:e2:af:80:6e: de:0a:a0:a7:4c:9a:e9:d4:37:dd:1f:a0:72:07:84:2f: 71:bc:98:5b:8f:02:b2:92:72:93:f6:39:92:75:57:8b: c0:b6:1b:06:dd:8d:ba:2e:c0:e7:0e:a7:29:6f:54:37: 2c:a9:8a:c7:22:6a:95:a1:09:eb:d8:4d:e8:05:f0:70: cc:23:4a:23:d5:fd:99:9a:0d:14:7b:0b:f0:9c:23:a0: fb:23:cb:f7:ad:b1:94:52:fb:ae:b4:35:ee:ec:44:38: 49:41:1b:34:69:31:32:53:c1:04:8e:98:f0:8c:37:cd: b5:1d:bb:91:8a:78:b1:92:4a:60:62:79:34:2c:2a:75: 6c:cf:2d:c8:d3:83:c6:04:55:a7:83:f3:2e:b0:e5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:84:46:17:17:4c:7a:78:18:f1:00:a7:ae:f3:9e:f6: 68:4b:d0:c3:4a:10:af:8f:58:ec:c1:92:68:23:f3:0e: 02:fe:76:5d:1c:c0:d4:e2:7f:7f:47:dd:60:d2:b7:aa: ab:fc:dc:4b:16:10:e4:23:d0:e6:f6:d3:2f:9f:2b:55: b6:a9:fb:90:9f:84:99:19:a1:5a:89:88:33:2c:14:1c: d8:de:79:8e:01:d2:34:ae:4f:8c:3b:d1:a1:af:11:0e: 9c:6b:dc:dd:d4:38:8c:fd:20:76:57:4d:fc:fd:fe:e5: a0:b3:9c:2b:c6:a7:82:3c:7c:1e:0c:62:07:90:d6:5a: 15:35:d9:4e:2f:0c:e4:35:2b:50:2e:c9:f7:be:24:9f: df:69:b6:9b:cc:e2:bd:d3:e4:b0:5d:f0:97:b2:b7:0d: 99:74:97:51:1e:26:35:f4:59:9b:5f:bc:54:18:f7:6c: c4:4d:4c:43:f1:8f:5e:36:e8:fb:e9:8d:f2:41:47:31: 6c:a0:85:e4:18:73:61:4b:25:04:7f:34:b1:9e:fb:47: 6b:ba:86:41:40:06:87:53:1f:72:33:fe:5c:1a:3d:e6: 22:b6:93:ff:46:e1:49:15:e2:1a:d3:ed:6e:69:a6:57: e3:a2:ab:d2:d6:e5:1e:59:a0:dc:5f:a5:f0:21:7f:b9 Fingerprint (SHA-256): 55:C0:7E:E0:76:A8:06:54:4A:60:4F:72:8E:3B:B6:D5:E4:0A:F3:A3:2F:4A:74:33:ED:17:C7:49:ED:04:FD:24 Fingerprint (SHA1): 25:D0:05:C0:E9:0F:02:1B:59:8A:A8:80:B7:3E:73:CB:D7:19:8F:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193396 (0x1315c374) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 20 19:35:38 2023 Not After : Mon Mar 20 19:35:38 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:2d:ff:09:2e:2f:df:c0:b8:81:59:a6:ad:1e:8c:1f: 1d:54:e2:c5:96:51:af:6d:98:2b:e0:de:c1:f4:80:3a: fe:cd:7d:5d:34:0e:a3:3e:f2:c6:34:9a:60:df:2c:83: d9:14:69:45:16:4a:ff:39:8b:e0:95:ce:66:98:da:2f: be:cc:ad:7a:6f:9e:21:c5:80:27:2c:61:c9:37:85:ca: 15:03:1f:c7:a5:59:4d:4d:2d:a9:a9:37:e5:00:0b:25: 90:fe:41:fb:00:0f:8d:60:c8:8d:9b:1c:44:6f:79:5a: 10:1f:78:8c:dc:1b:6b:fc:b5:38:07:3a:17:b0:bc:56: 43:12:3e:4c:23:e2:3e:84:84:8d:8a:a9:fc:59:a1:a8: ea:20:0f:aa:bd:fc:29:c6:5e:10:9f:bb:f2:fe:75:36: bf:39:b8:fc:24:b5:53:84:51:64:38:03:e3:49:e2:ea: 36:bc:c0:4d:c9:03:a2:7f:87:cc:0d:97:00:ba:1b:8e: b3:99:52:d3:10:bc:28:b8:83:91:a5:6b:5a:67:28:28: a7:cd:2d:50:35:8c:86:b7:44:96:00:41:98:ff:7c:0e: 26:e1:ac:2f:be:c1:b6:9b:24:e5:04:5a:64:07:1c:ce: 1f:dd:95:a0:6e:4b:30:4d:2f:86:08:3d:88:87:ef:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:96:77:57:fd:3b:84:5e:c1:06:e0:12:b0:63:ab:85: fc:56:ee:bf:06:0f:09:f7:96:6d:70:db:a1:2b:e2:d9: 94:59:e6:d8:b3:61:94:d8:8e:7d:cb:87:1b:c4:2c:8e: 1e:75:53:d0:ed:39:c0:fc:89:4f:c8:d0:81:c2:db:4b: 5f:a3:af:51:b8:fa:cb:2c:9d:10:5e:3e:d3:be:3d:88: de:01:79:4d:29:5b:9f:e3:91:34:59:05:5b:bb:1c:ea: 66:56:93:2d:f7:1a:11:d1:88:a7:ee:a1:fc:11:90:4a: 76:1d:c3:90:93:5e:c2:17:3b:39:b0:45:14:7f:18:14: 8e:73:44:fb:5c:b2:a5:e8:6e:72:58:1a:92:c2:79:11: de:db:81:a2:ab:f2:b4:44:ae:2d:82:81:20:36:6e:50: fa:f8:d5:01:9e:f7:51:89:ba:8f:c1:90:4c:a4:62:18: 3a:b4:b0:06:aa:29:c4:a3:54:94:52:73:75:9d:00:0a: 4d:27:b6:b7:3c:a0:36:a1:85:fc:eb:6d:14:9f:98:b7: b4:16:00:53:c1:9a:ac:74:93:ee:1f:c3:15:44:44:16: 7f:c2:9c:fc:3c:8b:87:8b:1b:7f:45:a4:d2:a4:b2:33: 4e:5e:5b:20:ee:35:a2:f3:04:9f:62:2e:2d:da:75:2f Fingerprint (SHA-256): FE:F5:4B:C0:CD:97:D0:AE:D5:77:8E:E1:D5:E8:BB:1E:56:E1:89:A5:DF:5E:21:0A:83:04:91:4E:6B:DB:A3:49 Fingerprint (SHA1): 81:31:CE:39:EA:4A:05:1F:E6:78:D7:22:AA:8A:40:DD:CD:33:BC:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193397 (0x1315c375) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 20 19:35:39 2023 Not After : Mon Mar 20 19:35:39 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:fc:cf:a5:bb:d0:32:52:bd:20:da:07:00:0b:3a:18: e1:20:7c:a6:84:83:b3:d0:3a:b0:98:14:dd:62:f2:49: 15:aa:bb:57:cf:a7:8c:ac:70:dd:bf:71:92:be:b4:72: 30:e0:22:36:31:57:6b:40:19:de:5d:51:c1:5f:74:bb: 0f:04:1f:11:ef:d5:fe:e7:6a:e6:d7:0a:81:4b:8d:96: 9d:25:db:a5:69:7c:ec:71:00:c1:9d:1e:e5:4d:89:97: 7c:b0:f8:bf:af:34:7a:5e:16:9c:52:9d:20:64:55:0a: 58:80:63:93:c4:54:e9:14:11:48:cc:1a:7f:62:ad:97: fe:3f:ec:fc:ec:5d:cf:43:32:69:f6:b9:c6:9b:c4:c7: ee:43:90:f7:f6:99:64:07:77:50:00:80:6f:9c:67:af: 45:61:a0:3e:c3:4a:e1:b9:cd:cb:91:1d:15:8f:02:74: 7d:74:6e:31:64:53:ff:e0:98:0c:b6:0a:5d:57:52:84: 3a:d9:ee:2e:9e:8b:2c:e2:6e:6d:96:5b:c0:2f:4e:30: eb:9c:a3:80:ce:13:b8:f8:80:47:6c:03:0f:08:40:fe: 2a:52:0e:99:90:ac:1c:bb:67:90:d2:0b:0b:92:b0:f2: 33:4e:99:f6:76:36:0c:74:64:76:52:69:df:e4:a7:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:f9:e0:95:df:39:4f:35:df:2e:e8:0f:5d:99:29:69: e6:1f:70:43:56:fd:d9:63:6d:49:28:cc:42:80:18:41: fb:90:17:47:41:71:5e:00:55:31:29:00:ba:8e:7c:dd: b4:4e:93:b1:53:14:82:78:d1:b6:91:48:94:e1:f9:88: 93:46:f9:98:6e:8e:d9:d6:49:8f:2a:b1:2f:82:23:d8: c1:d8:6c:fe:ca:6a:ea:c8:f5:f1:33:ac:73:65:33:97: 6b:3f:a6:11:75:6e:1f:47:55:61:79:e4:ef:42:72:10: 60:8f:d5:fe:47:f2:ee:fe:fb:df:8a:19:b0:b3:8b:cf: 32:9d:ae:92:9e:da:e5:03:07:40:4a:8d:56:9f:ad:1c: df:ae:65:91:03:15:68:7c:40:44:0e:74:24:cd:4e:22: 03:7c:9e:88:ef:69:05:c4:c2:e2:e9:e1:a5:df:04:d8: 2e:70:3b:fd:4c:fb:f9:0e:aa:53:00:88:68:57:be:9d: d7:53:31:88:ae:39:d3:90:cb:b4:f5:00:b0:6e:d6:f1: 68:1c:8a:78:c0:5e:7c:d2:53:67:1f:e4:c9:e7:fb:34: 36:8a:70:4a:ba:7b:94:1d:15:54:17:7b:bf:a1:1d:b8: 07:1d:03:5f:b0:90:03:74:d0:71:39:33:e3:e8:0b:64 Fingerprint (SHA-256): 1C:2A:8A:3E:DC:E4:E9:80:BB:9E:15:8F:E3:08:11:1B:4E:E7:52:95:70:76:57:79:C2:7A:B8:59:64:84:C0:FC Fingerprint (SHA1): 2D:13:1B:07:AC:9E:42:7F:1A:A8:F6:02:DE:E9:24:34:C4:BA:F6:49 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193398 (0x1315c376) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 20 19:35:39 2023 Not After : Mon Mar 20 19:35:39 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:34:19:b5:bd:2c:36:76:89:bc:31:23:bd:aa:49:ad: 5d:6c:bd:e5:12:e3:da:e3:66:a8:5b:6a:b5:97:07:d5: 7d:55:2a:9d:82:f0:bc:2f:4b:40:44:2e:b9:53:f9:37: 71:4f:a4:52:06:ae:a9:89:06:f7:f4:0f:1c:00:85:7f: 8a:fb:70:37:81:6d:d8:dd:96:93:52:e2:ff:e7:90:28: c1:a0:85:7d:e7:b3:1b:6b:16:88:2b:f3:bf:9b:7a:dc: d1:06:af:84:18:9b:0e:06:87:8b:f3:69:aa:c4:7e:5d: 85:39:3d:9d:7b:18:94:fc:89:0d:9f:5e:f3:9a:f1:1e: d2:ff:e4:89:d8:20:5b:6d:45:28:c6:3d:24:f3:2c:48: 26:41:91:a4:57:99:38:a2:22:c9:7d:7e:c0:19:15:f5: 3f:b3:85:a9:4c:b0:ab:20:af:de:6c:51:a1:e1:e3:03: 70:bb:97:e9:18:77:af:f4:53:68:15:ae:b5:ef:1b:24: 72:c6:bd:82:1d:40:fb:83:95:c7:a4:5b:9c:d2:6d:f1: 82:51:06:e8:0e:bb:f6:ee:f5:b7:28:c2:51:0d:30:bf: c5:91:7a:bc:f4:8d:1c:91:d8:a9:43:55:15:31:f6:21: de:b1:81:c4:33:cc:b5:0b:bc:47:c8:45:55:6f:9d:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cf:91:99:e5:f6:55:9f:81:2e:17:3b:2c:63:a7:ab: 3c:45:b9:c0:a3:ae:4c:34:48:59:98:88:66:d0:c3:25: 5c:0a:d1:0d:7f:b8:ab:1f:7d:8f:75:be:6f:3e:f8:2f: ea:cc:e5:c0:64:45:ed:20:b2:a9:1e:b4:87:b9:59:47: fc:72:7c:b6:fd:1f:ca:95:6c:34:8d:b3:a5:8c:24:d3: bc:6e:6c:f3:91:15:11:00:ca:13:36:74:08:00:35:53: 8e:8d:0b:66:eb:37:3e:e3:ec:b7:14:f7:17:16:53:0f: c5:b8:b5:56:99:31:1e:22:30:96:cb:2e:4e:41:06:cd: 39:84:33:2d:8a:1e:e8:64:c6:5b:e2:03:19:8f:2c:91: c3:e7:8e:96:31:2a:eb:75:e0:ec:ef:c4:b7:4e:bf:d3: d9:08:e5:93:1c:fd:09:83:63:80:c0:90:35:6b:ea:ae: 0a:c2:e2:03:24:86:02:75:5e:1d:62:0e:fb:b8:bf:39: bd:9c:6d:72:40:84:cb:2a:54:03:f7:88:a1:3d:18:e4: a0:83:50:2a:f2:fa:62:0e:7d:fd:2b:de:e2:2d:a0:aa: 59:14:95:0e:9b:01:a3:54:69:70:2b:aa:b5:84:3a:9e: 73:0d:13:55:69:ba:4e:ab:33:ed:b0:de:60:04:6e:2f Fingerprint (SHA-256): 40:DA:24:64:F3:3A:3B:EF:BF:16:E8:A8:57:E4:4A:F7:E5:2E:8A:D5:40:1B:52:DD:FA:08:FD:80:14:14:68:D3 Fingerprint (SHA1): 4B:5D:10:2A:69:57:AA:3F:5E:3E:80:CA:3B:00:C7:33:D4:98:66:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193399 (0x1315c377) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 20 19:35:40 2023 Not After : Mon Mar 20 19:35:40 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:35:22:67:67:d2:3c:ff:3f:53:99:0b:57:cc:a6:80: 9c:7b:16:4f:cc:90:d9:7c:2c:4d:c8:78:10:9d:51:60: 8e:4e:f2:2f:6b:7c:06:36:83:9d:1d:47:56:22:80:7c: 0e:10:3f:7d:db:45:9a:32:9d:ab:47:60:f5:c8:67:f2: 70:71:31:37:6b:69:d0:93:6f:fa:80:5c:a4:d6:e3:57: 46:c1:b7:5a:e5:4d:de:7e:f0:75:88:80:d3:fb:6f:b3: 91:99:72:fe:77:69:d1:ae:bc:69:11:16:ab:5d:37:8d: b3:9d:91:2a:bb:f8:d5:d9:72:55:28:b3:d5:f7:c4:1f: 3a:ce:81:f3:39:c0:ec:dd:6d:31:9d:98:86:c1:0f:7b: b4:24:cd:c3:d2:73:a0:25:c2:2f:d0:14:fc:59:62:b5: 03:a5:ad:37:ef:08:17:a0:4c:1c:91:d5:9f:0d:ba:ab: e5:85:43:ef:0a:7f:4c:1e:95:04:47:f2:d5:5e:02:36: eb:a5:12:00:8c:e2:62:fc:f9:53:c9:95:4e:8b:fd:e1: 00:fb:a3:80:a6:be:51:e7:f6:26:e8:2b:30:14:d8:2f: 2f:2a:d5:23:e1:81:a4:5c:44:e7:d3:ab:2f:b4:52:45: 3c:0c:cf:9c:1e:7a:46:f4:0c:97:5c:83:ae:ec:9b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:67:62:45:28:c0:6c:75:68:d9:61:7c:1c:3f:56:be: cf:e7:b1:3d:3d:39:cb:41:92:ef:c5:3f:bd:b5:a1:8f: d2:59:8d:7f:34:22:dc:20:f1:ae:d2:86:22:2d:57:5e: 67:b9:3a:a8:d5:c7:64:c1:b4:1f:80:59:42:a0:28:7b: 41:59:31:af:a0:1d:5b:8a:f5:fb:5f:5a:1e:1b:44:3e: fd:c5:db:f5:d2:a0:57:5c:95:cb:6d:f4:74:7f:da:a9: ff:51:da:f8:01:f2:d7:be:7e:43:0f:ce:82:08:7a:3d: 7f:08:d0:95:56:55:c8:97:01:26:54:8d:92:95:7b:f5: a1:80:51:d1:af:f2:9a:db:a9:91:7c:fd:67:37:07:74: 16:32:cb:7f:1d:93:40:49:07:a0:72:af:6f:db:e4:3f: 52:58:ad:fc:e9:a1:da:c8:f4:a9:55:9d:c6:a5:93:16: 2e:3f:d0:1e:8c:01:bc:99:18:75:94:ee:56:ec:39:b6: 42:45:f1:cb:8c:90:a9:e8:e6:8b:47:7b:6d:93:cd:7e: 49:ea:43:5c:f9:f4:e9:38:7f:49:5c:60:46:8f:8d:d5: 49:a5:57:5e:82:5d:38:66:ce:cd:be:a5:3f:36:e5:3e: c5:1a:60:4e:c9:e0:36:53:30:94:f6:be:a1:17:e7:bc Fingerprint (SHA-256): 45:A7:B1:43:29:8C:BE:5F:C4:3B:32:44:02:93:82:05:3F:59:CF:E8:E8:75:7C:E9:6C:6F:2E:4D:97:49:D4:56 Fingerprint (SHA1): 39:F6:18:90:8F:16:8C:AB:A7:1A:7C:D6:05:2A:F8:97:B2:13:4C:EF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193400 (0x1315c378) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 20 19:35:41 2023 Not After : Mon Mar 20 19:35:41 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:4c:bf:cb:ae:d6:9b:a6:09:08:08:85:88:25:21:5c: 9e:e6:29:1f:1f:be:39:8b:6c:8c:ad:c3:74:64:6d:da: 71:b6:01:7c:fd:3c:76:53:ad:dd:1f:77:a1:2a:78:d4: 14:39:2c:64:69:6f:c2:57:28:08:d5:d9:23:00:5d:98: 5c:8b:1a:bb:2d:3a:b4:70:8b:51:51:f1:71:f1:85:61: 70:fd:c2:3b:b6:3a:41:bf:a2:47:ad:c3:c6:e5:36:aa: af:e7:5b:02:0a:0e:bd:51:9b:89:88:d4:ed:59:93:f7: 1a:90:eb:0a:7b:40:0d:44:d6:04:cf:d3:4d:2b:d1:b4: 95:7b:2e:ae:22:c5:8a:1e:8a:af:82:66:08:75:ed:f5: e0:c6:d3:86:fb:bf:c7:81:84:3d:4b:33:47:e8:86:6f: 8a:06:73:69:61:ba:b5:ff:30:8e:c3:9c:d9:0e:e1:fd: c9:f4:09:39:7e:62:02:7e:fb:f2:0e:c9:85:7a:4b:c4: 8d:68:40:74:23:61:c3:d1:f8:af:5a:74:eb:84:c8:39: be:ec:63:90:bb:c2:6e:0c:a5:80:35:4b:62:0f:5b:0e: bc:51:21:a5:30:94:66:c3:bb:2b:92:35:cd:ee:9c:62: bc:7f:68:3b:25:5e:ed:3a:5c:07:72:af:c9:74:97:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:4d:e9:dc:f1:17:3b:14:55:ce:de:37:6c:f3:0a:fa: cf:d8:ca:18:99:df:65:c2:1f:6a:0f:6b:e7:02:f1:7d: 0e:f8:c2:42:52:5c:fd:a3:27:bb:b6:2d:cd:22:1d:d9: 5a:f1:c2:6a:c9:88:50:64:7e:cc:ec:c8:48:30:0d:ec: 0d:27:ef:8b:dc:28:0f:b5:b1:72:34:cb:f6:82:bc:ce: dc:41:f4:d2:db:c2:a9:7d:00:ad:c9:1a:f1:11:7d:a2: f8:c8:9f:03:86:f7:1b:eb:0c:2b:0c:04:88:46:e0:29: b9:dc:1c:25:72:3d:cb:52:88:d7:e3:9f:44:be:b2:c0: ed:c3:05:4a:37:61:5a:a6:66:41:33:cc:df:a0:61:a4: fa:a9:8b:82:d0:1f:ee:3c:6f:43:d0:d8:85:e2:e0:40: d5:c0:4d:d3:79:5c:52:c9:7f:fe:86:d0:ba:de:8a:ea: ca:98:dc:3c:55:b2:a0:33:b0:3c:47:4c:b5:ea:61:39: bb:88:ef:93:22:92:4f:3f:2a:14:18:f9:b1:0a:9d:fb: 83:cc:d1:54:f2:8c:fb:90:e9:d2:aa:77:44:65:7a:0c: 92:61:37:23:04:8e:d0:44:26:e3:24:80:26:35:e8:6e: c4:b5:b8:c6:de:f6:1f:c4:a8:5f:be:27:d2:11:0c:56 Fingerprint (SHA-256): E8:3F:0A:E6:24:09:5F:23:12:BE:A5:6E:DD:66:90:E2:8E:47:AB:45:49:C1:12:3A:1C:EC:24:1A:B2:5A:0C:90 Fingerprint (SHA1): 19:F5:3C:64:6C:24:D5:ED:9E:65:01:38:2F:FF:30:F8:8C:0E:0D:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193401 (0x1315c379) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 20 19:35:41 2023 Not After : Mon Mar 20 19:35:41 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:8f:d3:52:ac:52:70:a1:ea:26:33:8f:aa:dc:d4:85: e8:d3:48:d0:a1:f8:83:ff:32:fa:4d:15:76:cb:7b:79: 1c:2c:d7:b6:61:30:1d:63:d3:dc:8b:c6:9a:e2:c5:3b: a4:33:18:82:f0:5b:6c:1b:f0:94:01:09:27:d5:72:de: 33:63:62:7e:21:07:c8:02:4a:c1:6d:53:6a:2c:b7:87: f7:9e:8b:30:33:f6:89:7b:60:a9:05:57:b5:7a:d6:96: cd:43:4b:a4:f5:e1:ea:ec:95:cb:b0:18:61:cf:4d:4f: 7f:65:d0:73:dc:2a:5f:9c:2b:32:32:cf:de:41:ff:fb: 39:b8:c6:44:e5:e2:ab:41:8d:05:14:55:2c:22:3d:bd: ef:c8:9f:32:ff:cf:bb:2c:1b:77:64:ba:52:28:7b:70: f6:e4:6a:c7:30:68:5b:0b:a6:0a:c7:57:7b:a4:c6:60: 6e:8f:4d:4a:2c:22:00:b5:d0:50:0e:87:c4:86:7a:26: 0a:49:97:2c:0e:69:10:0b:73:54:9a:da:a7:77:08:a2: 06:43:ec:db:b2:23:e2:7c:91:e5:58:92:0a:61:c9:7d: 41:4f:f0:77:77:58:5f:71:34:68:13:5c:75:5f:28:fb: dc:80:a9:f9:ed:96:67:23:da:ad:48:34:df:0a:a1:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:0b:3f:db:1c:7c:e5:68:2a:a9:b5:5a:eb:1e:72:c1: 19:2d:70:7e:fc:35:7e:73:c6:f8:8c:7f:37:09:67:c7: 80:74:e4:ca:a5:45:31:b7:fc:f8:a9:cf:0e:d7:16:34: 6d:76:b3:36:c2:a8:50:1f:e7:1b:25:08:bc:c0:fd:f1: 6b:f0:0e:50:bd:65:ba:9a:24:d5:e3:a3:79:3f:ef:b2: 20:3b:d4:31:bb:9c:d5:16:b6:1a:c3:7d:e5:1b:f1:00: 5d:1d:cc:12:43:63:69:d6:e4:10:7a:1b:ba:50:03:f4: bf:b3:d7:ea:c4:bf:08:37:1f:7a:31:4a:69:f6:6a:84: f7:de:ce:2e:39:e9:7b:2a:e0:cd:e7:47:e5:55:89:fb: ea:b7:17:87:83:a2:50:fc:cf:ba:1d:4b:92:9d:bd:97: ad:4f:c3:bb:f3:10:91:e1:79:ed:bb:38:20:cd:26:b1: f3:17:20:75:23:53:d3:b6:d6:35:c2:28:2a:cf:9b:7d: e2:33:b0:8a:7f:5a:07:f5:9a:da:3a:72:43:eb:d6:0a: c2:88:2b:41:f2:b3:3d:08:a7:5e:21:41:82:60:d5:85: 0a:f8:1f:a1:51:9c:1c:77:77:bb:88:e4:b7:e5:e0:73: 6f:b3:b9:8c:a7:63:85:fd:ab:18:30:e8:f5:48:cc:99 Fingerprint (SHA-256): 6A:5F:15:58:16:A2:83:3B:CE:7E:64:2C:47:A9:CA:7A:3C:28:31:53:D7:41:21:D0:F4:1A:B4:BA:8D:1C:84:E0 Fingerprint (SHA1): 3B:EE:F7:38:BA:E9:3F:CB:D7:78:43:1A:2E:5B:2D:98:D6:8D:72:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193402 (0x1315c37a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 20 19:35:42 2023 Not After : Mon Mar 20 19:35:42 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:9f:0d:a0:3b:2a:70:2b:e2:ae:ef:64:a1:32:e4:5c: 33:3f:28:e3:44:ac:87:6c:6b:7e:85:a3:9d:c2:84:4b: c8:6d:ad:20:1e:77:99:08:ec:2d:cb:f5:52:3f:b7:42: 68:95:44:0a:4c:5c:ea:80:82:cc:32:05:2e:bd:82:95: 91:5d:c2:23:99:a0:bf:2f:a3:85:9f:05:32:c4:5e:f1: 5c:99:95:74:c4:7d:32:ef:45:43:e7:2c:e4:d6:35:88: 23:4d:e6:a8:71:50:0b:f3:a0:e5:43:2f:ff:56:65:62: e2:2d:6a:b3:ec:2d:6a:a1:61:ac:1c:11:a7:34:e0:2a: 14:21:8e:68:b1:b5:d3:ba:6c:a0:b9:3f:85:9b:cb:6c: 85:51:07:e8:c5:f7:2c:d8:fa:74:36:93:03:f6:b5:c8: 7a:28:d3:93:ba:2a:68:40:ee:c9:ab:a1:e8:ce:cd:33: 30:92:60:69:f1:b3:ca:bf:cc:6e:52:7d:60:f4:0e:58: 40:22:13:47:db:ea:4c:31:a9:8b:19:85:95:bd:d0:fc: df:05:1b:44:7e:82:98:45:70:b3:a8:e1:a9:10:d4:b4: 40:04:42:dd:6d:d1:11:b0:ff:21:27:a5:f4:1f:34:14: 02:19:ce:69:35:26:16:d6:bf:8e:c4:ba:88:cb:44:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:3d:5e:19:77:35:a0:79:22:8c:d0:31:d7:1d:c6:ea: 7b:19:64:d7:3a:a3:90:89:da:83:c7:03:13:df:db:e9: 0d:1e:f8:7b:c3:63:42:49:56:18:f6:92:b5:e7:61:51: 60:54:21:77:b9:4c:71:12:d1:84:66:69:91:44:38:cb: 99:cb:2f:0e:15:4b:8b:97:56:ec:47:9e:c9:45:cc:ed: e8:37:7e:f4:f0:b8:90:e2:ef:9b:29:94:a4:79:de:26: bf:b5:e7:21:46:03:32:0a:9b:aa:d8:f2:b7:2a:fc:4a: 18:97:24:68:57:0b:54:07:b5:82:5e:f9:a6:a4:26:83: 57:5f:59:16:7c:b4:a3:6d:bb:18:0e:e1:ec:33:8d:a5: 03:f1:48:1b:7c:44:1c:43:9c:81:ff:5d:59:60:62:a1: 9a:4f:00:5b:c0:78:3d:4a:09:35:0e:fd:11:85:69:0b: 34:78:ae:41:58:05:37:83:bc:9f:b5:bd:16:01:19:6e: a2:7b:fb:b7:53:f7:d7:5c:65:8f:45:f5:08:e1:d2:36: e9:e8:a6:10:af:ea:4e:bf:de:7a:ce:23:10:b9:e8:05: 6e:1c:2a:b0:9d:8c:cc:85:70:12:45:25:d0:3e:e0:54: 7b:c5:6c:39:ce:b2:a3:c3:f4:03:1f:39:4d:87:af:36 Fingerprint (SHA-256): A6:5C:25:44:15:CA:4C:81:87:11:10:5E:8B:14:81:B1:E6:56:A5:F3:BB:EB:D8:6E:A1:33:D0:11:F1:71:DE:F0 Fingerprint (SHA1): 48:FE:9C:F9:D8:E9:70:D6:F3:04:CB:61:C1:13:B8:A6:DE:5C:1D:74 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193417 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193418 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193419 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320193420 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193417 (0x1315c389) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:49 2023 Not After : Mon Mar 20 19:35:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:7a:82:20:af:43:5c:44:2e:00:01:06:2c:e9:a9:05: 67:fb:43:1d:ba:2d:d6:2a:4f:15:be:2d:d9:65:61:c4: f2:f8:4e:23:fb:2c:53:b1:63:91:8f:d9:cd:2c:23:f9: 66:58:a5:17:fc:ad:ba:86:36:e2:26:4d:fb:19:7b:70: 76:43:53:cd:07:e1:a6:ca:9e:ad:89:b7:38:bb:cd:f6: 86:92:18:bb:e3:a2:92:73:f7:f6:cf:1a:f9:47:a6:2b: 6e:89:ac:b9:50:ed:19:25:ae:6c:c7:39:2c:95:76:43: 97:79:3d:c5:c4:ba:3e:3b:a9:56:2f:95:80:28:35:0b: b8:17:3a:52:be:3f:bc:2d:20:ad:0b:49:7d:f8:8c:c3: 2d:c3:2a:e3:15:66:52:e1:e2:c0:12:56:7b:85:d3:a8: 51:35:2c:ef:26:a4:e7:2d:42:58:da:97:14:50:c9:82: cd:c6:59:2b:e1:65:ed:54:01:2b:0b:09:3d:44:3c:77: b1:f8:27:76:68:4d:53:3f:27:48:6e:af:ea:14:e1:15: 40:a0:65:b8:9b:bb:06:91:d7:a9:22:44:c8:8e:3d:df: fa:df:25:f7:5d:8b:94:de:92:cd:62:bd:1e:4b:da:27: 88:b2:68:12:2e:46:c8:8a:c3:64:53:30:25:d7:1c:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:b2:2d:20:53:14:93:85:0d:c5:5f:46:78:35:52:d0: de:39:4d:35:f7:28:bb:eb:a9:06:27:74:ff:78:54:b5: 15:f4:14:74:88:41:52:87:36:23:8c:01:20:be:2b:60: 22:ac:52:31:03:f0:a2:c8:b1:dc:dc:a0:1a:60:36:2a: c5:81:cb:9a:52:cd:10:9a:5a:c3:88:f2:80:88:2c:42: 65:e4:dc:53:80:fa:53:90:2c:36:1b:1e:13:2d:5a:cd: 3c:91:49:a7:02:74:96:01:f4:2a:a6:f1:72:8c:14:16: 07:b7:5a:41:56:22:f6:2b:ea:68:c8:24:6a:17:96:bb: a8:63:49:a6:60:f0:ee:01:8b:3b:7a:9f:b6:61:c0:f3: 35:ad:66:39:55:8f:ce:99:b7:8c:dd:ea:d2:b8:c9:01: 33:32:37:0c:77:d2:85:67:7d:99:d0:e3:31:31:fc:dc: f8:5d:4d:91:e6:37:dd:8e:27:9f:b4:b1:8f:87:3c:95: 69:5f:a6:1b:2e:ad:c4:ce:d7:f0:9a:c2:4f:4a:c8:22: 31:86:32:bd:3c:75:a1:91:d1:5b:b1:8b:7b:ad:23:4a: 1e:fb:f9:28:36:4c:97:de:d3:fe:78:41:97:74:1c:00: 7b:80:d9:6f:dd:23:40:ae:30:83:51:29:7e:88:48:6b Fingerprint (SHA-256): 2D:45:87:B4:C8:65:F1:EF:09:CF:4C:7A:EE:5F:6E:37:41:4F:DF:54:1F:25:57:1D:0C:D7:E8:A1:70:E0:47:84 Fingerprint (SHA1): F0:05:81:88:0F:87:73:C1:A2:5C:CD:5D:59:13:97:0D:00:B5:B5:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193418 (0x1315c38a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:50 2023 Not After : Mon Mar 20 19:35:50 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:68:e6:df:56:10:96:55:bb:7e:3e:45:49:0f:57: 86:17:98:67:3d:41:28:ed:10:48:9c:3d:5a:2a:59:3d: a3:8b:86:ac:39:c6:87:6c:d7:0d:1d:d3:37:27:2b:91: 04:27:9b:35:eb:ef:07:74:ca:c9:23:63:f3:79:22:77: a6:73:a9:9b:3f:6a:ca:de:62:30:88:93:55:8b:25:bd: 05:9e:ac:3b:79:b3:b5:04:7b:54:2e:eb:d9:51:09:8a: 83:ed:2d:05:b7:1e:f5:8d:03:37:ed:43:e9:14:87:e5: 82:d8:d7:e4:b8:19:81:9a:c5:6f:25:d5:bf:ff:f9:4c: 93:68:bf:26:60:fc:16:d6:b1:94:43:77:05:a5:52:f1: 0f:4d:81:a0:02:d7:29:0e:a8:b3:3c:42:ad:f9:8f:88: de:e3:63:35:5d:9b:40:f2:51:41:3f:12:fc:58:e1:de: 68:68:83:93:2c:43:84:3b:08:c7:25:4d:d7:87:26:f0: 16:63:7c:34:9f:a7:77:2b:c1:b2:5d:6f:a5:4a:5e:e2: ff:47:8f:6e:24:52:68:2c:2b:e3:e3:1e:de:0d:be:39: 8f:b0:58:21:77:5b:ef:74:93:10:1a:73:b3:2e:d7:35: bb:f4:e6:58:70:62:de:b4:cf:10:03:4a:64:d6:85:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:dd:2f:fe:70:83:c6:52:30:7a:30:a9:65:1d:fa:ee: 88:16:08:d5:f0:58:00:ea:21:73:96:b3:fd:3d:0e:88: 14:de:ac:ca:3d:fa:81:d4:15:d7:18:f0:22:5b:43:8a: fd:3b:0d:35:4d:0c:ae:7e:ec:87:7e:06:01:2d:16:37: f9:a7:1b:55:74:f6:f2:c7:29:f0:f0:5a:7f:af:66:4e: 02:f7:d7:ce:70:5b:5d:66:b0:cf:75:cf:3d:cf:89:43: 23:53:e9:0e:51:14:fd:ae:8d:c6:86:24:7f:8b:41:cb: 39:39:fc:3b:34:39:0c:02:46:fe:60:98:4f:e4:73:e9: c7:b4:1d:45:19:56:98:13:54:9e:9a:a3:53:ce:86:81: 04:22:8c:e2:3b:4e:49:35:f4:ac:b7:b4:52:78:f6:6e: 85:ae:c9:b9:36:bd:2c:2e:6f:fc:20:5e:6b:7f:f5:26: 74:94:f0:67:d7:c8:84:93:d3:46:c5:14:4e:8d:7b:da: 7e:03:bd:53:ae:26:3d:16:71:7b:d6:0c:aa:66:f6:25: c2:9e:72:ce:cc:99:55:95:05:c5:82:45:bf:07:4f:ae: 72:0e:8e:dd:29:ad:46:69:a0:fe:6c:a3:9c:15:33:0e: f5:67:70:3f:d5:91:a6:04:64:4c:83:d2:85:50:4c:fb Fingerprint (SHA-256): A4:E1:9E:54:AE:10:43:E3:6D:C4:2A:22:C3:61:04:15:C6:20:17:5E:24:0D:17:E4:4B:21:2D:5E:91:84:A4:05 Fingerprint (SHA1): EF:8C:D9:CD:83:0B:67:37:F7:84:0F:E2:B6:14:EF:24:F7:05:A1:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193419 (0x1315c38b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:50 2023 Not After : Mon Mar 20 19:35:50 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:12:1e:5d:f8:0f:39:21:7f:47:b3:b9:5e:08:0d:13: 5f:27:18:19:1a:be:7c:70:27:15:4c:2e:a7:c4:e5:ea: d7:57:5e:00:24:5f:ce:53:a9:b6:1b:a8:be:6c:a9:dc: a0:42:13:5f:5b:e3:04:5e:0a:b3:45:fc:6e:59:8d:81: 56:91:e0:64:4e:a7:56:13:8b:4d:55:fb:7c:a9:b2:e7: 9d:32:26:1b:07:95:9c:be:af:71:52:10:70:22:80:5c: fa:61:84:4d:13:0e:54:0c:ed:c9:a3:c1:48:9d:8c:7c: 6b:34:8d:97:b4:15:c0:a5:5b:02:4e:96:13:f8:de:7e: 68:68:b5:e2:c5:ab:06:92:14:62:89:6f:12:56:97:1d: a6:b2:a8:7d:7f:c0:ad:10:23:68:d7:a4:a5:f2:06:3a: a7:cc:16:09:4b:6d:75:31:2b:23:a5:c3:b5:94:18:75: c0:e0:dd:20:a8:f2:21:f0:27:1f:71:2f:83:91:59:14: 86:ef:6c:e8:54:c8:59:e8:32:89:bf:fc:16:5a:70:6c: aa:5c:a7:4c:ae:f0:8b:2d:f4:14:4c:be:82:a9:9d:3d: 3c:c7:b2:f9:36:72:e5:9b:69:f8:72:84:b5:71:b0:97: 07:65:1e:3b:a2:19:a8:50:90:04:02:d1:0c:1f:50:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:f2:01:86:2f:19:38:47:e7:ad:19:d4:81:f8:8e:31: 1d:62:f5:96:60:94:32:cb:28:b7:20:1c:66:55:3c:f2: 47:43:bf:a5:30:5b:f0:71:02:cc:8b:44:92:61:b7:1b: 6d:eb:0e:0a:0c:20:58:40:84:5f:31:47:5a:6d:98:9b: 88:d3:ed:80:79:ea:20:db:fc:8e:0e:b1:5c:c9:a8:0c: 51:29:d4:2b:a5:c7:d6:0b:dc:b6:93:bb:f3:26:16:18: 87:0a:0b:3d:77:25:7b:87:e8:03:d4:be:11:37:5e:51: 55:61:c5:1c:7c:bc:db:9b:32:2a:e0:54:b5:c1:41:96: 40:38:ea:d4:28:62:a2:57:d1:0a:78:48:42:25:b9:0b: 9f:95:c3:3a:13:60:16:da:7f:05:8c:04:87:e4:2c:de: 60:c6:8a:4e:05:43:e0:3a:e9:44:14:8c:49:27:13:ce: 6f:03:55:33:bb:e0:9e:d5:aa:19:33:29:10:8f:50:38: 18:7d:e2:7f:8d:d3:86:20:c7:85:ad:66:09:bf:5c:37: 12:51:4a:0d:cf:f5:38:11:aa:16:48:49:66:d3:78:82: fb:ed:e9:ea:bf:0e:84:7f:12:4c:6e:46:9a:71:42:f5: 9d:c6:6c:bf:62:45:7f:ab:b4:2b:66:1d:5c:d6:22:29 Fingerprint (SHA-256): 14:A6:7B:3A:E2:81:2A:60:9B:1D:98:4D:7C:E3:83:AA:7D:1C:EF:7B:74:C7:FA:42:EB:99:26:3E:7D:02:26:56 Fingerprint (SHA1): E9:7F:BD:BC:AE:59:6B:25:E4:CB:85:92:EF:DE:C6:90:C0:56:A7:E6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193417 (0x1315c389) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:49 2023 Not After : Mon Mar 20 19:35:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:7a:82:20:af:43:5c:44:2e:00:01:06:2c:e9:a9:05: 67:fb:43:1d:ba:2d:d6:2a:4f:15:be:2d:d9:65:61:c4: f2:f8:4e:23:fb:2c:53:b1:63:91:8f:d9:cd:2c:23:f9: 66:58:a5:17:fc:ad:ba:86:36:e2:26:4d:fb:19:7b:70: 76:43:53:cd:07:e1:a6:ca:9e:ad:89:b7:38:bb:cd:f6: 86:92:18:bb:e3:a2:92:73:f7:f6:cf:1a:f9:47:a6:2b: 6e:89:ac:b9:50:ed:19:25:ae:6c:c7:39:2c:95:76:43: 97:79:3d:c5:c4:ba:3e:3b:a9:56:2f:95:80:28:35:0b: b8:17:3a:52:be:3f:bc:2d:20:ad:0b:49:7d:f8:8c:c3: 2d:c3:2a:e3:15:66:52:e1:e2:c0:12:56:7b:85:d3:a8: 51:35:2c:ef:26:a4:e7:2d:42:58:da:97:14:50:c9:82: cd:c6:59:2b:e1:65:ed:54:01:2b:0b:09:3d:44:3c:77: b1:f8:27:76:68:4d:53:3f:27:48:6e:af:ea:14:e1:15: 40:a0:65:b8:9b:bb:06:91:d7:a9:22:44:c8:8e:3d:df: fa:df:25:f7:5d:8b:94:de:92:cd:62:bd:1e:4b:da:27: 88:b2:68:12:2e:46:c8:8a:c3:64:53:30:25:d7:1c:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:b2:2d:20:53:14:93:85:0d:c5:5f:46:78:35:52:d0: de:39:4d:35:f7:28:bb:eb:a9:06:27:74:ff:78:54:b5: 15:f4:14:74:88:41:52:87:36:23:8c:01:20:be:2b:60: 22:ac:52:31:03:f0:a2:c8:b1:dc:dc:a0:1a:60:36:2a: c5:81:cb:9a:52:cd:10:9a:5a:c3:88:f2:80:88:2c:42: 65:e4:dc:53:80:fa:53:90:2c:36:1b:1e:13:2d:5a:cd: 3c:91:49:a7:02:74:96:01:f4:2a:a6:f1:72:8c:14:16: 07:b7:5a:41:56:22:f6:2b:ea:68:c8:24:6a:17:96:bb: a8:63:49:a6:60:f0:ee:01:8b:3b:7a:9f:b6:61:c0:f3: 35:ad:66:39:55:8f:ce:99:b7:8c:dd:ea:d2:b8:c9:01: 33:32:37:0c:77:d2:85:67:7d:99:d0:e3:31:31:fc:dc: f8:5d:4d:91:e6:37:dd:8e:27:9f:b4:b1:8f:87:3c:95: 69:5f:a6:1b:2e:ad:c4:ce:d7:f0:9a:c2:4f:4a:c8:22: 31:86:32:bd:3c:75:a1:91:d1:5b:b1:8b:7b:ad:23:4a: 1e:fb:f9:28:36:4c:97:de:d3:fe:78:41:97:74:1c:00: 7b:80:d9:6f:dd:23:40:ae:30:83:51:29:7e:88:48:6b Fingerprint (SHA-256): 2D:45:87:B4:C8:65:F1:EF:09:CF:4C:7A:EE:5F:6E:37:41:4F:DF:54:1F:25:57:1D:0C:D7:E8:A1:70:E0:47:84 Fingerprint (SHA1): F0:05:81:88:0F:87:73:C1:A2:5C:CD:5D:59:13:97:0D:00:B5:B5:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193418 (0x1315c38a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:50 2023 Not After : Mon Mar 20 19:35:50 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:68:e6:df:56:10:96:55:bb:7e:3e:45:49:0f:57: 86:17:98:67:3d:41:28:ed:10:48:9c:3d:5a:2a:59:3d: a3:8b:86:ac:39:c6:87:6c:d7:0d:1d:d3:37:27:2b:91: 04:27:9b:35:eb:ef:07:74:ca:c9:23:63:f3:79:22:77: a6:73:a9:9b:3f:6a:ca:de:62:30:88:93:55:8b:25:bd: 05:9e:ac:3b:79:b3:b5:04:7b:54:2e:eb:d9:51:09:8a: 83:ed:2d:05:b7:1e:f5:8d:03:37:ed:43:e9:14:87:e5: 82:d8:d7:e4:b8:19:81:9a:c5:6f:25:d5:bf:ff:f9:4c: 93:68:bf:26:60:fc:16:d6:b1:94:43:77:05:a5:52:f1: 0f:4d:81:a0:02:d7:29:0e:a8:b3:3c:42:ad:f9:8f:88: de:e3:63:35:5d:9b:40:f2:51:41:3f:12:fc:58:e1:de: 68:68:83:93:2c:43:84:3b:08:c7:25:4d:d7:87:26:f0: 16:63:7c:34:9f:a7:77:2b:c1:b2:5d:6f:a5:4a:5e:e2: ff:47:8f:6e:24:52:68:2c:2b:e3:e3:1e:de:0d:be:39: 8f:b0:58:21:77:5b:ef:74:93:10:1a:73:b3:2e:d7:35: bb:f4:e6:58:70:62:de:b4:cf:10:03:4a:64:d6:85:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:dd:2f:fe:70:83:c6:52:30:7a:30:a9:65:1d:fa:ee: 88:16:08:d5:f0:58:00:ea:21:73:96:b3:fd:3d:0e:88: 14:de:ac:ca:3d:fa:81:d4:15:d7:18:f0:22:5b:43:8a: fd:3b:0d:35:4d:0c:ae:7e:ec:87:7e:06:01:2d:16:37: f9:a7:1b:55:74:f6:f2:c7:29:f0:f0:5a:7f:af:66:4e: 02:f7:d7:ce:70:5b:5d:66:b0:cf:75:cf:3d:cf:89:43: 23:53:e9:0e:51:14:fd:ae:8d:c6:86:24:7f:8b:41:cb: 39:39:fc:3b:34:39:0c:02:46:fe:60:98:4f:e4:73:e9: c7:b4:1d:45:19:56:98:13:54:9e:9a:a3:53:ce:86:81: 04:22:8c:e2:3b:4e:49:35:f4:ac:b7:b4:52:78:f6:6e: 85:ae:c9:b9:36:bd:2c:2e:6f:fc:20:5e:6b:7f:f5:26: 74:94:f0:67:d7:c8:84:93:d3:46:c5:14:4e:8d:7b:da: 7e:03:bd:53:ae:26:3d:16:71:7b:d6:0c:aa:66:f6:25: c2:9e:72:ce:cc:99:55:95:05:c5:82:45:bf:07:4f:ae: 72:0e:8e:dd:29:ad:46:69:a0:fe:6c:a3:9c:15:33:0e: f5:67:70:3f:d5:91:a6:04:64:4c:83:d2:85:50:4c:fb Fingerprint (SHA-256): A4:E1:9E:54:AE:10:43:E3:6D:C4:2A:22:C3:61:04:15:C6:20:17:5E:24:0D:17:E4:4B:21:2D:5E:91:84:A4:05 Fingerprint (SHA1): EF:8C:D9:CD:83:0B:67:37:F7:84:0F:E2:B6:14:EF:24:F7:05:A1:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193419 (0x1315c38b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:50 2023 Not After : Mon Mar 20 19:35:50 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:12:1e:5d:f8:0f:39:21:7f:47:b3:b9:5e:08:0d:13: 5f:27:18:19:1a:be:7c:70:27:15:4c:2e:a7:c4:e5:ea: d7:57:5e:00:24:5f:ce:53:a9:b6:1b:a8:be:6c:a9:dc: a0:42:13:5f:5b:e3:04:5e:0a:b3:45:fc:6e:59:8d:81: 56:91:e0:64:4e:a7:56:13:8b:4d:55:fb:7c:a9:b2:e7: 9d:32:26:1b:07:95:9c:be:af:71:52:10:70:22:80:5c: fa:61:84:4d:13:0e:54:0c:ed:c9:a3:c1:48:9d:8c:7c: 6b:34:8d:97:b4:15:c0:a5:5b:02:4e:96:13:f8:de:7e: 68:68:b5:e2:c5:ab:06:92:14:62:89:6f:12:56:97:1d: a6:b2:a8:7d:7f:c0:ad:10:23:68:d7:a4:a5:f2:06:3a: a7:cc:16:09:4b:6d:75:31:2b:23:a5:c3:b5:94:18:75: c0:e0:dd:20:a8:f2:21:f0:27:1f:71:2f:83:91:59:14: 86:ef:6c:e8:54:c8:59:e8:32:89:bf:fc:16:5a:70:6c: aa:5c:a7:4c:ae:f0:8b:2d:f4:14:4c:be:82:a9:9d:3d: 3c:c7:b2:f9:36:72:e5:9b:69:f8:72:84:b5:71:b0:97: 07:65:1e:3b:a2:19:a8:50:90:04:02:d1:0c:1f:50:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:f2:01:86:2f:19:38:47:e7:ad:19:d4:81:f8:8e:31: 1d:62:f5:96:60:94:32:cb:28:b7:20:1c:66:55:3c:f2: 47:43:bf:a5:30:5b:f0:71:02:cc:8b:44:92:61:b7:1b: 6d:eb:0e:0a:0c:20:58:40:84:5f:31:47:5a:6d:98:9b: 88:d3:ed:80:79:ea:20:db:fc:8e:0e:b1:5c:c9:a8:0c: 51:29:d4:2b:a5:c7:d6:0b:dc:b6:93:bb:f3:26:16:18: 87:0a:0b:3d:77:25:7b:87:e8:03:d4:be:11:37:5e:51: 55:61:c5:1c:7c:bc:db:9b:32:2a:e0:54:b5:c1:41:96: 40:38:ea:d4:28:62:a2:57:d1:0a:78:48:42:25:b9:0b: 9f:95:c3:3a:13:60:16:da:7f:05:8c:04:87:e4:2c:de: 60:c6:8a:4e:05:43:e0:3a:e9:44:14:8c:49:27:13:ce: 6f:03:55:33:bb:e0:9e:d5:aa:19:33:29:10:8f:50:38: 18:7d:e2:7f:8d:d3:86:20:c7:85:ad:66:09:bf:5c:37: 12:51:4a:0d:cf:f5:38:11:aa:16:48:49:66:d3:78:82: fb:ed:e9:ea:bf:0e:84:7f:12:4c:6e:46:9a:71:42:f5: 9d:c6:6c:bf:62:45:7f:ab:b4:2b:66:1d:5c:d6:22:29 Fingerprint (SHA-256): 14:A6:7B:3A:E2:81:2A:60:9B:1D:98:4D:7C:E3:83:AA:7D:1C:EF:7B:74:C7:FA:42:EB:99:26:3E:7D:02:26:56 Fingerprint (SHA1): E9:7F:BD:BC:AE:59:6B:25:E4:CB:85:92:EF:DE:C6:90:C0:56:A7:E6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193421 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193422 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193423 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320193424 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320193425 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193421 (0x1315c38d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:53 2023 Not After : Mon Mar 20 19:35:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:94:55:b4:03:14:3b:4b:73:4e:88:c5:ba:b1:f7:25: 14:9d:d0:a5:3d:c0:65:00:37:ba:d2:e0:b1:40:de:1c: f8:6f:e9:50:a0:40:ee:2c:f0:43:0f:e5:0b:fa:f9:1f: ae:6c:05:a9:f8:9b:aa:22:9d:72:57:c4:23:0b:f8:cb: 9f:bd:a0:c1:08:e8:d2:49:b4:9e:92:b4:19:41:f2:cf: e4:90:13:ce:17:77:2a:d2:00:a9:ba:92:69:e0:df:48: 2c:b2:ee:91:09:3a:13:a5:63:48:1d:60:ec:8d:4f:93: 0e:c5:ef:7b:c4:d7:f0:2e:90:07:3f:4c:32:b0:80:57: e9:25:45:4a:57:47:92:4a:37:9b:76:9d:fc:d8:03:c1: ff:11:e8:4c:32:c8:1c:05:0b:13:05:60:46:2a:29:c4: bb:e7:d0:08:3b:f3:23:00:3e:24:1f:9b:db:ed:84:f7: 56:78:e5:78:98:95:ac:86:76:4f:08:2c:8a:00:53:70: b2:f3:ed:45:a3:4c:20:25:67:e7:17:89:03:c6:c0:25: 7d:bc:02:d2:bb:c4:0d:a3:a3:d5:53:8d:d2:75:85:02: d2:92:84:88:e7:9f:57:2c:63:06:82:0c:5d:4c:cb:41: 7c:a4:7d:bd:1f:9b:db:cd:cd:02:27:22:a5:31:fc:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:a6:63:02:3c:a6:58:6d:64:fb:e6:16:10:3d:4b:56: 70:dd:54:58:a9:a1:bf:fa:08:ed:c9:a8:9c:1f:1f:a0: af:08:f7:ca:37:43:a9:db:04:04:42:d5:a5:03:9c:2c: 96:07:d3:db:a6:04:8e:8b:a6:98:7e:02:48:cc:4f:80: 19:95:d2:89:d6:d1:db:d2:4b:43:1e:bb:4e:09:07:f2: 23:db:66:f5:4a:59:ba:63:1f:02:f7:a2:76:22:72:7d: ad:b1:6d:58:b8:af:d5:85:a2:48:11:6f:e3:bf:61:4f: 33:a3:c5:fb:3d:2a:3b:6d:96:32:90:af:d2:08:71:b7: 27:a9:a0:cb:8b:58:15:eb:83:2b:8b:11:d9:c5:fd:80: a7:a1:ca:d0:dd:a7:1a:c2:4a:b3:a6:80:ca:44:38:49: 59:6c:54:80:e7:be:3d:e2:a4:cd:ff:58:1c:ec:29:3e: 55:86:7f:88:23:27:6a:c2:5d:79:9c:22:a1:8d:e5:a8: 39:13:fd:b9:fe:fc:77:71:e8:cd:56:c3:67:1b:6a:02: f0:4e:80:45:bc:0c:a5:1c:d9:cf:12:a2:e3:df:01:7c: 63:67:45:db:a6:e4:b3:7d:4b:ea:af:00:86:1c:0b:20: 48:cf:31:2e:9f:21:09:f0:a3:c2:30:b8:d7:be:41:7f Fingerprint (SHA-256): 33:22:7B:C4:26:13:B6:E8:14:52:4F:AA:43:23:F4:86:C5:60:49:76:81:BC:E3:A9:E6:88:50:7C:28:B4:54:40 Fingerprint (SHA1): F2:45:EB:65:30:A7:41:3C:79:BA:C9:EF:F5:B7:53:A4:B3:72:87:1C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193422 (0x1315c38e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:54 2023 Not After : Mon Mar 20 19:35:54 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:ee:7c:65:95:49:fa:08:1f:d2:c5:89:c0:04:74:b5: a6:77:ae:dc:ad:f9:bc:53:75:bd:f5:ef:4f:33:9e:4e: 33:8e:ab:53:da:f3:27:88:02:2d:de:9d:9e:58:17:0b: 01:38:00:a1:89:09:08:ad:db:b0:18:2b:9f:5c:c3:fa: 63:91:73:f2:f9:8e:fa:9c:55:a9:e9:60:90:46:6c:9f: 03:c5:db:77:14:af:37:76:2b:31:80:10:e4:3a:e5:22: bb:4c:dc:46:ec:9d:ba:31:ad:3d:9b:0a:c4:47:56:df: 0d:b3:f1:78:fe:7a:61:d0:17:5e:f0:3b:09:d7:e5:e4: 82:b0:7c:e9:12:16:29:9c:c4:8a:13:bc:df:3e:a3:82: 20:41:a1:b8:ca:7a:66:eb:27:16:04:fd:62:5b:de:cf: 2f:ff:10:45:d8:63:36:1b:41:27:c3:4a:e3:fa:f2:80: db:dd:b9:5d:bb:81:49:a7:4b:6d:29:69:51:44:99:bb: 9d:97:69:fe:28:2b:ea:c0:7c:5a:34:29:fd:d9:23:bc: 4e:3f:ce:41:71:aa:6f:bf:50:c4:94:6b:3d:24:4d:de: 84:c5:fb:7c:d2:ea:ea:66:a1:5c:82:3d:77:6a:23:16: d5:32:97:5d:77:cc:cd:60:3d:ae:04:93:02:ea:d3:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:4e:c2:ef:eb:bd:d4:69:f7:7d:f3:5c:4b:6a:b7:bc: a5:2c:c9:db:12:76:93:47:6e:7e:28:38:5d:c2:ec:ad: e7:9e:e7:46:ef:eb:f8:82:21:97:ae:32:fb:3f:3a:aa: 5f:c4:7e:96:93:2a:75:b4:d1:cb:2e:83:cc:c3:57:75: 70:18:61:2e:74:f3:11:0d:b2:c5:0b:37:1d:92:6c:a8: 6f:c3:af:96:31:94:f1:ce:03:bd:d3:48:1e:a0:95:7e: 61:7d:7d:15:a3:a0:01:bf:4d:13:0d:de:0b:db:19:92: b0:88:4f:ea:2f:11:0f:a6:d0:30:b8:20:31:37:c3:34: 0c:cc:3f:93:86:14:71:18:bb:8d:aa:78:ae:11:df:27: 02:4d:c0:98:81:46:95:12:9a:ca:ab:48:ca:df:26:34: 88:f5:2b:2d:f5:48:09:86:36:98:9c:92:16:71:11:b2: f7:78:78:70:59:29:b8:0c:87:70:aa:96:fa:01:50:d4: c2:61:e6:8a:73:67:f0:d8:56:bb:a3:5a:0c:91:a4:be: 20:f8:ae:e8:89:01:df:ae:53:47:ab:36:6d:6a:6b:2d: 8c:bd:bb:5d:7b:7c:fa:37:29:31:73:ad:9e:26:08:33: d7:9d:95:67:1a:d3:ff:2c:6c:e8:f5:97:8c:bc:a2:6c Fingerprint (SHA-256): 7C:A5:AE:9C:E7:29:88:59:DF:B1:9F:65:F4:2D:A9:DF:12:00:0D:C4:8E:06:3E:74:26:8C:11:10:B4:64:C3:5B Fingerprint (SHA1): 46:18:94:CC:13:3C:C8:5B:1B:01:C3:3F:6F:40:01:0D:C9:73:7E:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193423 (0x1315c38f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:55 2023 Not After : Mon Mar 20 19:35:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:93:0f:2e:41:02:e6:14:66:95:4c:9b:67:d7:07:39: 9c:24:71:0c:5b:89:27:bd:ad:2b:bc:d5:36:02:59:a0: 16:f8:c3:e3:8b:0b:d8:48:ca:4e:1a:a0:0f:55:cc:7c: f2:6a:4f:fd:20:77:0c:4f:38:63:9b:08:ac:f1:1c:e7: 39:1f:c8:a6:f7:40:d4:40:1b:52:68:96:0c:86:7a:81: 37:76:e1:a6:be:1d:85:f1:26:67:04:37:33:08:b8:98: 41:e6:de:6f:b7:d1:a5:cf:09:47:2c:30:e0:e6:90:41: b9:08:72:9d:87:1b:1b:68:5f:88:5a:4a:5e:d2:3c:4c: 0b:e9:ce:d7:30:54:78:7a:75:a5:3e:95:41:eb:ef:b7: f5:7e:48:6a:8b:8c:4b:db:71:8f:87:bd:a6:11:f4:a6: b2:63:f9:ff:97:9a:1f:f0:a7:d5:86:d3:67:bf:b2:0e: 5f:1b:5d:5b:08:6d:e4:7a:0b:81:e9:f6:d1:02:67:cc: 0f:94:81:43:54:89:e7:c1:33:e3:b6:36:c9:67:a6:da: 68:2c:9f:f2:71:b9:9b:f6:75:f8:57:cd:82:d1:98:38: 8e:86:56:bc:e8:f5:25:23:10:8b:a2:25:99:29:a7:05: 22:36:d5:97:18:58:f7:78:89:d0:bc:3d:ce:d1:5d:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:7a:79:a3:c9:4e:63:58:b9:bc:94:05:0b:1f:69:36: b6:f7:a3:b7:e7:f8:cc:c2:11:b2:84:d7:b8:a1:20:d0: 7c:e3:33:02:d0:93:ed:21:fb:e9:c3:13:07:c2:b3:de: 15:dd:28:f7:01:a4:65:81:18:60:a4:f1:f3:45:98:52: 68:3f:9b:75:8a:73:44:f4:a2:08:c0:15:7f:21:fe:34: ef:f5:3c:87:b4:97:85:54:58:d2:2f:62:d2:b3:ff:dd: f0:ad:da:5f:f2:60:ee:f2:c1:97:d8:cf:2c:3f:97:4d: b2:de:93:cd:36:20:dc:9d:9a:cc:a2:99:3f:4f:ff:0d: f1:d5:72:8a:52:00:bb:7a:eb:1d:19:7f:8d:59:a3:34: a6:64:43:20:16:33:bb:eb:0f:49:9f:57:da:0c:81:c7: 91:4b:74:ff:b5:86:21:35:4b:27:ea:0f:f7:9d:dd:3e: 5f:51:e2:c6:c7:20:ae:8b:16:81:b9:85:43:98:05:ad: 56:45:a0:6e:94:ee:3c:a7:1f:3d:15:f9:d5:2c:f1:55: 40:6d:84:2d:37:7e:65:11:13:ec:fb:06:46:01:a4:2b: 5c:2f:d8:a3:0d:a3:36:44:03:d4:9a:88:dc:31:ea:0f: d3:30:3a:05:09:3e:43:d4:48:44:b5:8a:6c:88:02:1f Fingerprint (SHA-256): 50:96:C7:B9:A6:39:3F:FE:3A:20:23:64:BD:BD:AB:94:73:9A:AF:70:8C:DD:E4:22:C3:01:81:5A:A0:E0:0F:98 Fingerprint (SHA1): B0:50:E4:31:1B:2A:0F:38:63:BC:1B:EF:E1:D5:DF:4C:D2:F2:C5:9C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193421 (0x1315c38d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:53 2023 Not After : Mon Mar 20 19:35:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:94:55:b4:03:14:3b:4b:73:4e:88:c5:ba:b1:f7:25: 14:9d:d0:a5:3d:c0:65:00:37:ba:d2:e0:b1:40:de:1c: f8:6f:e9:50:a0:40:ee:2c:f0:43:0f:e5:0b:fa:f9:1f: ae:6c:05:a9:f8:9b:aa:22:9d:72:57:c4:23:0b:f8:cb: 9f:bd:a0:c1:08:e8:d2:49:b4:9e:92:b4:19:41:f2:cf: e4:90:13:ce:17:77:2a:d2:00:a9:ba:92:69:e0:df:48: 2c:b2:ee:91:09:3a:13:a5:63:48:1d:60:ec:8d:4f:93: 0e:c5:ef:7b:c4:d7:f0:2e:90:07:3f:4c:32:b0:80:57: e9:25:45:4a:57:47:92:4a:37:9b:76:9d:fc:d8:03:c1: ff:11:e8:4c:32:c8:1c:05:0b:13:05:60:46:2a:29:c4: bb:e7:d0:08:3b:f3:23:00:3e:24:1f:9b:db:ed:84:f7: 56:78:e5:78:98:95:ac:86:76:4f:08:2c:8a:00:53:70: b2:f3:ed:45:a3:4c:20:25:67:e7:17:89:03:c6:c0:25: 7d:bc:02:d2:bb:c4:0d:a3:a3:d5:53:8d:d2:75:85:02: d2:92:84:88:e7:9f:57:2c:63:06:82:0c:5d:4c:cb:41: 7c:a4:7d:bd:1f:9b:db:cd:cd:02:27:22:a5:31:fc:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:a6:63:02:3c:a6:58:6d:64:fb:e6:16:10:3d:4b:56: 70:dd:54:58:a9:a1:bf:fa:08:ed:c9:a8:9c:1f:1f:a0: af:08:f7:ca:37:43:a9:db:04:04:42:d5:a5:03:9c:2c: 96:07:d3:db:a6:04:8e:8b:a6:98:7e:02:48:cc:4f:80: 19:95:d2:89:d6:d1:db:d2:4b:43:1e:bb:4e:09:07:f2: 23:db:66:f5:4a:59:ba:63:1f:02:f7:a2:76:22:72:7d: ad:b1:6d:58:b8:af:d5:85:a2:48:11:6f:e3:bf:61:4f: 33:a3:c5:fb:3d:2a:3b:6d:96:32:90:af:d2:08:71:b7: 27:a9:a0:cb:8b:58:15:eb:83:2b:8b:11:d9:c5:fd:80: a7:a1:ca:d0:dd:a7:1a:c2:4a:b3:a6:80:ca:44:38:49: 59:6c:54:80:e7:be:3d:e2:a4:cd:ff:58:1c:ec:29:3e: 55:86:7f:88:23:27:6a:c2:5d:79:9c:22:a1:8d:e5:a8: 39:13:fd:b9:fe:fc:77:71:e8:cd:56:c3:67:1b:6a:02: f0:4e:80:45:bc:0c:a5:1c:d9:cf:12:a2:e3:df:01:7c: 63:67:45:db:a6:e4:b3:7d:4b:ea:af:00:86:1c:0b:20: 48:cf:31:2e:9f:21:09:f0:a3:c2:30:b8:d7:be:41:7f Fingerprint (SHA-256): 33:22:7B:C4:26:13:B6:E8:14:52:4F:AA:43:23:F4:86:C5:60:49:76:81:BC:E3:A9:E6:88:50:7C:28:B4:54:40 Fingerprint (SHA1): F2:45:EB:65:30:A7:41:3C:79:BA:C9:EF:F5:B7:53:A4:B3:72:87:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193422 (0x1315c38e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:54 2023 Not After : Mon Mar 20 19:35:54 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:ee:7c:65:95:49:fa:08:1f:d2:c5:89:c0:04:74:b5: a6:77:ae:dc:ad:f9:bc:53:75:bd:f5:ef:4f:33:9e:4e: 33:8e:ab:53:da:f3:27:88:02:2d:de:9d:9e:58:17:0b: 01:38:00:a1:89:09:08:ad:db:b0:18:2b:9f:5c:c3:fa: 63:91:73:f2:f9:8e:fa:9c:55:a9:e9:60:90:46:6c:9f: 03:c5:db:77:14:af:37:76:2b:31:80:10:e4:3a:e5:22: bb:4c:dc:46:ec:9d:ba:31:ad:3d:9b:0a:c4:47:56:df: 0d:b3:f1:78:fe:7a:61:d0:17:5e:f0:3b:09:d7:e5:e4: 82:b0:7c:e9:12:16:29:9c:c4:8a:13:bc:df:3e:a3:82: 20:41:a1:b8:ca:7a:66:eb:27:16:04:fd:62:5b:de:cf: 2f:ff:10:45:d8:63:36:1b:41:27:c3:4a:e3:fa:f2:80: db:dd:b9:5d:bb:81:49:a7:4b:6d:29:69:51:44:99:bb: 9d:97:69:fe:28:2b:ea:c0:7c:5a:34:29:fd:d9:23:bc: 4e:3f:ce:41:71:aa:6f:bf:50:c4:94:6b:3d:24:4d:de: 84:c5:fb:7c:d2:ea:ea:66:a1:5c:82:3d:77:6a:23:16: d5:32:97:5d:77:cc:cd:60:3d:ae:04:93:02:ea:d3:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:4e:c2:ef:eb:bd:d4:69:f7:7d:f3:5c:4b:6a:b7:bc: a5:2c:c9:db:12:76:93:47:6e:7e:28:38:5d:c2:ec:ad: e7:9e:e7:46:ef:eb:f8:82:21:97:ae:32:fb:3f:3a:aa: 5f:c4:7e:96:93:2a:75:b4:d1:cb:2e:83:cc:c3:57:75: 70:18:61:2e:74:f3:11:0d:b2:c5:0b:37:1d:92:6c:a8: 6f:c3:af:96:31:94:f1:ce:03:bd:d3:48:1e:a0:95:7e: 61:7d:7d:15:a3:a0:01:bf:4d:13:0d:de:0b:db:19:92: b0:88:4f:ea:2f:11:0f:a6:d0:30:b8:20:31:37:c3:34: 0c:cc:3f:93:86:14:71:18:bb:8d:aa:78:ae:11:df:27: 02:4d:c0:98:81:46:95:12:9a:ca:ab:48:ca:df:26:34: 88:f5:2b:2d:f5:48:09:86:36:98:9c:92:16:71:11:b2: f7:78:78:70:59:29:b8:0c:87:70:aa:96:fa:01:50:d4: c2:61:e6:8a:73:67:f0:d8:56:bb:a3:5a:0c:91:a4:be: 20:f8:ae:e8:89:01:df:ae:53:47:ab:36:6d:6a:6b:2d: 8c:bd:bb:5d:7b:7c:fa:37:29:31:73:ad:9e:26:08:33: d7:9d:95:67:1a:d3:ff:2c:6c:e8:f5:97:8c:bc:a2:6c Fingerprint (SHA-256): 7C:A5:AE:9C:E7:29:88:59:DF:B1:9F:65:F4:2D:A9:DF:12:00:0D:C4:8E:06:3E:74:26:8C:11:10:B4:64:C3:5B Fingerprint (SHA1): 46:18:94:CC:13:3C:C8:5B:1B:01:C3:3F:6F:40:01:0D:C9:73:7E:CE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193423 (0x1315c38f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:55 2023 Not After : Mon Mar 20 19:35:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:93:0f:2e:41:02:e6:14:66:95:4c:9b:67:d7:07:39: 9c:24:71:0c:5b:89:27:bd:ad:2b:bc:d5:36:02:59:a0: 16:f8:c3:e3:8b:0b:d8:48:ca:4e:1a:a0:0f:55:cc:7c: f2:6a:4f:fd:20:77:0c:4f:38:63:9b:08:ac:f1:1c:e7: 39:1f:c8:a6:f7:40:d4:40:1b:52:68:96:0c:86:7a:81: 37:76:e1:a6:be:1d:85:f1:26:67:04:37:33:08:b8:98: 41:e6:de:6f:b7:d1:a5:cf:09:47:2c:30:e0:e6:90:41: b9:08:72:9d:87:1b:1b:68:5f:88:5a:4a:5e:d2:3c:4c: 0b:e9:ce:d7:30:54:78:7a:75:a5:3e:95:41:eb:ef:b7: f5:7e:48:6a:8b:8c:4b:db:71:8f:87:bd:a6:11:f4:a6: b2:63:f9:ff:97:9a:1f:f0:a7:d5:86:d3:67:bf:b2:0e: 5f:1b:5d:5b:08:6d:e4:7a:0b:81:e9:f6:d1:02:67:cc: 0f:94:81:43:54:89:e7:c1:33:e3:b6:36:c9:67:a6:da: 68:2c:9f:f2:71:b9:9b:f6:75:f8:57:cd:82:d1:98:38: 8e:86:56:bc:e8:f5:25:23:10:8b:a2:25:99:29:a7:05: 22:36:d5:97:18:58:f7:78:89:d0:bc:3d:ce:d1:5d:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:7a:79:a3:c9:4e:63:58:b9:bc:94:05:0b:1f:69:36: b6:f7:a3:b7:e7:f8:cc:c2:11:b2:84:d7:b8:a1:20:d0: 7c:e3:33:02:d0:93:ed:21:fb:e9:c3:13:07:c2:b3:de: 15:dd:28:f7:01:a4:65:81:18:60:a4:f1:f3:45:98:52: 68:3f:9b:75:8a:73:44:f4:a2:08:c0:15:7f:21:fe:34: ef:f5:3c:87:b4:97:85:54:58:d2:2f:62:d2:b3:ff:dd: f0:ad:da:5f:f2:60:ee:f2:c1:97:d8:cf:2c:3f:97:4d: b2:de:93:cd:36:20:dc:9d:9a:cc:a2:99:3f:4f:ff:0d: f1:d5:72:8a:52:00:bb:7a:eb:1d:19:7f:8d:59:a3:34: a6:64:43:20:16:33:bb:eb:0f:49:9f:57:da:0c:81:c7: 91:4b:74:ff:b5:86:21:35:4b:27:ea:0f:f7:9d:dd:3e: 5f:51:e2:c6:c7:20:ae:8b:16:81:b9:85:43:98:05:ad: 56:45:a0:6e:94:ee:3c:a7:1f:3d:15:f9:d5:2c:f1:55: 40:6d:84:2d:37:7e:65:11:13:ec:fb:06:46:01:a4:2b: 5c:2f:d8:a3:0d:a3:36:44:03:d4:9a:88:dc:31:ea:0f: d3:30:3a:05:09:3e:43:d4:48:44:b5:8a:6c:88:02:1f Fingerprint (SHA-256): 50:96:C7:B9:A6:39:3F:FE:3A:20:23:64:BD:BD:AB:94:73:9A:AF:70:8C:DD:E4:22:C3:01:81:5A:A0:E0:0F:98 Fingerprint (SHA1): B0:50:E4:31:1B:2A:0F:38:63:BC:1B:EF:E1:D5:DF:4C:D2:F2:C5:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193421 (0x1315c38d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:53 2023 Not After : Mon Mar 20 19:35:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:94:55:b4:03:14:3b:4b:73:4e:88:c5:ba:b1:f7:25: 14:9d:d0:a5:3d:c0:65:00:37:ba:d2:e0:b1:40:de:1c: f8:6f:e9:50:a0:40:ee:2c:f0:43:0f:e5:0b:fa:f9:1f: ae:6c:05:a9:f8:9b:aa:22:9d:72:57:c4:23:0b:f8:cb: 9f:bd:a0:c1:08:e8:d2:49:b4:9e:92:b4:19:41:f2:cf: e4:90:13:ce:17:77:2a:d2:00:a9:ba:92:69:e0:df:48: 2c:b2:ee:91:09:3a:13:a5:63:48:1d:60:ec:8d:4f:93: 0e:c5:ef:7b:c4:d7:f0:2e:90:07:3f:4c:32:b0:80:57: e9:25:45:4a:57:47:92:4a:37:9b:76:9d:fc:d8:03:c1: ff:11:e8:4c:32:c8:1c:05:0b:13:05:60:46:2a:29:c4: bb:e7:d0:08:3b:f3:23:00:3e:24:1f:9b:db:ed:84:f7: 56:78:e5:78:98:95:ac:86:76:4f:08:2c:8a:00:53:70: b2:f3:ed:45:a3:4c:20:25:67:e7:17:89:03:c6:c0:25: 7d:bc:02:d2:bb:c4:0d:a3:a3:d5:53:8d:d2:75:85:02: d2:92:84:88:e7:9f:57:2c:63:06:82:0c:5d:4c:cb:41: 7c:a4:7d:bd:1f:9b:db:cd:cd:02:27:22:a5:31:fc:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:a6:63:02:3c:a6:58:6d:64:fb:e6:16:10:3d:4b:56: 70:dd:54:58:a9:a1:bf:fa:08:ed:c9:a8:9c:1f:1f:a0: af:08:f7:ca:37:43:a9:db:04:04:42:d5:a5:03:9c:2c: 96:07:d3:db:a6:04:8e:8b:a6:98:7e:02:48:cc:4f:80: 19:95:d2:89:d6:d1:db:d2:4b:43:1e:bb:4e:09:07:f2: 23:db:66:f5:4a:59:ba:63:1f:02:f7:a2:76:22:72:7d: ad:b1:6d:58:b8:af:d5:85:a2:48:11:6f:e3:bf:61:4f: 33:a3:c5:fb:3d:2a:3b:6d:96:32:90:af:d2:08:71:b7: 27:a9:a0:cb:8b:58:15:eb:83:2b:8b:11:d9:c5:fd:80: a7:a1:ca:d0:dd:a7:1a:c2:4a:b3:a6:80:ca:44:38:49: 59:6c:54:80:e7:be:3d:e2:a4:cd:ff:58:1c:ec:29:3e: 55:86:7f:88:23:27:6a:c2:5d:79:9c:22:a1:8d:e5:a8: 39:13:fd:b9:fe:fc:77:71:e8:cd:56:c3:67:1b:6a:02: f0:4e:80:45:bc:0c:a5:1c:d9:cf:12:a2:e3:df:01:7c: 63:67:45:db:a6:e4:b3:7d:4b:ea:af:00:86:1c:0b:20: 48:cf:31:2e:9f:21:09:f0:a3:c2:30:b8:d7:be:41:7f Fingerprint (SHA-256): 33:22:7B:C4:26:13:B6:E8:14:52:4F:AA:43:23:F4:86:C5:60:49:76:81:BC:E3:A9:E6:88:50:7C:28:B4:54:40 Fingerprint (SHA1): F2:45:EB:65:30:A7:41:3C:79:BA:C9:EF:F5:B7:53:A4:B3:72:87:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193421 (0x1315c38d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:53 2023 Not After : Mon Mar 20 19:35:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:94:55:b4:03:14:3b:4b:73:4e:88:c5:ba:b1:f7:25: 14:9d:d0:a5:3d:c0:65:00:37:ba:d2:e0:b1:40:de:1c: f8:6f:e9:50:a0:40:ee:2c:f0:43:0f:e5:0b:fa:f9:1f: ae:6c:05:a9:f8:9b:aa:22:9d:72:57:c4:23:0b:f8:cb: 9f:bd:a0:c1:08:e8:d2:49:b4:9e:92:b4:19:41:f2:cf: e4:90:13:ce:17:77:2a:d2:00:a9:ba:92:69:e0:df:48: 2c:b2:ee:91:09:3a:13:a5:63:48:1d:60:ec:8d:4f:93: 0e:c5:ef:7b:c4:d7:f0:2e:90:07:3f:4c:32:b0:80:57: e9:25:45:4a:57:47:92:4a:37:9b:76:9d:fc:d8:03:c1: ff:11:e8:4c:32:c8:1c:05:0b:13:05:60:46:2a:29:c4: bb:e7:d0:08:3b:f3:23:00:3e:24:1f:9b:db:ed:84:f7: 56:78:e5:78:98:95:ac:86:76:4f:08:2c:8a:00:53:70: b2:f3:ed:45:a3:4c:20:25:67:e7:17:89:03:c6:c0:25: 7d:bc:02:d2:bb:c4:0d:a3:a3:d5:53:8d:d2:75:85:02: d2:92:84:88:e7:9f:57:2c:63:06:82:0c:5d:4c:cb:41: 7c:a4:7d:bd:1f:9b:db:cd:cd:02:27:22:a5:31:fc:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:a6:63:02:3c:a6:58:6d:64:fb:e6:16:10:3d:4b:56: 70:dd:54:58:a9:a1:bf:fa:08:ed:c9:a8:9c:1f:1f:a0: af:08:f7:ca:37:43:a9:db:04:04:42:d5:a5:03:9c:2c: 96:07:d3:db:a6:04:8e:8b:a6:98:7e:02:48:cc:4f:80: 19:95:d2:89:d6:d1:db:d2:4b:43:1e:bb:4e:09:07:f2: 23:db:66:f5:4a:59:ba:63:1f:02:f7:a2:76:22:72:7d: ad:b1:6d:58:b8:af:d5:85:a2:48:11:6f:e3:bf:61:4f: 33:a3:c5:fb:3d:2a:3b:6d:96:32:90:af:d2:08:71:b7: 27:a9:a0:cb:8b:58:15:eb:83:2b:8b:11:d9:c5:fd:80: a7:a1:ca:d0:dd:a7:1a:c2:4a:b3:a6:80:ca:44:38:49: 59:6c:54:80:e7:be:3d:e2:a4:cd:ff:58:1c:ec:29:3e: 55:86:7f:88:23:27:6a:c2:5d:79:9c:22:a1:8d:e5:a8: 39:13:fd:b9:fe:fc:77:71:e8:cd:56:c3:67:1b:6a:02: f0:4e:80:45:bc:0c:a5:1c:d9:cf:12:a2:e3:df:01:7c: 63:67:45:db:a6:e4:b3:7d:4b:ea:af:00:86:1c:0b:20: 48:cf:31:2e:9f:21:09:f0:a3:c2:30:b8:d7:be:41:7f Fingerprint (SHA-256): 33:22:7B:C4:26:13:B6:E8:14:52:4F:AA:43:23:F4:86:C5:60:49:76:81:BC:E3:A9:E6:88:50:7C:28:B4:54:40 Fingerprint (SHA1): F2:45:EB:65:30:A7:41:3C:79:BA:C9:EF:F5:B7:53:A4:B3:72:87:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193422 (0x1315c38e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:54 2023 Not After : Mon Mar 20 19:35:54 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:ee:7c:65:95:49:fa:08:1f:d2:c5:89:c0:04:74:b5: a6:77:ae:dc:ad:f9:bc:53:75:bd:f5:ef:4f:33:9e:4e: 33:8e:ab:53:da:f3:27:88:02:2d:de:9d:9e:58:17:0b: 01:38:00:a1:89:09:08:ad:db:b0:18:2b:9f:5c:c3:fa: 63:91:73:f2:f9:8e:fa:9c:55:a9:e9:60:90:46:6c:9f: 03:c5:db:77:14:af:37:76:2b:31:80:10:e4:3a:e5:22: bb:4c:dc:46:ec:9d:ba:31:ad:3d:9b:0a:c4:47:56:df: 0d:b3:f1:78:fe:7a:61:d0:17:5e:f0:3b:09:d7:e5:e4: 82:b0:7c:e9:12:16:29:9c:c4:8a:13:bc:df:3e:a3:82: 20:41:a1:b8:ca:7a:66:eb:27:16:04:fd:62:5b:de:cf: 2f:ff:10:45:d8:63:36:1b:41:27:c3:4a:e3:fa:f2:80: db:dd:b9:5d:bb:81:49:a7:4b:6d:29:69:51:44:99:bb: 9d:97:69:fe:28:2b:ea:c0:7c:5a:34:29:fd:d9:23:bc: 4e:3f:ce:41:71:aa:6f:bf:50:c4:94:6b:3d:24:4d:de: 84:c5:fb:7c:d2:ea:ea:66:a1:5c:82:3d:77:6a:23:16: d5:32:97:5d:77:cc:cd:60:3d:ae:04:93:02:ea:d3:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:4e:c2:ef:eb:bd:d4:69:f7:7d:f3:5c:4b:6a:b7:bc: a5:2c:c9:db:12:76:93:47:6e:7e:28:38:5d:c2:ec:ad: e7:9e:e7:46:ef:eb:f8:82:21:97:ae:32:fb:3f:3a:aa: 5f:c4:7e:96:93:2a:75:b4:d1:cb:2e:83:cc:c3:57:75: 70:18:61:2e:74:f3:11:0d:b2:c5:0b:37:1d:92:6c:a8: 6f:c3:af:96:31:94:f1:ce:03:bd:d3:48:1e:a0:95:7e: 61:7d:7d:15:a3:a0:01:bf:4d:13:0d:de:0b:db:19:92: b0:88:4f:ea:2f:11:0f:a6:d0:30:b8:20:31:37:c3:34: 0c:cc:3f:93:86:14:71:18:bb:8d:aa:78:ae:11:df:27: 02:4d:c0:98:81:46:95:12:9a:ca:ab:48:ca:df:26:34: 88:f5:2b:2d:f5:48:09:86:36:98:9c:92:16:71:11:b2: f7:78:78:70:59:29:b8:0c:87:70:aa:96:fa:01:50:d4: c2:61:e6:8a:73:67:f0:d8:56:bb:a3:5a:0c:91:a4:be: 20:f8:ae:e8:89:01:df:ae:53:47:ab:36:6d:6a:6b:2d: 8c:bd:bb:5d:7b:7c:fa:37:29:31:73:ad:9e:26:08:33: d7:9d:95:67:1a:d3:ff:2c:6c:e8:f5:97:8c:bc:a2:6c Fingerprint (SHA-256): 7C:A5:AE:9C:E7:29:88:59:DF:B1:9F:65:F4:2D:A9:DF:12:00:0D:C4:8E:06:3E:74:26:8C:11:10:B4:64:C3:5B Fingerprint (SHA1): 46:18:94:CC:13:3C:C8:5B:1B:01:C3:3F:6F:40:01:0D:C9:73:7E:CE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193422 (0x1315c38e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:35:54 2023 Not After : Mon Mar 20 19:35:54 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:ee:7c:65:95:49:fa:08:1f:d2:c5:89:c0:04:74:b5: a6:77:ae:dc:ad:f9:bc:53:75:bd:f5:ef:4f:33:9e:4e: 33:8e:ab:53:da:f3:27:88:02:2d:de:9d:9e:58:17:0b: 01:38:00:a1:89:09:08:ad:db:b0:18:2b:9f:5c:c3:fa: 63:91:73:f2:f9:8e:fa:9c:55:a9:e9:60:90:46:6c:9f: 03:c5:db:77:14:af:37:76:2b:31:80:10:e4:3a:e5:22: bb:4c:dc:46:ec:9d:ba:31:ad:3d:9b:0a:c4:47:56:df: 0d:b3:f1:78:fe:7a:61:d0:17:5e:f0:3b:09:d7:e5:e4: 82:b0:7c:e9:12:16:29:9c:c4:8a:13:bc:df:3e:a3:82: 20:41:a1:b8:ca:7a:66:eb:27:16:04:fd:62:5b:de:cf: 2f:ff:10:45:d8:63:36:1b:41:27:c3:4a:e3:fa:f2:80: db:dd:b9:5d:bb:81:49:a7:4b:6d:29:69:51:44:99:bb: 9d:97:69:fe:28:2b:ea:c0:7c:5a:34:29:fd:d9:23:bc: 4e:3f:ce:41:71:aa:6f:bf:50:c4:94:6b:3d:24:4d:de: 84:c5:fb:7c:d2:ea:ea:66:a1:5c:82:3d:77:6a:23:16: d5:32:97:5d:77:cc:cd:60:3d:ae:04:93:02:ea:d3:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:4e:c2:ef:eb:bd:d4:69:f7:7d:f3:5c:4b:6a:b7:bc: a5:2c:c9:db:12:76:93:47:6e:7e:28:38:5d:c2:ec:ad: e7:9e:e7:46:ef:eb:f8:82:21:97:ae:32:fb:3f:3a:aa: 5f:c4:7e:96:93:2a:75:b4:d1:cb:2e:83:cc:c3:57:75: 70:18:61:2e:74:f3:11:0d:b2:c5:0b:37:1d:92:6c:a8: 6f:c3:af:96:31:94:f1:ce:03:bd:d3:48:1e:a0:95:7e: 61:7d:7d:15:a3:a0:01:bf:4d:13:0d:de:0b:db:19:92: b0:88:4f:ea:2f:11:0f:a6:d0:30:b8:20:31:37:c3:34: 0c:cc:3f:93:86:14:71:18:bb:8d:aa:78:ae:11:df:27: 02:4d:c0:98:81:46:95:12:9a:ca:ab:48:ca:df:26:34: 88:f5:2b:2d:f5:48:09:86:36:98:9c:92:16:71:11:b2: f7:78:78:70:59:29:b8:0c:87:70:aa:96:fa:01:50:d4: c2:61:e6:8a:73:67:f0:d8:56:bb:a3:5a:0c:91:a4:be: 20:f8:ae:e8:89:01:df:ae:53:47:ab:36:6d:6a:6b:2d: 8c:bd:bb:5d:7b:7c:fa:37:29:31:73:ad:9e:26:08:33: d7:9d:95:67:1a:d3:ff:2c:6c:e8:f5:97:8c:bc:a2:6c Fingerprint (SHA-256): 7C:A5:AE:9C:E7:29:88:59:DF:B1:9F:65:F4:2D:A9:DF:12:00:0D:C4:8E:06:3E:74:26:8C:11:10:B4:64:C3:5B Fingerprint (SHA1): 46:18:94:CC:13:3C:C8:5B:1B:01:C3:3F:6F:40:01:0D:C9:73:7E:CE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193423 (0x1315c38f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:55 2023 Not After : Mon Mar 20 19:35:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:93:0f:2e:41:02:e6:14:66:95:4c:9b:67:d7:07:39: 9c:24:71:0c:5b:89:27:bd:ad:2b:bc:d5:36:02:59:a0: 16:f8:c3:e3:8b:0b:d8:48:ca:4e:1a:a0:0f:55:cc:7c: f2:6a:4f:fd:20:77:0c:4f:38:63:9b:08:ac:f1:1c:e7: 39:1f:c8:a6:f7:40:d4:40:1b:52:68:96:0c:86:7a:81: 37:76:e1:a6:be:1d:85:f1:26:67:04:37:33:08:b8:98: 41:e6:de:6f:b7:d1:a5:cf:09:47:2c:30:e0:e6:90:41: b9:08:72:9d:87:1b:1b:68:5f:88:5a:4a:5e:d2:3c:4c: 0b:e9:ce:d7:30:54:78:7a:75:a5:3e:95:41:eb:ef:b7: f5:7e:48:6a:8b:8c:4b:db:71:8f:87:bd:a6:11:f4:a6: b2:63:f9:ff:97:9a:1f:f0:a7:d5:86:d3:67:bf:b2:0e: 5f:1b:5d:5b:08:6d:e4:7a:0b:81:e9:f6:d1:02:67:cc: 0f:94:81:43:54:89:e7:c1:33:e3:b6:36:c9:67:a6:da: 68:2c:9f:f2:71:b9:9b:f6:75:f8:57:cd:82:d1:98:38: 8e:86:56:bc:e8:f5:25:23:10:8b:a2:25:99:29:a7:05: 22:36:d5:97:18:58:f7:78:89:d0:bc:3d:ce:d1:5d:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:7a:79:a3:c9:4e:63:58:b9:bc:94:05:0b:1f:69:36: b6:f7:a3:b7:e7:f8:cc:c2:11:b2:84:d7:b8:a1:20:d0: 7c:e3:33:02:d0:93:ed:21:fb:e9:c3:13:07:c2:b3:de: 15:dd:28:f7:01:a4:65:81:18:60:a4:f1:f3:45:98:52: 68:3f:9b:75:8a:73:44:f4:a2:08:c0:15:7f:21:fe:34: ef:f5:3c:87:b4:97:85:54:58:d2:2f:62:d2:b3:ff:dd: f0:ad:da:5f:f2:60:ee:f2:c1:97:d8:cf:2c:3f:97:4d: b2:de:93:cd:36:20:dc:9d:9a:cc:a2:99:3f:4f:ff:0d: f1:d5:72:8a:52:00:bb:7a:eb:1d:19:7f:8d:59:a3:34: a6:64:43:20:16:33:bb:eb:0f:49:9f:57:da:0c:81:c7: 91:4b:74:ff:b5:86:21:35:4b:27:ea:0f:f7:9d:dd:3e: 5f:51:e2:c6:c7:20:ae:8b:16:81:b9:85:43:98:05:ad: 56:45:a0:6e:94:ee:3c:a7:1f:3d:15:f9:d5:2c:f1:55: 40:6d:84:2d:37:7e:65:11:13:ec:fb:06:46:01:a4:2b: 5c:2f:d8:a3:0d:a3:36:44:03:d4:9a:88:dc:31:ea:0f: d3:30:3a:05:09:3e:43:d4:48:44:b5:8a:6c:88:02:1f Fingerprint (SHA-256): 50:96:C7:B9:A6:39:3F:FE:3A:20:23:64:BD:BD:AB:94:73:9A:AF:70:8C:DD:E4:22:C3:01:81:5A:A0:E0:0F:98 Fingerprint (SHA1): B0:50:E4:31:1B:2A:0F:38:63:BC:1B:EF:E1:D5:DF:4C:D2:F2:C5:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193423 (0x1315c38f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:35:55 2023 Not After : Mon Mar 20 19:35:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:93:0f:2e:41:02:e6:14:66:95:4c:9b:67:d7:07:39: 9c:24:71:0c:5b:89:27:bd:ad:2b:bc:d5:36:02:59:a0: 16:f8:c3:e3:8b:0b:d8:48:ca:4e:1a:a0:0f:55:cc:7c: f2:6a:4f:fd:20:77:0c:4f:38:63:9b:08:ac:f1:1c:e7: 39:1f:c8:a6:f7:40:d4:40:1b:52:68:96:0c:86:7a:81: 37:76:e1:a6:be:1d:85:f1:26:67:04:37:33:08:b8:98: 41:e6:de:6f:b7:d1:a5:cf:09:47:2c:30:e0:e6:90:41: b9:08:72:9d:87:1b:1b:68:5f:88:5a:4a:5e:d2:3c:4c: 0b:e9:ce:d7:30:54:78:7a:75:a5:3e:95:41:eb:ef:b7: f5:7e:48:6a:8b:8c:4b:db:71:8f:87:bd:a6:11:f4:a6: b2:63:f9:ff:97:9a:1f:f0:a7:d5:86:d3:67:bf:b2:0e: 5f:1b:5d:5b:08:6d:e4:7a:0b:81:e9:f6:d1:02:67:cc: 0f:94:81:43:54:89:e7:c1:33:e3:b6:36:c9:67:a6:da: 68:2c:9f:f2:71:b9:9b:f6:75:f8:57:cd:82:d1:98:38: 8e:86:56:bc:e8:f5:25:23:10:8b:a2:25:99:29:a7:05: 22:36:d5:97:18:58:f7:78:89:d0:bc:3d:ce:d1:5d:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:7a:79:a3:c9:4e:63:58:b9:bc:94:05:0b:1f:69:36: b6:f7:a3:b7:e7:f8:cc:c2:11:b2:84:d7:b8:a1:20:d0: 7c:e3:33:02:d0:93:ed:21:fb:e9:c3:13:07:c2:b3:de: 15:dd:28:f7:01:a4:65:81:18:60:a4:f1:f3:45:98:52: 68:3f:9b:75:8a:73:44:f4:a2:08:c0:15:7f:21:fe:34: ef:f5:3c:87:b4:97:85:54:58:d2:2f:62:d2:b3:ff:dd: f0:ad:da:5f:f2:60:ee:f2:c1:97:d8:cf:2c:3f:97:4d: b2:de:93:cd:36:20:dc:9d:9a:cc:a2:99:3f:4f:ff:0d: f1:d5:72:8a:52:00:bb:7a:eb:1d:19:7f:8d:59:a3:34: a6:64:43:20:16:33:bb:eb:0f:49:9f:57:da:0c:81:c7: 91:4b:74:ff:b5:86:21:35:4b:27:ea:0f:f7:9d:dd:3e: 5f:51:e2:c6:c7:20:ae:8b:16:81:b9:85:43:98:05:ad: 56:45:a0:6e:94:ee:3c:a7:1f:3d:15:f9:d5:2c:f1:55: 40:6d:84:2d:37:7e:65:11:13:ec:fb:06:46:01:a4:2b: 5c:2f:d8:a3:0d:a3:36:44:03:d4:9a:88:dc:31:ea:0f: d3:30:3a:05:09:3e:43:d4:48:44:b5:8a:6c:88:02:1f Fingerprint (SHA-256): 50:96:C7:B9:A6:39:3F:FE:3A:20:23:64:BD:BD:AB:94:73:9A:AF:70:8C:DD:E4:22:C3:01:81:5A:A0:E0:0F:98 Fingerprint (SHA1): B0:50:E4:31:1B:2A:0F:38:63:BC:1B:EF:E1:D5:DF:4C:D2:F2:C5:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193426 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320193427 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193428 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 320193429 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320193430 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320193431 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 320193432 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193426 (0x1315c392) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:00 2023 Not After : Mon Mar 20 19:36:00 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:72:56:0b:6d:c9:29:3b:c1:ed:57:bf:68:cf:e2:f3: ba:81:35:6e:7b:04:bf:f5:3e:60:65:4b:9d:26:46:9e: e5:37:ac:8d:f1:02:1e:e1:bd:ef:37:86:82:3a:16:55: 75:77:79:48:2d:59:19:7e:92:08:75:1b:db:c0:0e:21: af:0f:01:ac:f8:f0:13:34:4e:72:40:c7:13:01:d9:c0: 68:9c:03:be:8a:2d:fd:d5:d2:3a:c1:f2:8a:d0:4c:81: 5d:01:5f:7b:f2:e4:13:62:c9:59:a8:b0:9d:e8:d3:76: 89:44:43:52:aa:f4:fd:4b:8b:32:15:83:2f:4b:ed:a7: 1f:45:e7:ea:34:ae:5b:e4:1e:70:b2:28:d8:3a:a4:4c: 8c:ff:fa:ef:6a:99:47:2b:41:94:88:19:b3:38:fd:e6: 4f:13:f8:db:27:74:28:5d:eb:64:ba:75:46:09:e8:2d: ca:9b:6e:f9:ea:15:07:60:8a:3a:39:d3:fd:a6:7e:39: 4b:d7:f1:28:1c:b0:81:ee:6e:f2:1f:29:28:9a:05:ed: 81:66:1f:af:d4:80:b8:aa:0b:aa:e6:31:fb:4e:f1:30: 6c:e1:8c:8b:d6:67:f9:60:97:35:c3:a3:39:e0:5f:eb: aa:1c:9c:0e:be:63:f0:9a:71:48:7b:e6:13:f6:69:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:3e:9a:ce:14:e1:21:b2:8c:df:ce:62:4e:68:1a:e1: cf:b6:c2:ca:79:59:05:d1:24:93:e3:23:51:30:49:d5: 0f:37:3c:ea:c6:f3:8c:b2:18:b3:ba:2b:cf:ac:59:4c: de:82:1d:7c:36:67:17:10:9f:e3:d9:27:73:d6:85:7f: 42:cb:77:8d:2a:18:8f:d7:86:99:b7:01:77:27:a8:b0: 85:e2:ab:91:0d:7d:19:87:5a:5e:c4:48:23:d3:2b:11: 67:b4:e4:04:ca:8f:0a:64:e2:0e:4a:ee:16:81:e8:ff: fb:54:c5:2d:b3:3a:55:99:bd:9b:18:28:bc:4b:2e:a3: e7:71:37:39:db:d6:f5:7d:92:0e:21:12:4b:34:e9:e6: d8:ee:a9:e3:7b:fc:21:aa:31:a4:50:98:2b:b3:e3:9c: e0:b0:b2:f1:39:cd:ca:5e:ed:7b:90:28:8f:14:8f:d7: 83:19:02:44:3a:ef:5f:04:dd:18:55:af:ce:8b:a9:dc: 33:b1:f1:b9:3f:c1:ad:dd:83:3f:26:a2:a8:03:03:43: 76:44:da:b5:1d:e4:2d:e1:94:d4:82:a6:96:f8:1c:f1: 1b:0b:3c:33:d4:75:a9:f3:8b:d1:ee:5d:11:ff:33:2a: 11:2c:ef:b6:2c:1c:13:2a:8c:d6:b6:1a:21:8d:83:72 Fingerprint (SHA-256): 21:FC:6F:A3:B8:54:46:AC:88:A2:85:A7:74:8A:01:32:47:7C:D4:49:2F:99:8A:16:22:52:EF:5A:73:CC:1E:5A Fingerprint (SHA1): 29:C5:1F:C5:6D:4A:52:48:D7:79:97:E9:5F:ED:5C:AB:73:71:46:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193426 (0x1315c392) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:00 2023 Not After : Mon Mar 20 19:36:00 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:72:56:0b:6d:c9:29:3b:c1:ed:57:bf:68:cf:e2:f3: ba:81:35:6e:7b:04:bf:f5:3e:60:65:4b:9d:26:46:9e: e5:37:ac:8d:f1:02:1e:e1:bd:ef:37:86:82:3a:16:55: 75:77:79:48:2d:59:19:7e:92:08:75:1b:db:c0:0e:21: af:0f:01:ac:f8:f0:13:34:4e:72:40:c7:13:01:d9:c0: 68:9c:03:be:8a:2d:fd:d5:d2:3a:c1:f2:8a:d0:4c:81: 5d:01:5f:7b:f2:e4:13:62:c9:59:a8:b0:9d:e8:d3:76: 89:44:43:52:aa:f4:fd:4b:8b:32:15:83:2f:4b:ed:a7: 1f:45:e7:ea:34:ae:5b:e4:1e:70:b2:28:d8:3a:a4:4c: 8c:ff:fa:ef:6a:99:47:2b:41:94:88:19:b3:38:fd:e6: 4f:13:f8:db:27:74:28:5d:eb:64:ba:75:46:09:e8:2d: ca:9b:6e:f9:ea:15:07:60:8a:3a:39:d3:fd:a6:7e:39: 4b:d7:f1:28:1c:b0:81:ee:6e:f2:1f:29:28:9a:05:ed: 81:66:1f:af:d4:80:b8:aa:0b:aa:e6:31:fb:4e:f1:30: 6c:e1:8c:8b:d6:67:f9:60:97:35:c3:a3:39:e0:5f:eb: aa:1c:9c:0e:be:63:f0:9a:71:48:7b:e6:13:f6:69:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:3e:9a:ce:14:e1:21:b2:8c:df:ce:62:4e:68:1a:e1: cf:b6:c2:ca:79:59:05:d1:24:93:e3:23:51:30:49:d5: 0f:37:3c:ea:c6:f3:8c:b2:18:b3:ba:2b:cf:ac:59:4c: de:82:1d:7c:36:67:17:10:9f:e3:d9:27:73:d6:85:7f: 42:cb:77:8d:2a:18:8f:d7:86:99:b7:01:77:27:a8:b0: 85:e2:ab:91:0d:7d:19:87:5a:5e:c4:48:23:d3:2b:11: 67:b4:e4:04:ca:8f:0a:64:e2:0e:4a:ee:16:81:e8:ff: fb:54:c5:2d:b3:3a:55:99:bd:9b:18:28:bc:4b:2e:a3: e7:71:37:39:db:d6:f5:7d:92:0e:21:12:4b:34:e9:e6: d8:ee:a9:e3:7b:fc:21:aa:31:a4:50:98:2b:b3:e3:9c: e0:b0:b2:f1:39:cd:ca:5e:ed:7b:90:28:8f:14:8f:d7: 83:19:02:44:3a:ef:5f:04:dd:18:55:af:ce:8b:a9:dc: 33:b1:f1:b9:3f:c1:ad:dd:83:3f:26:a2:a8:03:03:43: 76:44:da:b5:1d:e4:2d:e1:94:d4:82:a6:96:f8:1c:f1: 1b:0b:3c:33:d4:75:a9:f3:8b:d1:ee:5d:11:ff:33:2a: 11:2c:ef:b6:2c:1c:13:2a:8c:d6:b6:1a:21:8d:83:72 Fingerprint (SHA-256): 21:FC:6F:A3:B8:54:46:AC:88:A2:85:A7:74:8A:01:32:47:7C:D4:49:2F:99:8A:16:22:52:EF:5A:73:CC:1E:5A Fingerprint (SHA1): 29:C5:1F:C5:6D:4A:52:48:D7:79:97:E9:5F:ED:5C:AB:73:71:46:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193433 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320193434 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 320193435 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 320193436 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 320193437 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 320193438 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 320193439 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 320193440 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 320193441 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 320193442 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 320193443 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 320193444 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 320193445 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 320193446 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 320193447 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 320193448 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 320193449 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 320193450 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 320193451 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 320193452 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 320193453 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 320193454 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 320193455 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 320193456 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 320193457 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 320193458 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 320193459 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 320193460 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 320193461 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 320193462 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193433 (0x1315c399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:36:06 2023 Not After : Mon Mar 20 19:36:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:41:71:50:56:24:ec:ac:c1:ac:a7:9d:db:5b:c3:48: d5:6c:4f:40:4f:2e:d6:82:09:83:60:a7:b8:5d:8b:90: c0:20:09:5c:32:b3:93:f1:39:81:45:05:55:e8:4f:8f: a4:ff:b4:c1:03:2b:6d:1e:fd:65:d7:12:c0:90:af:d7: 45:f2:d0:46:b7:dd:e4:e6:6e:29:f3:53:07:22:c0:a8: ad:68:18:68:28:5c:6b:bc:6b:77:e1:6f:a8:0b:be:4f: c0:db:7f:17:21:c5:da:1a:75:e1:b4:d0:2c:53:7d:d5: 3a:06:e4:ae:97:a5:59:41:01:3c:4d:d2:84:6d:5b:64: 2d:0b:10:27:fa:58:22:c7:c5:dd:8a:8b:f7:5a:20:96: a5:6f:06:94:3a:9a:4b:45:f5:45:77:dc:e3:e9:06:59: 45:f6:f0:f6:a1:75:d4:3c:ea:97:18:c8:66:05:ea:4e: 11:19:53:93:89:68:00:35:ea:da:9a:24:09:bd:fa:c2: d6:9e:b7:e0:88:dd:39:c3:fa:ce:99:17:4b:cf:24:f5: 69:5a:f5:04:b7:49:4a:6f:53:ff:b4:d8:17:16:4e:71: 90:35:b1:69:58:84:18:7b:1b:ae:96:e7:d4:53:bf:07: b8:da:28:42:fc:6c:d5:31:39:76:7e:98:2b:88:f7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e7:94:cd:d0:eb:d4:f4:4f:e4:91:dc:7b:70:4a:43: b9:a2:d0:15:71:43:40:a4:d5:6d:50:35:71:04:75:7c: 6c:ee:54:8e:79:17:2d:98:4f:ae:78:59:19:8d:bb:cb: 7f:61:fe:71:02:69:a0:dd:a0:07:44:7c:4f:0f:c0:c4: 2c:0c:03:37:c7:44:8c:19:ab:fb:f7:af:30:cc:a2:73: da:e5:b0:2b:97:8e:42:2c:e0:b6:d1:29:af:ce:36:75: 2e:dd:76:10:99:a0:4b:10:8b:b1:96:16:b7:2b:14:07: e1:8d:b7:7c:7f:36:32:e1:1c:df:e0:4c:c3:f7:e1:39: e2:67:eb:b6:76:01:48:49:3c:24:b6:c0:41:b3:93:33: eb:fb:30:3c:8f:c7:e4:45:ac:95:0f:5e:56:96:53:5b: 90:d8:92:21:9b:df:7c:53:04:e4:ef:b3:03:35:8e:2b: 32:be:67:74:42:db:fb:ab:d5:87:b9:a2:c2:cd:77:f6: 6d:5f:10:39:6f:19:60:38:8c:ec:7a:d4:ab:7f:8a:18: 06:bb:5a:16:54:22:2e:76:8d:11:27:9a:ea:72:1e:14: 75:2e:2c:1a:dd:76:6b:7e:e9:79:fb:9e:d1:1f:85:38: 45:01:58:3b:2e:a2:18:05:eb:97:ff:bc:d0:03:0e:78 Fingerprint (SHA-256): A5:24:EE:FF:7D:DD:D2:DE:E1:1B:3A:46:D2:7B:61:C0:CE:28:9F:02:B9:A1:4B:F7:D3:E5:06:59:E4:D0:F6:5F Fingerprint (SHA1): 79:6B:A2:AC:2D:29:71:CC:4F:36:64:D9:74:AD:63:3F:37:80:35:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193463 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 320193464 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 320193465 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 320193466 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 320193467 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 320193468 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 320193469 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193463 (0x1315c3b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:31 2023 Not After : Mon Mar 20 19:36:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:16:01:b1:06:a4:bd:6f:52:f6:d3:b7:03:a3:be:5f: 23:31:30:72:52:10:ba:c3:81:09:ae:66:7f:0e:a0:cf: 9f:f0:fa:41:a3:d5:c7:bc:2f:3b:25:ed:c5:c2:6f:47: bc:b7:44:45:50:24:07:97:0e:75:1f:ad:5f:25:9c:ea: 89:e1:a5:a6:02:ee:c2:2a:8c:a7:c4:31:c5:af:5a:94: c1:5c:b9:d0:61:ad:a8:7b:b5:54:01:97:2b:08:f0:b6: 2f:af:b2:92:2a:db:61:64:7f:23:99:fd:98:52:44:3a: e6:8f:b7:38:88:93:34:2f:15:81:88:17:ef:b7:df:b7: 16:d0:6d:b2:f3:a0:38:40:f8:fd:9a:5a:85:8a:42:4c: 7b:2d:44:9f:55:b7:a7:8f:31:3d:35:a3:f9:99:cd:ad: 67:ac:45:c6:96:ee:1d:d0:01:93:89:04:df:b5:c6:73: 28:bd:09:1a:20:6d:bf:46:95:db:58:b0:e9:03:d6:24: 2a:7b:16:fb:d9:c5:fb:b2:fb:5a:65:71:2f:f3:28:63: ed:cc:c7:09:2c:d6:e0:ff:82:0b:a8:a3:c0:cc:b3:2d: f8:d0:56:dd:bd:de:86:82:c3:d6:dc:9f:e4:d8:f2:58: 99:06:7d:8e:74:2c:a8:be:47:a6:fd:53:e5:2b:b8:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:0c:8d:24:01:23:9f:1b:d4:eb:cb:f7:5b:87:3d:33: ca:3c:bd:74:eb:9a:9c:03:84:d8:81:07:27:03:79:9d: 5a:ba:a3:b5:f1:24:11:d0:45:dd:e0:2d:06:a3:67:18: df:a3:b8:9c:2d:a3:ed:5f:5e:cc:3e:34:11:e4:aa:e3: 67:e3:08:d6:70:07:c8:5c:5c:56:73:7f:3c:94:f2:79: f4:cd:7f:ef:0a:43:ac:6f:de:9b:e3:dd:bc:35:90:89: 21:6e:11:27:5e:54:0a:d2:f9:54:36:1c:19:3f:87:69: f2:c6:57:ae:18:f7:7e:dd:8a:57:54:b8:54:d3:0c:f2: f1:86:7d:1a:1c:e9:ea:ea:50:1c:44:62:f2:53:f4:a1: 7d:41:cc:6c:65:29:9d:25:25:59:ae:0b:12:82:09:5b: d7:a0:e3:32:69:0d:7e:4a:f6:cc:9d:93:53:8e:0d:00: cf:43:57:23:c9:6e:83:df:3b:c5:4d:e0:87:81:6f:16: 63:a6:d0:8c:b6:3a:10:cc:ba:62:9e:7e:ed:37:8e:09: 92:da:8c:70:ad:f2:f0:a6:9e:e0:05:7c:e7:1b:56:53: 13:1e:7d:05:b5:0c:5c:b4:e4:af:39:be:25:69:04:5e: 81:8b:cc:19:b1:74:07:9c:55:9d:dc:92:51:87:b4:0c Fingerprint (SHA-256): CE:30:25:9A:6C:09:49:7D:90:64:7F:DF:E3:9C:D9:B5:FE:33:05:BB:14:F9:B9:FE:12:83:90:03:93:E4:5D:FA Fingerprint (SHA1): 42:84:AE:0A:85:81:A2:B3:61:A3:77:0C:08:EF:A8:D5:C2:A1:18:75 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193463 (0x1315c3b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:31 2023 Not After : Mon Mar 20 19:36:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:16:01:b1:06:a4:bd:6f:52:f6:d3:b7:03:a3:be:5f: 23:31:30:72:52:10:ba:c3:81:09:ae:66:7f:0e:a0:cf: 9f:f0:fa:41:a3:d5:c7:bc:2f:3b:25:ed:c5:c2:6f:47: bc:b7:44:45:50:24:07:97:0e:75:1f:ad:5f:25:9c:ea: 89:e1:a5:a6:02:ee:c2:2a:8c:a7:c4:31:c5:af:5a:94: c1:5c:b9:d0:61:ad:a8:7b:b5:54:01:97:2b:08:f0:b6: 2f:af:b2:92:2a:db:61:64:7f:23:99:fd:98:52:44:3a: e6:8f:b7:38:88:93:34:2f:15:81:88:17:ef:b7:df:b7: 16:d0:6d:b2:f3:a0:38:40:f8:fd:9a:5a:85:8a:42:4c: 7b:2d:44:9f:55:b7:a7:8f:31:3d:35:a3:f9:99:cd:ad: 67:ac:45:c6:96:ee:1d:d0:01:93:89:04:df:b5:c6:73: 28:bd:09:1a:20:6d:bf:46:95:db:58:b0:e9:03:d6:24: 2a:7b:16:fb:d9:c5:fb:b2:fb:5a:65:71:2f:f3:28:63: ed:cc:c7:09:2c:d6:e0:ff:82:0b:a8:a3:c0:cc:b3:2d: f8:d0:56:dd:bd:de:86:82:c3:d6:dc:9f:e4:d8:f2:58: 99:06:7d:8e:74:2c:a8:be:47:a6:fd:53:e5:2b:b8:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:0c:8d:24:01:23:9f:1b:d4:eb:cb:f7:5b:87:3d:33: ca:3c:bd:74:eb:9a:9c:03:84:d8:81:07:27:03:79:9d: 5a:ba:a3:b5:f1:24:11:d0:45:dd:e0:2d:06:a3:67:18: df:a3:b8:9c:2d:a3:ed:5f:5e:cc:3e:34:11:e4:aa:e3: 67:e3:08:d6:70:07:c8:5c:5c:56:73:7f:3c:94:f2:79: f4:cd:7f:ef:0a:43:ac:6f:de:9b:e3:dd:bc:35:90:89: 21:6e:11:27:5e:54:0a:d2:f9:54:36:1c:19:3f:87:69: f2:c6:57:ae:18:f7:7e:dd:8a:57:54:b8:54:d3:0c:f2: f1:86:7d:1a:1c:e9:ea:ea:50:1c:44:62:f2:53:f4:a1: 7d:41:cc:6c:65:29:9d:25:25:59:ae:0b:12:82:09:5b: d7:a0:e3:32:69:0d:7e:4a:f6:cc:9d:93:53:8e:0d:00: cf:43:57:23:c9:6e:83:df:3b:c5:4d:e0:87:81:6f:16: 63:a6:d0:8c:b6:3a:10:cc:ba:62:9e:7e:ed:37:8e:09: 92:da:8c:70:ad:f2:f0:a6:9e:e0:05:7c:e7:1b:56:53: 13:1e:7d:05:b5:0c:5c:b4:e4:af:39:be:25:69:04:5e: 81:8b:cc:19:b1:74:07:9c:55:9d:dc:92:51:87:b4:0c Fingerprint (SHA-256): CE:30:25:9A:6C:09:49:7D:90:64:7F:DF:E3:9C:D9:B5:FE:33:05:BB:14:F9:B9:FE:12:83:90:03:93:E4:5D:FA Fingerprint (SHA1): 42:84:AE:0A:85:81:A2:B3:61:A3:77:0C:08:EF:A8:D5:C2:A1:18:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193470 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193471 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193472 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320193473 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193470 (0x1315c3be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:37 2023 Not After : Mon Mar 20 19:36:37 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:b6:7f:9e:46:d5:49:c8:ff:9a:7b:79:d6:61:32:f4: de:59:63:03:b8:6e:62:f8:f8:37:72:c1:03:dc:f3:44: 00:ba:7c:06:ea:a9:a7:bd:3c:b7:b7:02:51:28:af:ee: 26:d6:c5:48:48:a3:cb:7a:2b:7b:4e:49:cd:79:49:3d: d1:28:6a:bd:01:29:78:72:2f:85:50:b1:fe:88:6c:de: 09:5b:1a:3b:83:b8:c8:bd:94:e4:18:a0:d1:73:e9:4a: fd:c9:1b:bf:cf:4e:59:92:62:1a:83:01:0e:46:02:94: c8:fb:73:0b:3f:68:1f:64:bd:a8:27:ae:6c:78:5f:21: c0:f1:8e:dd:48:a6:b4:7d:e8:60:c6:74:6a:ae:1d:28: 43:be:95:07:75:1d:fb:1b:2d:34:00:11:ac:6b:0c:54: df:45:a0:ee:4d:ff:3f:a9:72:c5:55:e8:b4:7b:d1:d5: 46:af:fa:ae:25:92:dc:b0:98:c5:16:b2:41:d0:d5:95: 84:31:84:cb:7b:86:cb:41:81:f6:36:b3:5a:26:95:fa: 1f:e9:15:a6:02:76:c8:e2:e2:90:0a:91:c9:03:6d:6f: e0:70:e3:aa:ad:e1:5f:e4:18:fa:00:c0:ca:45:41:9b: 99:f3:ca:20:aa:ee:a8:f8:82:b9:fa:59:a3:fe:0f:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:33:87:83:31:49:01:9e:68:3e:9c:57:3c:3c:6c:00: 04:d5:80:9e:bc:c2:be:74:e1:b0:ca:8c:ff:72:5c:f3: 04:1b:13:e5:fc:a7:28:a7:09:20:2c:5e:6a:34:99:3f: 82:10:8d:20:c4:97:07:5d:5c:ef:69:71:79:cc:a5:d0: a5:fc:8d:5e:d8:8d:41:67:6b:f2:6d:68:b2:a1:85:af: fb:f2:41:fa:53:8b:c2:b4:9e:48:11:36:5b:58:8d:ae: fd:22:1a:60:ce:8d:c9:90:b8:e7:7b:09:9f:07:b8:8b: d4:63:cd:83:93:99:2c:c6:5c:6f:18:cf:8d:62:9f:98: 6e:23:56:78:56:bf:0f:d6:70:b0:30:bb:9e:4a:73:a8: eb:ca:07:bb:1a:db:c9:a6:66:ea:0a:11:18:64:eb:40: 1f:53:f4:b2:48:2f:53:f4:2c:f2:39:b7:f3:0a:2e:92: fc:26:7c:81:e3:45:ab:18:a6:76:9a:b3:73:0a:3e:35: fd:b8:bc:b9:0e:d4:c9:bb:19:00:82:bd:74:5e:0d:fa: 25:4d:8f:64:7e:ba:9b:c0:6c:d4:70:31:0e:e2:fb:38: 50:e8:74:b3:c3:c5:8a:90:66:a3:5d:97:2a:45:5a:bc: 55:70:80:3a:a1:80:70:1e:3b:ba:35:18:cc:76:2c:94 Fingerprint (SHA-256): 46:40:D5:7F:F0:2C:C8:19:93:8B:67:B8:EF:97:CC:E0:B4:5B:53:6E:11:FF:AC:54:13:DF:7F:85:21:1C:9C:5F Fingerprint (SHA1): 0E:F4:80:22:C9:12:70:69:56:6E:A0:70:63:EB:75:8F:8B:0F:ED:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193471 (0x1315c3bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:37 2023 Not After : Mon Mar 20 19:36:37 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:9b:e7:d5:0e:dc:de:46:bf:a3:b1:de:20:c5:dc:d2: 1f:ce:7e:f4:9f:ba:a0:1d:76:fc:3f:b1:2d:71:16:ca: 07:ef:0f:f0:6d:1b:af:58:c2:35:94:ce:d2:c0:06:51: a0:3e:ea:ce:de:fb:db:e5:3f:b1:23:f1:14:62:ac:77: c6:9f:d7:5a:f4:90:c1:61:3a:4c:17:76:e3:52:90:56: b4:20:5f:2f:32:96:f4:66:8e:03:20:93:87:51:54:59: 35:37:5a:2b:33:dd:a3:43:8c:6d:3e:83:d9:7c:79:66: c6:8b:8f:96:c3:93:95:8b:ad:f7:fd:55:ac:23:57:f2: 07:9a:38:ea:fb:d3:e7:11:61:f5:f8:45:4d:67:a7:75: 31:3c:25:a5:6e:39:e4:75:2f:f1:8a:0b:43:bc:b8:21: 23:56:73:14:f6:aa:89:35:19:69:a6:43:b9:13:e6:b1: 59:5c:1c:19:04:0b:84:af:84:75:cc:56:ea:fe:be:c1: 6e:b9:6a:d2:32:3b:f2:71:75:47:c6:88:9d:ca:d7:1d: 54:3a:ba:b5:df:0e:44:4e:8f:9f:a5:37:2d:25:5d:79: 78:f8:c3:e7:5b:6a:76:c6:69:14:01:58:da:6e:dc:b4: 6a:44:70:65:21:2c:18:ce:21:a2:37:8f:c7:b7:a8:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:08:a1:bf:12:6a:45:08:a5:fd:71:d2:73:9f:59:bf: c1:67:2c:cf:4a:11:9f:62:69:50:9b:a5:33:76:2f:65: a0:1f:0d:23:41:a2:93:63:35:12:f2:86:5e:c8:d2:30: 99:c9:f2:e5:2b:93:c3:e4:40:dd:3e:c8:d6:d0:4e:40: 06:6a:1b:b4:ba:d4:dc:d2:97:0d:51:cb:83:13:78:e9: 8a:23:c2:c5:ff:7c:e4:a5:32:b6:2b:b6:43:c7:89:15: ce:4f:ba:54:4d:ca:84:cf:85:74:e9:5d:13:23:77:d7: b5:0d:98:d3:57:8b:ca:19:9a:1b:7c:1f:7b:c9:0b:9b: bf:6e:a6:9d:64:cd:d0:8b:39:c2:69:e7:b0:e8:2e:89: 6c:9d:52:6b:bc:3e:4c:02:67:4c:92:3d:e2:3d:5e:9d: 74:6e:f2:b6:ba:ef:f8:6b:ec:58:e9:73:8b:73:7d:75: cf:76:96:29:78:d6:48:50:a2:52:4d:9c:7e:52:fe:08: 19:16:7b:3a:87:42:69:5a:1d:e0:09:f1:d7:97:34:7c: 84:6b:9a:7f:30:ca:a7:da:59:1a:70:38:3d:9e:4f:a1: 26:76:d2:d5:8b:a9:9c:00:ae:87:3c:50:9c:96:8b:a0: 37:a9:8f:60:c0:09:df:f0:1c:ed:4f:7b:26:04:bd:19 Fingerprint (SHA-256): E6:DC:A6:3B:56:28:B4:3D:85:6B:B6:17:CD:F3:65:98:36:3E:57:E9:4F:43:C0:9A:ED:3A:63:08:85:C5:DA:03 Fingerprint (SHA1): AF:24:5F:4D:B8:4C:62:75:7F:6B:AE:3F:95:2B:DB:12:09:E4:FE:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193472 (0x1315c3c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:36:38 2023 Not After : Mon Mar 20 19:36:38 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:dd:f1:16:9a:96:af:65:42:5b:d4:f7:d8:4a:42:df: 97:ab:f1:56:5d:9f:54:7d:05:6a:0b:94:d2:7d:16:b1: e0:e3:b3:51:ad:9f:bc:52:21:19:12:b0:21:57:eb:69: 6e:c0:c7:dc:d4:c0:e0:09:76:5f:56:08:3e:d1:e3:d6: ea:0d:77:7f:2e:e0:ae:07:cd:d0:2c:64:a1:8f:49:2b: b8:67:af:30:99:ae:da:a8:f0:5c:65:66:6d:45:87:d8: e4:1e:1d:63:a7:70:07:dc:5e:74:7c:f5:48:10:a1:e9: 6d:3f:b1:3a:bd:b6:1b:05:80:7f:0e:b9:94:69:0b:cc: a8:68:a1:e5:f3:39:55:0b:bf:fd:79:ee:f0:f3:10:77: cb:b8:72:67:74:2f:b6:d0:f7:57:a7:6c:ec:ba:c2:4e: bd:ba:41:f5:a3:85:3b:a8:58:cb:a8:37:20:51:c1:09: e6:22:28:68:c1:2c:ed:03:8a:67:31:9f:5b:94:9f:c1: e4:f6:d1:97:51:46:9d:0f:7e:ad:e2:d9:ad:00:3e:c6: 33:74:37:4f:62:bb:4a:7b:b4:91:ed:a2:f4:54:1e:03: 37:9b:44:2a:a9:a0:4f:e0:63:01:00:ce:ed:0d:54:a1: 4b:67:5c:2d:1e:99:6d:40:92:1c:ae:e8:11:36:94:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: f7:d5:b9:a3:32:ee:5e:86:0d:b6:c6:e8:1e:41:f6:4a: 6e:8d:d3:db:db:e6:20:14:97:84:bc:55:9b:f0:fe:95: d5:17:52:3c:55:7a:73:75:1d:c2:6d:97:5b:c9:41:d9: 0a:88:9d:a2:d9:93:dc:6e:80:52:50:3c:9c:7a:a9:45: 40:5d:1d:bb:0f:17:bc:3e:fb:cc:53:06:4b:ef:3b:4b: f0:8b:4d:e7:11:f1:c2:50:62:66:35:15:2e:34:68:1f: 95:a3:08:91:04:be:53:82:09:a7:83:c7:b9:a5:1a:5c: b3:ac:9f:d7:9a:03:85:2a:b9:db:b7:ac:1d:a6:7a:a4: fd:ee:8d:6c:b9:97:ab:68:2b:2b:b0:c2:37:ee:a2:66: 56:ea:1b:e4:aa:32:e2:0c:99:3d:ba:bc:b1:5a:3f:b0: 66:2c:75:a3:81:2f:8a:a6:4d:28:be:ca:21:d9:57:27: ee:3b:ba:29:3e:4d:28:b9:9a:d4:cd:1d:04:ec:4e:61: ac:91:a7:90:05:4b:c4:39:4f:29:01:5d:ad:65:7a:ac: f3:30:a9:84:d0:56:b2:d0:10:98:dc:3c:18:37:69:f2: 82:62:27:50:3e:b4:49:b6:75:ff:1c:31:a1:ea:7a:11: 67:a3:5a:76:86:e9:80:8a:30:68:b3:cb:a8:e7:c6:a5 Fingerprint (SHA-256): 0D:1E:8B:8B:E0:77:C8:7F:6D:4C:49:7E:0A:C0:7F:57:B7:29:4F:4C:1E:45:CB:83:25:FF:D2:FC:57:74:EF:0C Fingerprint (SHA1): 19:4E:68:78:01:43:42:E0:B0:CE:54:53:10:31:ED:C2:8D:6D:15:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193474 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193475 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193476 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 320193477 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 320193478 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193474 (0x1315c3c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:41 2023 Not After : Mon Mar 20 19:36:41 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:aa:b3:68:85:76:84:bb:eb:d0:ea:7b:ae:7a:86:ee: 4d:31:7d:fa:56:64:2e:bd:b9:1a:e6:c2:f8:e7:df:08: db:4f:df:6d:35:9e:f4:0a:00:36:b9:9c:72:4a:9a:3b: c2:1d:80:58:1b:6f:ed:db:56:57:11:63:bd:3a:03:e7: 4e:82:60:7c:65:72:08:bc:cd:37:f9:fb:80:36:7b:06: 01:f3:13:bd:7d:83:58:65:50:33:dc:64:c3:b8:c5:60: e1:08:f1:ae:26:37:f0:51:b2:5b:bc:45:15:b5:66:59: 6e:94:e2:bb:b0:da:0a:31:f3:49:c8:eb:f4:0f:77:44: c6:26:76:39:f4:9e:78:12:4d:98:10:eb:68:80:a9:bf: df:55:b6:a8:f6:db:65:95:1d:55:3d:ee:ad:86:79:20: b8:af:60:e7:29:a2:86:f5:2d:d1:38:b8:34:39:52:f6: 03:ec:f3:bb:55:d5:aa:16:34:16:f1:dc:de:05:ba:77: ef:7b:30:c3:f6:5f:3f:d0:22:c3:7c:2c:9a:0e:f2:f8: df:ba:27:ed:2d:c4:7a:03:aa:7b:0e:d8:c6:2e:ac:d3: a5:d9:06:f5:14:3e:52:32:db:f4:ca:45:e8:76:8e:3b: 6d:b1:87:f8:e8:73:1f:42:2d:ea:6b:21:10:f2:bd:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:3b:3e:49:6f:7b:c1:9b:f9:a0:1e:bc:36:d7:5a:1a: 45:ea:bf:13:09:bd:a5:2b:db:62:48:5f:1a:c4:62:9f: f5:a3:8b:ad:d9:ce:99:d9:bf:af:28:e8:28:d3:4c:74: ce:aa:e1:d7:13:fd:11:a5:56:3e:3d:9c:c0:85:11:ae: 41:0e:98:99:d5:3c:3a:f9:8a:87:89:c2:53:b8:a9:19: 86:cd:b8:1c:ab:41:11:88:97:25:17:94:a9:08:d9:c2: 61:3f:27:f1:11:d3:c5:bb:6f:29:3c:25:b2:16:0f:a9: 53:73:73:09:8e:30:6f:de:d3:1a:8e:18:60:9d:83:1e: 0b:77:e2:77:03:70:33:8d:58:be:1f:19:14:3f:86:91: 49:3e:38:7a:02:f6:b0:34:f8:36:38:1b:70:6e:dc:24: bf:3d:fa:81:f3:77:7e:cf:d7:2f:15:db:04:07:67:00: 9b:51:a9:74:7b:15:7b:78:2d:ee:67:47:d6:4c:53:d3: be:0a:22:13:8f:24:b7:7e:74:a9:c6:53:9d:88:10:d6: 9a:3b:de:57:07:5b:52:f5:6b:90:6c:57:1e:73:77:a7: 1a:21:d9:59:1e:b7:73:d4:30:cc:65:eb:96:ef:20:f0: 1f:bb:60:7d:1b:cc:29:47:a5:1e:aa:1d:54:03:f7:49 Fingerprint (SHA-256): 45:4B:4A:C7:07:49:7A:3C:03:C9:B1:92:A9:3D:70:8E:7B:99:35:FC:DB:28:C1:80:7A:1E:D0:2E:7D:62:47:20 Fingerprint (SHA1): 9C:CD:72:25:56:09:4B:BF:D6:32:DE:A7:C0:C2:D0:6D:68:0A:F7:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193475 (0x1315c3c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:42 2023 Not After : Mon Mar 20 19:36:42 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:e7:64:bb:56:86:cc:37:16:d4:5f:03:69:5f:c0:d1: be:df:70:60:8f:7a:0f:5d:05:7a:92:78:7a:8c:1b:87: 99:df:ee:81:7e:9a:5b:33:d7:fe:7b:ac:24:df:cf:5b: 04:f8:29:bc:39:9d:84:cc:f2:be:4e:b7:d5:df:22:00: a5:5f:c9:f6:b0:f2:46:92:2c:5e:b0:38:1e:ae:0f:37: c0:57:e2:a2:f0:60:f2:b2:e3:22:bd:d1:2a:21:f5:68: 19:df:9e:a6:03:9b:96:49:d6:0f:24:51:91:02:10:53: b7:97:f1:d4:5f:72:d3:20:45:3e:0d:8f:c4:2d:a5:33: 68:be:e0:ac:36:83:92:75:56:76:7c:51:f0:4f:3a:a3: 22:8d:6b:c5:3f:d9:86:64:1a:90:6f:10:e0:c2:90:80: 54:2e:c0:55:23:ff:81:2e:13:b2:ba:f3:09:ca:b3:a7: 23:44:94:82:f3:3d:0a:6a:fb:4c:0b:8e:61:7b:0b:04: 8f:77:79:99:3e:ed:31:e9:e1:09:44:ee:c9:c0:dd:20: d8:85:4a:e6:68:86:6c:68:91:b2:fb:a7:43:ce:0f:54: 26:cd:7d:54:e7:d5:9e:64:91:96:f1:70:ba:22:55:00: c0:18:d4:fa:ff:e5:af:a8:96:0a:20:82:b5:71:a3:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:34:aa:3c:b0:ef:51:ec:bb:c3:fb:d9:3c:db:93:9e: 9a:ad:6d:c2:cf:05:85:b7:9e:47:13:91:4a:10:60:d3: 77:81:ee:90:9b:1f:7a:e3:64:34:c2:9f:78:8f:e3:a8: 2b:e8:5d:65:76:0b:f9:af:a7:ae:3a:1e:e8:67:95:47: 48:3f:91:65:68:79:95:cd:10:d9:85:3c:0b:46:ef:94: ac:df:31:30:59:43:a7:c9:c8:56:fb:a4:7c:2f:02:a8: aa:7a:4a:b0:58:a1:11:fa:f0:56:49:8f:c2:5f:f3:ec: 7e:ed:ca:ae:94:cb:a5:dc:cd:ba:01:4a:6c:31:c9:cd: ca:e0:2c:a1:db:84:3a:a7:9d:0e:27:c1:a9:64:f2:22: 96:18:84:23:0d:4a:5c:0f:23:22:ec:7d:b8:c9:9a:27: 27:3e:fb:48:e8:b9:01:90:72:1f:7a:45:a4:f6:21:8d: ff:20:f7:6a:60:e8:2a:c6:de:09:1b:f8:51:9f:f5:00: ed:7d:17:e8:0a:2d:e0:e2:e5:ff:b4:ba:97:33:9a:05: 4c:3e:d2:ec:6e:69:b5:40:da:29:fc:f6:47:9e:90:02: fe:33:76:d7:08:cd:ae:50:7f:84:8c:c0:8c:4d:36:54: 44:2c:50:2b:4a:c6:10:f4:f4:e4:ac:4d:28:05:50:a5 Fingerprint (SHA-256): 88:F7:EB:D4:43:13:9A:CB:4C:E0:12:67:7B:C4:6A:33:D5:D0:14:D6:9D:FB:53:EF:11:FB:55:D0:FA:CB:3F:E4 Fingerprint (SHA1): 84:34:5B:A2:1B:EF:28:A0:0E:FD:4C:8F:F3:71:A2:DB:94:4B:AF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193476 (0x1315c3c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:36:42 2023 Not After : Mon Mar 20 19:36:42 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:76:a9:69:d0:16:8c:24:9c:c0:f0:3f:c8:4d:21:d5: 15:0d:49:4c:b9:85:b4:7e:bd:de:68:30:0f:7c:3d:e2: 03:6f:5d:ff:da:81:ab:56:0c:fa:37:f2:0c:98:9a:a4: 4c:7d:b8:f2:74:a9:8f:d7:21:7d:26:22:74:51:54:de: 27:58:d4:64:58:f6:dd:5e:a9:f9:82:0b:d1:60:d8:16: c6:d0:c0:13:e7:ab:46:94:ad:3c:3f:62:24:24:89:ac: 72:ae:19:15:d3:60:d0:07:64:6c:fe:d3:ff:01:01:8b: 76:85:ab:98:e2:a2:73:8d:92:c9:e4:a6:fc:7c:fc:f2: e9:c5:88:bf:15:f6:cf:8e:40:dc:43:9a:07:ec:bb:a3: fd:2e:aa:fa:1c:53:24:d5:c4:0b:45:36:25:bc:12:5d: 52:81:ce:41:58:38:7a:d7:b4:94:df:f5:cf:96:46:65: 04:f1:c4:6e:8d:6c:d1:f2:42:4c:b6:6c:d6:04:88:28: 5c:30:b7:0f:a4:3a:94:0a:a9:b6:c0:96:9f:18:93:8b: 69:54:4b:fd:b6:f0:94:9d:69:73:3d:be:96:02:2d:53: 79:c2:52:cc:c8:f4:99:ae:b9:92:96:0a:83:f7:5b:d1: c0:7e:17:7d:93:a5:44:47:98:8d:30:32:7f:09:1a:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:93:8c:1a:9a:e6:1f:0c:ee:4e:ee:b7:a4:11:70:a6: aa:6c:14:d4:fc:61:40:6a:14:64:31:61:a5:b6:a0:81: c2:96:44:b8:0b:e6:f4:d6:9d:85:64:10:52:11:60:3d: 62:17:5e:0f:02:12:2c:b5:25:ea:fb:2b:95:84:24:bf: 6b:de:ee:6e:e4:97:80:78:34:83:a4:f6:95:cd:86:ee: ee:ba:df:a6:cc:24:c1:48:4b:81:a4:d5:67:12:13:24: 29:0e:9d:41:9e:3e:60:1e:2a:e9:2e:9d:bb:71:85:b9: 75:4f:a9:fc:af:d9:61:4d:62:53:45:e4:44:2e:2a:8f: cc:5f:44:25:01:a0:4d:2d:98:3c:a4:46:d0:5f:da:9e: 8e:c5:43:d3:96:ad:34:48:d8:31:76:a8:b2:33:50:61: c8:30:f3:55:59:b6:06:4b:85:b1:ee:37:23:b7:ac:09: cd:14:93:30:4f:d6:9f:c5:66:e2:29:bb:e8:d0:2f:71: 04:5f:98:d2:06:40:30:b5:36:a6:18:8e:ba:01:08:bd: b1:70:4c:d1:e4:59:23:e9:13:bb:34:74:69:27:0a:ce: 92:07:8c:e4:24:d2:ab:d2:27:96:f8:8a:1b:e4:35:6c: 4f:df:c2:d1:3d:14:08:9e:96:46:26:16:a8:9f:24:18 Fingerprint (SHA-256): 56:B4:A9:3A:A1:07:B1:E7:0D:90:DF:EA:17:FC:35:0B:7D:94:F8:A4:68:C9:97:A3:3D:8D:34:5C:F5:65:A7:71 Fingerprint (SHA1): 00:E8:11:3B:AB:54:3E:C8:47:D6:9A:82:EC:84:C8:A2:CE:2E:B3:21 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193479 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193480 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193481 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA1Root-320193242.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320193482 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193479 (0x1315c3c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:36:45 2023 Not After : Mon Mar 20 19:36:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:00:53:46:72:b4:3b:e9:a6:11:8d:6f:7d:37:c2:35: cf:97:1c:ea:5e:4e:99:15:1e:67:2b:86:0b:59:58:2e: 7f:43:70:49:87:2b:45:45:d7:df:96:ff:0c:53:55:4b: fc:24:22:3a:93:a8:13:e0:70:da:65:b7:0d:91:84:f5: 97:f7:fc:8b:3a:23:0f:53:14:ec:fb:ee:58:74:b3:a0: cd:59:f6:c7:a6:3b:1f:be:a8:19:31:32:79:d6:45:34: 7d:b5:11:72:e8:43:4e:55:98:19:98:fa:06:6e:33:8f: b5:09:ac:0f:d0:54:15:ae:2f:f9:0e:b1:2d:66:95:17: 02:a9:60:ff:c6:76:61:14:fc:61:4b:18:ef:a9:6e:3b: 25:0f:e3:c6:6f:66:97:4a:1e:92:fe:4a:73:4c:e8:34: 96:ff:70:0c:ae:04:fe:81:d3:72:61:61:ae:cf:13:f3: 3c:25:7a:89:54:91:ba:0a:cf:2b:74:32:34:93:ff:05: d4:26:06:ea:3a:5b:30:08:2c:06:83:97:88:93:73:8b: 76:2c:19:69:d8:90:cb:f4:c1:69:2f:bb:4f:61:c9:af: d2:a3:eb:97:38:12:81:b3:db:d5:2f:ab:f1:fc:f2:4b: bd:12:ca:11:ee:ec:44:4e:12:52:98:15:5b:6f:3e:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:e6:99:42:04:93:1a:a3:0f:9c:55:dc:ee:a3:93:3f: 84:2d:f2:8f:8b:0b:ad:ba:06:4d:2e:ec:71:9d:e6:d9: 70:19:09:e7:02:06:e4:fe:64:eb:73:d5:10:be:91:0d: e6:2e:7b:04:0c:e8:df:38:78:81:b2:4c:2e:74:99:eb: 2c:8c:b2:96:d9:85:5f:c8:01:1c:c9:c4:c2:f7:c5:a8: 97:fd:82:5f:97:5d:9c:3c:67:24:9b:2b:a1:66:33:8c: b9:67:27:13:5b:24:30:bf:72:69:94:93:8d:0d:33:a2: a4:40:af:36:10:bd:5e:36:cc:04:ee:42:d0:f9:5a:e6: 23:12:f4:fd:15:3b:a0:27:e5:32:dc:c4:e1:42:a0:da: 76:50:b4:40:2a:80:29:ab:d0:8b:4c:34:86:9d:ee:d8: 65:13:ac:b5:0b:4a:97:e5:4b:19:30:f1:e5:54:29:5e: 31:27:e4:dc:5a:a0:19:b9:59:f8:57:15:cc:76:2d:43: 83:2a:0a:42:2d:38:3c:81:c2:e8:bb:83:54:d3:8a:09: 56:67:7b:1a:ab:fc:bb:04:36:82:0b:f5:cd:f6:40:2f: 81:6a:32:fd:20:a3:5e:98:2a:0d:2b:bb:a7:1f:13:53: 3d:a1:90:c0:e8:57:f2:89:43:0b:84:5f:1f:a9:66:43 Fingerprint (SHA-256): 45:A9:FC:D0:C4:73:A9:74:1A:D7:7E:01:92:6E:63:16:70:CD:C1:E3:68:23:83:16:F7:B5:FE:44:C9:41:0C:5C Fingerprint (SHA1): 03:ED:F4:9D:8F:60:85:C4:67:B5:C0:0D:D7:1E:1A:DA:52:6C:68:FB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193483 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193484 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320193485 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320193486 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320193487 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320193243.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193488 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193484 (0x1315c3cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:36:49 2023 Not After : Mon Mar 20 19:36:49 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:da:f1:3e:5f:13:cf:78:4b:50:24:aa:75:18:af:5b: ee:87:8d:52:d3:4b:de:d6:f3:85:08:9e:82:1f:1f:d2: 68:a4:96:c7:c0:7d:63:7b:db:e6:15:e9:d5:28:ca:94: d8:90:32:9e:0b:ff:16:d8:e5:ee:99:fd:2e:3e:62:2e: 27:bd:c5:24:78:00:bc:9e:79:56:a3:72:f5:5b:a8:08: 93:a5:4b:97:5a:66:32:66:0c:51:6e:2d:51:7d:80:fd: d4:e4:21:66:c8:d9:d7:dd:b0:c1:50:47:3f:0f:c0:dc: c8:79:a0:d3:46:e6:07:e4:0b:b6:2a:01:cb:12:a9:88: 06:5f:45:b8:70:c7:55:56:24:88:5b:2f:73:5a:a3:95: 63:47:85:25:e4:86:4a:e4:1b:5b:ec:61:df:8e:b1:e9: e7:c1:f5:79:fc:11:0a:c5:2f:cd:0c:07:62:52:b8:cb: 55:3b:49:24:c0:34:3f:1b:74:35:44:f0:44:be:13:90: ba:60:88:26:59:d4:09:c7:58:6d:1b:19:13:49:fc:fa: b4:07:ab:1c:4f:c3:c3:e3:eb:54:b6:b1:b3:ad:5d:ac: c1:0a:6e:53:15:c4:ec:b6:ee:cf:48:fe:33:fb:b2:b4: 32:81:90:f0:cb:9e:43:d3:af:53:a7:56:29:d3:08:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e5:09:8d:dc:56:e0:d6:ce:a2:3c:3a:46:92:f7:3c: 4d:bf:ee:a7:87:20:98:63:e0:e4:10:40:61:8b:76:29: b9:3c:4a:fe:67:ec:e7:d5:ae:22:a3:d9:15:4b:94:cb: 42:7f:71:c7:e5:da:e8:e2:db:a3:dc:ca:48:f4:95:ca: d3:73:fe:06:ae:09:6e:b2:9e:b5:d9:40:2e:be:dd:99: 49:1b:e4:5b:e1:2b:48:63:68:ca:5a:d8:77:45:ce:4d: 08:14:66:cb:f9:d1:b7:4b:ca:e0:27:87:99:7f:0a:d8: 1e:8b:57:b3:77:8f:d4:8d:36:57:3c:74:61:2f:b1:e5: 87:26:3b:14:25:a1:82:b1:a0:bf:81:42:1c:91:53:76: 4a:b0:7b:69:6d:f7:ab:07:23:44:90:ae:6e:9b:c4:e5: 6c:e1:4a:21:a8:8f:06:83:a9:5a:dd:97:03:c8:96:ec: de:29:ec:e2:e7:71:3a:d6:92:53:09:be:b1:98:7a:d9: 86:8b:1e:14:6e:14:82:06:d7:ef:b0:d5:0d:ae:d5:73: dc:1e:34:30:0b:18:0e:fd:72:dd:8d:3b:ae:35:8d:37: c7:c7:6e:7c:2a:9a:92:c6:e5:98:af:1c:6f:0e:2b:95: 08:c8:a1:c2:c1:f5:d6:e2:63:96:68:c5:40:29:56:f0 Fingerprint (SHA-256): 9D:39:F9:61:0A:03:37:57:70:03:E6:B2:37:B9:AB:00:C3:76:71:D5:34:04:7D:BE:D8:31:6B:CB:A1:4C:48:18 Fingerprint (SHA1): 25:2C:D9:E1:63:AB:9D:78:F8:29:EC:EC:3E:D3:52:BA:86:7F:33:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193484 (0x1315c3cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:36:49 2023 Not After : Mon Mar 20 19:36:49 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:da:f1:3e:5f:13:cf:78:4b:50:24:aa:75:18:af:5b: ee:87:8d:52:d3:4b:de:d6:f3:85:08:9e:82:1f:1f:d2: 68:a4:96:c7:c0:7d:63:7b:db:e6:15:e9:d5:28:ca:94: d8:90:32:9e:0b:ff:16:d8:e5:ee:99:fd:2e:3e:62:2e: 27:bd:c5:24:78:00:bc:9e:79:56:a3:72:f5:5b:a8:08: 93:a5:4b:97:5a:66:32:66:0c:51:6e:2d:51:7d:80:fd: d4:e4:21:66:c8:d9:d7:dd:b0:c1:50:47:3f:0f:c0:dc: c8:79:a0:d3:46:e6:07:e4:0b:b6:2a:01:cb:12:a9:88: 06:5f:45:b8:70:c7:55:56:24:88:5b:2f:73:5a:a3:95: 63:47:85:25:e4:86:4a:e4:1b:5b:ec:61:df:8e:b1:e9: e7:c1:f5:79:fc:11:0a:c5:2f:cd:0c:07:62:52:b8:cb: 55:3b:49:24:c0:34:3f:1b:74:35:44:f0:44:be:13:90: ba:60:88:26:59:d4:09:c7:58:6d:1b:19:13:49:fc:fa: b4:07:ab:1c:4f:c3:c3:e3:eb:54:b6:b1:b3:ad:5d:ac: c1:0a:6e:53:15:c4:ec:b6:ee:cf:48:fe:33:fb:b2:b4: 32:81:90:f0:cb:9e:43:d3:af:53:a7:56:29:d3:08:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e5:09:8d:dc:56:e0:d6:ce:a2:3c:3a:46:92:f7:3c: 4d:bf:ee:a7:87:20:98:63:e0:e4:10:40:61:8b:76:29: b9:3c:4a:fe:67:ec:e7:d5:ae:22:a3:d9:15:4b:94:cb: 42:7f:71:c7:e5:da:e8:e2:db:a3:dc:ca:48:f4:95:ca: d3:73:fe:06:ae:09:6e:b2:9e:b5:d9:40:2e:be:dd:99: 49:1b:e4:5b:e1:2b:48:63:68:ca:5a:d8:77:45:ce:4d: 08:14:66:cb:f9:d1:b7:4b:ca:e0:27:87:99:7f:0a:d8: 1e:8b:57:b3:77:8f:d4:8d:36:57:3c:74:61:2f:b1:e5: 87:26:3b:14:25:a1:82:b1:a0:bf:81:42:1c:91:53:76: 4a:b0:7b:69:6d:f7:ab:07:23:44:90:ae:6e:9b:c4:e5: 6c:e1:4a:21:a8:8f:06:83:a9:5a:dd:97:03:c8:96:ec: de:29:ec:e2:e7:71:3a:d6:92:53:09:be:b1:98:7a:d9: 86:8b:1e:14:6e:14:82:06:d7:ef:b0:d5:0d:ae:d5:73: dc:1e:34:30:0b:18:0e:fd:72:dd:8d:3b:ae:35:8d:37: c7:c7:6e:7c:2a:9a:92:c6:e5:98:af:1c:6f:0e:2b:95: 08:c8:a1:c2:c1:f5:d6:e2:63:96:68:c5:40:29:56:f0 Fingerprint (SHA-256): 9D:39:F9:61:0A:03:37:57:70:03:E6:B2:37:B9:AB:00:C3:76:71:D5:34:04:7D:BE:D8:31:6B:CB:A1:4C:48:18 Fingerprint (SHA1): 25:2C:D9:E1:63:AB:9D:78:F8:29:EC:EC:3E:D3:52:BA:86:7F:33:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193489 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193490 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320193491 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320193492 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320193493 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320193244.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193494 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320193495 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-BridgeNavy-320193245.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320193496 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193490 (0x1315c3d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:36:53 2023 Not After : Mon Mar 20 19:36:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:0b:a7:7f:37:a1:ca:98:b6:12:b4:19:04:57:48:7b: 16:d0:45:15:5a:35:95:69:cf:ab:6a:27:da:c1:ae:c3: 49:8d:58:23:ac:61:a1:13:04:dd:f4:b3:4f:7c:84:4f: 81:88:c0:67:6d:ec:9e:05:a6:f7:63:26:9e:cc:3b:dc: b8:1a:d7:1d:e0:a6:66:d7:fe:7b:b7:f3:7c:75:25:aa: 3c:97:62:6c:5f:82:4e:25:77:67:bb:dd:ee:24:fa:0c: 3f:69:b8:40:5e:0a:e8:c5:49:30:f3:d7:11:eb:85:37: 69:92:8a:41:4a:e2:62:2c:30:1e:fa:a1:2a:dc:92:61: aa:c2:f0:82:fb:de:eb:d2:d2:18:bc:6a:3a:51:c4:53: 0c:28:2e:30:25:56:77:06:5e:17:54:2d:7b:2d:29:90: 1a:44:e8:a4:a1:90:ef:5b:e6:22:a6:af:f7:00:a7:65: c6:79:a8:11:c9:90:79:a3:ed:8f:27:86:1d:c6:9b:b5: eb:11:a2:ee:1d:77:d0:6c:3d:55:ff:39:83:1a:49:b7: b6:b9:4c:0d:0b:b5:d9:54:11:f3:26:cc:8c:5a:7b:7d: 66:c3:ec:82:cd:30:33:47:54:2e:1f:0c:39:f8:42:29: a5:9c:e4:45:10:a2:76:71:ec:1e:a8:87:f8:84:07:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:7c:a5:2b:fa:7b:b0:6a:bc:90:08:20:29:c6:26:31: ab:9e:01:b0:44:e9:b1:f8:6d:4c:8b:12:da:27:cd:56: 95:8b:e9:71:56:ad:61:d2:95:47:39:2f:cb:41:99:08: df:15:82:c2:08:1d:3c:b8:c8:83:c5:af:29:c1:04:d9: fb:a6:7a:d6:65:69:ea:0c:d2:e3:4f:71:30:d1:c2:c7: e8:d9:5e:b3:a0:cf:b7:5e:95:40:10:31:25:2b:31:0a: ac:5d:3e:a6:40:d8:d0:95:a1:17:33:f7:83:d7:ba:af: da:89:ce:df:89:d9:48:03:a5:eb:cf:8f:0f:4e:33:60: 46:b9:8a:1c:26:1c:27:6d:8f:b5:aa:a1:b2:1a:ce:3d: 0c:de:23:3e:98:aa:a2:95:8c:da:0d:ad:fb:a2:7d:67: c6:61:d1:c5:2c:86:2b:ae:29:19:f5:b9:f3:34:c5:8e: 4d:2f:31:33:22:f2:49:48:ff:ec:c8:a3:93:d0:c7:f7: d6:02:3f:b4:c1:71:62:fd:8b:fa:fe:71:dd:d9:97:aa: b2:a3:51:c4:03:7b:fd:f6:17:b5:e0:a9:92:cb:9d:71: 43:83:b9:ad:e0:4c:60:59:c7:3b:a7:9a:65:7f:21:4e: c3:10:ce:b7:9f:03:6a:1b:a5:61:2f:e3:c7:1c:6e:f4 Fingerprint (SHA-256): 33:FA:9B:E2:39:6B:93:52:43:DF:39:1F:4A:EE:BF:A0:9F:5F:0C:61:3F:1E:D0:08:B8:B9:4A:61:FF:90:63:13 Fingerprint (SHA1): 55:B9:FA:DC:9A:99:BE:68:34:DB:5A:D7:95:D8:DB:10:5B:83:41:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193490 (0x1315c3d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:36:53 2023 Not After : Mon Mar 20 19:36:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:0b:a7:7f:37:a1:ca:98:b6:12:b4:19:04:57:48:7b: 16:d0:45:15:5a:35:95:69:cf:ab:6a:27:da:c1:ae:c3: 49:8d:58:23:ac:61:a1:13:04:dd:f4:b3:4f:7c:84:4f: 81:88:c0:67:6d:ec:9e:05:a6:f7:63:26:9e:cc:3b:dc: b8:1a:d7:1d:e0:a6:66:d7:fe:7b:b7:f3:7c:75:25:aa: 3c:97:62:6c:5f:82:4e:25:77:67:bb:dd:ee:24:fa:0c: 3f:69:b8:40:5e:0a:e8:c5:49:30:f3:d7:11:eb:85:37: 69:92:8a:41:4a:e2:62:2c:30:1e:fa:a1:2a:dc:92:61: aa:c2:f0:82:fb:de:eb:d2:d2:18:bc:6a:3a:51:c4:53: 0c:28:2e:30:25:56:77:06:5e:17:54:2d:7b:2d:29:90: 1a:44:e8:a4:a1:90:ef:5b:e6:22:a6:af:f7:00:a7:65: c6:79:a8:11:c9:90:79:a3:ed:8f:27:86:1d:c6:9b:b5: eb:11:a2:ee:1d:77:d0:6c:3d:55:ff:39:83:1a:49:b7: b6:b9:4c:0d:0b:b5:d9:54:11:f3:26:cc:8c:5a:7b:7d: 66:c3:ec:82:cd:30:33:47:54:2e:1f:0c:39:f8:42:29: a5:9c:e4:45:10:a2:76:71:ec:1e:a8:87:f8:84:07:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:7c:a5:2b:fa:7b:b0:6a:bc:90:08:20:29:c6:26:31: ab:9e:01:b0:44:e9:b1:f8:6d:4c:8b:12:da:27:cd:56: 95:8b:e9:71:56:ad:61:d2:95:47:39:2f:cb:41:99:08: df:15:82:c2:08:1d:3c:b8:c8:83:c5:af:29:c1:04:d9: fb:a6:7a:d6:65:69:ea:0c:d2:e3:4f:71:30:d1:c2:c7: e8:d9:5e:b3:a0:cf:b7:5e:95:40:10:31:25:2b:31:0a: ac:5d:3e:a6:40:d8:d0:95:a1:17:33:f7:83:d7:ba:af: da:89:ce:df:89:d9:48:03:a5:eb:cf:8f:0f:4e:33:60: 46:b9:8a:1c:26:1c:27:6d:8f:b5:aa:a1:b2:1a:ce:3d: 0c:de:23:3e:98:aa:a2:95:8c:da:0d:ad:fb:a2:7d:67: c6:61:d1:c5:2c:86:2b:ae:29:19:f5:b9:f3:34:c5:8e: 4d:2f:31:33:22:f2:49:48:ff:ec:c8:a3:93:d0:c7:f7: d6:02:3f:b4:c1:71:62:fd:8b:fa:fe:71:dd:d9:97:aa: b2:a3:51:c4:03:7b:fd:f6:17:b5:e0:a9:92:cb:9d:71: 43:83:b9:ad:e0:4c:60:59:c7:3b:a7:9a:65:7f:21:4e: c3:10:ce:b7:9f:03:6a:1b:a5:61:2f:e3:c7:1c:6e:f4 Fingerprint (SHA-256): 33:FA:9B:E2:39:6B:93:52:43:DF:39:1F:4A:EE:BF:A0:9F:5F:0C:61:3F:1E:D0:08:B8:B9:4A:61:FF:90:63:13 Fingerprint (SHA1): 55:B9:FA:DC:9A:99:BE:68:34:DB:5A:D7:95:D8:DB:10:5B:83:41:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193489 (0x1315c3d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:36:52 2023 Not After : Mon Mar 20 19:36:52 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:af:ac:7b:ff:90:84:5a:b1:38:18:0f:4a:21:5b:a1: 50:a7:d8:a8:d2:ab:76:f4:a1:ce:b3:3f:ce:a5:20:cf: 9b:b0:35:7e:d7:e2:72:3d:fa:78:01:69:be:61:fa:c2: 47:c2:96:c5:56:10:af:1a:8f:b0:75:f2:41:9a:b7:56: 24:7d:1f:d3:90:4c:2b:f4:ab:2e:db:16:97:23:22:f7: 9c:af:a7:8b:1d:fb:c7:df:3d:dd:f5:65:0a:f5:aa:0f: c7:e8:fa:00:a3:49:4e:39:e5:65:24:84:31:6f:0b:90: 08:d3:c3:da:d5:25:27:ca:47:c0:af:cb:22:67:4d:fc: b2:9b:d3:41:f2:35:24:29:d3:16:1f:23:56:67:af:9f: 8b:4f:79:52:a7:3f:37:db:b1:3d:67:26:e8:1d:02:53: 9f:a4:3d:ea:09:ae:f0:48:84:d8:29:95:5e:9d:2e:0d: a1:32:c4:73:8f:cf:51:bf:b4:d1:95:21:7a:03:db:b8: 8f:05:6b:ff:31:38:2b:e5:fc:d8:45:91:89:40:52:9e: da:b7:eb:26:98:b1:12:a4:26:81:2d:0a:6d:2b:0e:1d: a4:1a:b5:04:b8:21:c1:df:34:ea:08:18:95:7e:36:48: c7:62:6b:14:26:b1:ed:79:d5:2a:82:50:5a:6a:ba:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:13:b4:41:bb:51:bf:e6:61:8a:6c:12:a8:74:59:2b: 0c:08:ec:e4:48:eb:74:a7:fa:dc:3d:c1:ad:0a:bf:44: d5:8a:4a:b7:d6:b1:46:77:ea:e4:6a:18:41:e4:0f:b6: 0c:74:50:4e:75:18:da:dc:cc:49:c0:ec:17:13:1f:bd: b7:b3:b4:a8:6c:1e:e9:9a:3b:d6:99:c4:34:4f:d6:e5: e5:e4:e7:29:b1:b3:a2:e2:8d:ca:94:8a:6a:70:69:68: 42:38:1c:48:00:ca:86:2c:ac:ac:c4:19:44:15:bd:e4: 3a:99:7e:14:33:f6:e6:e8:71:f8:dd:77:20:79:59:3e: 24:06:cb:c6:3c:f0:1a:50:1b:e3:f1:7f:9f:15:a1:98: d0:fd:2a:01:c6:bb:01:99:e6:84:59:97:7c:9e:bc:d7: 08:d9:a4:e4:84:f6:82:19:4c:74:ef:35:af:07:36:e7: e3:54:d5:2a:49:e7:48:24:de:a6:7d:28:02:14:1c:d7: d9:5f:70:d2:f5:05:2e:21:2a:51:1a:94:35:99:6b:70: 63:fc:63:a7:dd:9c:97:3d:82:74:cb:78:17:52:48:de: 9d:b8:5e:cf:2c:28:d0:63:e0:2f:20:31:4b:3f:44:5a: 16:26:62:40:96:48:fc:12:84:1a:0c:4c:b6:9a:4e:1f Fingerprint (SHA-256): 42:CF:8B:F8:74:2F:23:18:30:3A:71:44:B3:A1:FE:A9:99:6D:6E:6D:60:D6:95:2E:EC:15:9F:09:4F:9E:B2:6D Fingerprint (SHA1): 3D:49:4E:CD:AB:B6:9B:87:B1:E2:7F:C1:EC:5E:4F:6B:DF:85:DD:BB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193490 (0x1315c3d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:36:53 2023 Not After : Mon Mar 20 19:36:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:0b:a7:7f:37:a1:ca:98:b6:12:b4:19:04:57:48:7b: 16:d0:45:15:5a:35:95:69:cf:ab:6a:27:da:c1:ae:c3: 49:8d:58:23:ac:61:a1:13:04:dd:f4:b3:4f:7c:84:4f: 81:88:c0:67:6d:ec:9e:05:a6:f7:63:26:9e:cc:3b:dc: b8:1a:d7:1d:e0:a6:66:d7:fe:7b:b7:f3:7c:75:25:aa: 3c:97:62:6c:5f:82:4e:25:77:67:bb:dd:ee:24:fa:0c: 3f:69:b8:40:5e:0a:e8:c5:49:30:f3:d7:11:eb:85:37: 69:92:8a:41:4a:e2:62:2c:30:1e:fa:a1:2a:dc:92:61: aa:c2:f0:82:fb:de:eb:d2:d2:18:bc:6a:3a:51:c4:53: 0c:28:2e:30:25:56:77:06:5e:17:54:2d:7b:2d:29:90: 1a:44:e8:a4:a1:90:ef:5b:e6:22:a6:af:f7:00:a7:65: c6:79:a8:11:c9:90:79:a3:ed:8f:27:86:1d:c6:9b:b5: eb:11:a2:ee:1d:77:d0:6c:3d:55:ff:39:83:1a:49:b7: b6:b9:4c:0d:0b:b5:d9:54:11:f3:26:cc:8c:5a:7b:7d: 66:c3:ec:82:cd:30:33:47:54:2e:1f:0c:39:f8:42:29: a5:9c:e4:45:10:a2:76:71:ec:1e:a8:87:f8:84:07:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:7c:a5:2b:fa:7b:b0:6a:bc:90:08:20:29:c6:26:31: ab:9e:01:b0:44:e9:b1:f8:6d:4c:8b:12:da:27:cd:56: 95:8b:e9:71:56:ad:61:d2:95:47:39:2f:cb:41:99:08: df:15:82:c2:08:1d:3c:b8:c8:83:c5:af:29:c1:04:d9: fb:a6:7a:d6:65:69:ea:0c:d2:e3:4f:71:30:d1:c2:c7: e8:d9:5e:b3:a0:cf:b7:5e:95:40:10:31:25:2b:31:0a: ac:5d:3e:a6:40:d8:d0:95:a1:17:33:f7:83:d7:ba:af: da:89:ce:df:89:d9:48:03:a5:eb:cf:8f:0f:4e:33:60: 46:b9:8a:1c:26:1c:27:6d:8f:b5:aa:a1:b2:1a:ce:3d: 0c:de:23:3e:98:aa:a2:95:8c:da:0d:ad:fb:a2:7d:67: c6:61:d1:c5:2c:86:2b:ae:29:19:f5:b9:f3:34:c5:8e: 4d:2f:31:33:22:f2:49:48:ff:ec:c8:a3:93:d0:c7:f7: d6:02:3f:b4:c1:71:62:fd:8b:fa:fe:71:dd:d9:97:aa: b2:a3:51:c4:03:7b:fd:f6:17:b5:e0:a9:92:cb:9d:71: 43:83:b9:ad:e0:4c:60:59:c7:3b:a7:9a:65:7f:21:4e: c3:10:ce:b7:9f:03:6a:1b:a5:61:2f:e3:c7:1c:6e:f4 Fingerprint (SHA-256): 33:FA:9B:E2:39:6B:93:52:43:DF:39:1F:4A:EE:BF:A0:9F:5F:0C:61:3F:1E:D0:08:B8:B9:4A:61:FF:90:63:13 Fingerprint (SHA1): 55:B9:FA:DC:9A:99:BE:68:34:DB:5A:D7:95:D8:DB:10:5B:83:41:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193490 (0x1315c3d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:36:53 2023 Not After : Mon Mar 20 19:36:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:0b:a7:7f:37:a1:ca:98:b6:12:b4:19:04:57:48:7b: 16:d0:45:15:5a:35:95:69:cf:ab:6a:27:da:c1:ae:c3: 49:8d:58:23:ac:61:a1:13:04:dd:f4:b3:4f:7c:84:4f: 81:88:c0:67:6d:ec:9e:05:a6:f7:63:26:9e:cc:3b:dc: b8:1a:d7:1d:e0:a6:66:d7:fe:7b:b7:f3:7c:75:25:aa: 3c:97:62:6c:5f:82:4e:25:77:67:bb:dd:ee:24:fa:0c: 3f:69:b8:40:5e:0a:e8:c5:49:30:f3:d7:11:eb:85:37: 69:92:8a:41:4a:e2:62:2c:30:1e:fa:a1:2a:dc:92:61: aa:c2:f0:82:fb:de:eb:d2:d2:18:bc:6a:3a:51:c4:53: 0c:28:2e:30:25:56:77:06:5e:17:54:2d:7b:2d:29:90: 1a:44:e8:a4:a1:90:ef:5b:e6:22:a6:af:f7:00:a7:65: c6:79:a8:11:c9:90:79:a3:ed:8f:27:86:1d:c6:9b:b5: eb:11:a2:ee:1d:77:d0:6c:3d:55:ff:39:83:1a:49:b7: b6:b9:4c:0d:0b:b5:d9:54:11:f3:26:cc:8c:5a:7b:7d: 66:c3:ec:82:cd:30:33:47:54:2e:1f:0c:39:f8:42:29: a5:9c:e4:45:10:a2:76:71:ec:1e:a8:87:f8:84:07:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:7c:a5:2b:fa:7b:b0:6a:bc:90:08:20:29:c6:26:31: ab:9e:01:b0:44:e9:b1:f8:6d:4c:8b:12:da:27:cd:56: 95:8b:e9:71:56:ad:61:d2:95:47:39:2f:cb:41:99:08: df:15:82:c2:08:1d:3c:b8:c8:83:c5:af:29:c1:04:d9: fb:a6:7a:d6:65:69:ea:0c:d2:e3:4f:71:30:d1:c2:c7: e8:d9:5e:b3:a0:cf:b7:5e:95:40:10:31:25:2b:31:0a: ac:5d:3e:a6:40:d8:d0:95:a1:17:33:f7:83:d7:ba:af: da:89:ce:df:89:d9:48:03:a5:eb:cf:8f:0f:4e:33:60: 46:b9:8a:1c:26:1c:27:6d:8f:b5:aa:a1:b2:1a:ce:3d: 0c:de:23:3e:98:aa:a2:95:8c:da:0d:ad:fb:a2:7d:67: c6:61:d1:c5:2c:86:2b:ae:29:19:f5:b9:f3:34:c5:8e: 4d:2f:31:33:22:f2:49:48:ff:ec:c8:a3:93:d0:c7:f7: d6:02:3f:b4:c1:71:62:fd:8b:fa:fe:71:dd:d9:97:aa: b2:a3:51:c4:03:7b:fd:f6:17:b5:e0:a9:92:cb:9d:71: 43:83:b9:ad:e0:4c:60:59:c7:3b:a7:9a:65:7f:21:4e: c3:10:ce:b7:9f:03:6a:1b:a5:61:2f:e3:c7:1c:6e:f4 Fingerprint (SHA-256): 33:FA:9B:E2:39:6B:93:52:43:DF:39:1F:4A:EE:BF:A0:9F:5F:0C:61:3F:1E:D0:08:B8:B9:4A:61:FF:90:63:13 Fingerprint (SHA1): 55:B9:FA:DC:9A:99:BE:68:34:DB:5A:D7:95:D8:DB:10:5B:83:41:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193497 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193498 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 320193499 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 320193500 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 320193501 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 320193502 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320193503 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320193504 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193505 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320193506 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193497 (0x1315c3d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 19:36:59 2023 Not After : Mon Mar 20 19:36:59 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:35:c0:9f:e0:06:e7:f8:54:3d:fc:2b:0c:c6:99:4e: 4c:9d:88:5e:63:e8:4f:b3:5b:bd:1b:ce:6b:26:72:1e: 92:53:a3:50:4d:b7:a4:83:37:fb:56:07:05:2f:4e:52: 77:5b:a1:4c:92:53:3e:9c:dd:93:78:aa:5f:64:2d:c3: 95:df:00:dd:d9:cb:60:d5:7e:1b:32:95:80:64:92:56: d6:c3:53:82:4d:ad:d2:ca:cf:ff:47:2b:ce:1d:40:65: f2:a8:8a:69:b9:77:08:2f:c0:be:02:c7:e3:9c:4f:e3: 7f:50:d6:30:04:dc:91:b4:f0:40:b5:c0:e0:da:35:7b: 42:2a:2f:f3:c4:43:0f:4b:6f:14:f1:0a:97:58:84:88: 88:6f:02:ab:02:4e:6e:5e:d8:68:29:7b:22:90:7d:af: c5:37:c8:af:11:40:c1:e2:28:c0:1c:47:ff:81:dc:9f: 60:85:65:ae:0e:88:fb:72:c9:42:80:df:28:17:85:c5: da:28:4a:84:14:54:1e:16:63:f5:5e:12:e3:b2:7b:08: 38:7c:5c:51:33:9a:d6:dc:bb:3d:14:7a:49:5e:37:38: 9d:67:56:57:04:23:7e:6f:db:56:f2:85:15:7c:07:fa: 11:1b:0a:4c:80:51:7b:a2:a4:84:be:77:20:01:d9:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:87:c5:40:91:31:6f:ae:03:f9:3f:34:bf:83:e5:00: 1f:13:4a:e1:fc:bb:e3:3f:1d:5b:37:d9:76:c3:1f:97: d1:3f:b2:c7:61:2d:41:0c:0d:cb:a1:f0:86:ce:27:bb: e6:32:62:43:b9:26:05:08:6f:bb:a3:e7:03:31:fa:4f: ae:73:2a:85:3d:5c:99:9a:3a:33:55:0f:ff:02:ca:48: e1:71:10:e6:e0:0b:ce:4a:47:e4:b2:05:54:c4:9c:a2: 24:8c:6a:e7:a2:d5:a6:ef:19:49:2b:2c:47:d1:fd:ef: 26:8a:36:43:47:61:88:79:42:9b:26:19:ca:c9:8f:2f: 6a:e3:4a:c9:ba:a2:09:f4:18:1d:5c:b6:79:40:a6:3a: 37:a2:5b:35:14:1f:93:cb:bd:dc:04:15:f8:6a:44:0a: 25:5a:c6:9c:e2:29:8f:26:ec:ac:0d:bb:c4:c8:9c:7a: e6:7f:a0:b9:dd:47:8b:e5:80:0a:16:08:6f:26:cc:8d: eb:c2:73:55:29:67:c2:17:30:5c:35:45:a1:14:05:ab: d5:87:3d:52:6e:b5:11:0e:4f:c2:2f:74:c8:8a:9d:7d: d1:c6:47:3f:b6:b7:a3:bb:33:40:fe:d6:83:7d:ec:83: b1:e1:f1:01:ed:dd:cd:8a:0d:63:94:6d:5a:b4:f2:7c Fingerprint (SHA-256): 8E:9D:E4:52:6A:4E:E4:A3:A8:5F:D7:A9:44:69:47:90:F8:0E:44:B8:E8:7A:CA:C4:CA:9E:5D:F6:69:A9:F2:53 Fingerprint (SHA1): 3B:BF:F4:35:6C:1E:F5:90:60:73:47:3D:AD:BE:FA:2D:0C:5A:20:4A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193498 (0x1315c3da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 19:37:00 2023 Not After : Mon Mar 20 19:37:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:14:4b:73:e9:9d:82:26:9c:73:08:74:40:32:a4:c8: ec:d3:52:75:68:0f:ea:aa:17:0c:d6:55:d0:ba:91:b5: 3a:f3:96:4a:2b:03:2e:9a:7c:e2:79:9c:b2:1d:f3:51: 49:50:c7:1f:d3:0d:c1:0c:47:5b:a5:b2:37:d9:3c:74: 07:9a:23:4b:13:e5:8b:00:38:7c:b4:e8:b9:45:70:dd: 2a:10:94:ed:d2:2c:ba:1d:5c:d4:22:6f:b7:5e:e5:23: ed:16:6b:6c:03:fa:06:dc:18:0e:e1:d6:32:de:73:71: ae:46:c4:21:c4:6d:e1:1e:a4:6a:b8:15:1e:fa:8c:cb: a3:7d:77:8d:53:8f:da:4d:0f:b4:00:24:40:4a:dc:4d: 7f:54:fb:84:a5:9b:d5:59:ea:46:1d:7a:e5:7f:1e:a9: 30:2e:29:e4:97:b3:22:76:ca:8c:4f:92:5f:74:1d:86: 3e:ae:89:59:80:03:ec:2a:4e:a2:bb:71:13:63:b5:f9: 5f:4a:73:8f:1b:f3:e5:4f:3a:dd:8d:f3:2d:4f:c6:93: 74:1e:86:9b:76:d9:8b:45:18:bd:b1:db:92:90:72:a0: 84:21:b8:38:d7:0e:be:12:67:84:7a:d2:47:60:92:4b: e6:84:0e:d7:b5:74:4f:88:d5:f4:fa:53:7c:3e:b1:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:ab:36:68:c4:1a:f9:3d:eb:7a:e4:aa:95:cc:63:94: 9c:9a:e0:50:67:f9:6d:b3:15:8d:48:df:eb:ca:a8:75: c7:d6:c6:2e:a2:de:85:91:17:04:ac:4d:d6:b9:8f:8a: 4f:d1:5c:68:e5:c4:79:34:a7:78:1d:11:86:ad:13:c5: f5:bc:67:3e:a8:18:63:7d:80:48:6f:c9:ae:35:6a:9f: 03:a6:43:9a:5a:69:8a:09:bb:de:eb:44:a7:50:59:98: 6e:32:be:b6:30:4c:4c:a0:75:c4:06:30:4e:aa:4c:b6: c2:f0:09:59:fb:15:66:5a:c4:47:a4:d4:4b:b1:7b:0c: 9d:0b:80:ce:36:6f:ea:1c:73:1c:4f:2c:57:a0:4f:1e: 66:08:58:20:3b:09:b0:1e:1a:31:97:b4:a6:f7:34:b9: 49:c4:2f:cc:e5:08:82:c8:3b:e1:e7:e7:a6:25:b4:e7: cc:26:49:7d:8d:02:a2:11:a8:3a:40:bf:a4:18:18:03: 3f:e7:0a:65:8d:7f:a8:04:30:9b:14:1d:39:84:c6:02: f7:e1:16:65:d9:5f:29:58:c7:19:3c:77:a4:37:49:3b: 50:28:5b:54:f7:6a:ef:53:22:88:36:13:24:00:a1:27: d6:3e:f1:cb:b8:66:30:e4:97:38:c7:1e:98:ff:83:42 Fingerprint (SHA-256): 22:40:E9:1C:BD:12:BE:DD:AB:AD:75:C5:04:5B:49:88:24:42:84:BF:E8:F4:20:1C:98:B2:76:B9:DC:20:D7:25 Fingerprint (SHA1): BC:2F:97:8B:90:79:CB:1B:FE:18:E7:DC:B8:5C:0C:54:3D:A5:DF:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193507 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320193508 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320193509 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 320193510 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320193511 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 320193512 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 320193513 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 320193514 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 320193515 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193507 (0x1315c3e3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:08 2023 Not After : Mon Mar 20 19:37:08 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:f6:a7:26:17:f1:6d:56:2c:18:b8:52:13:f4:78:fa: 9b:f2:61:3f:a3:8a:ae:55:81:90:1c:d4:d5:80:b2:b2: 7d:b1:d8:ab:f6:28:c6:d7:81:e8:97:77:ec:18:4f:af: 18:78:61:99:40:ca:cb:eb:35:78:f4:f8:f7:19:c1:9d: 71:01:b6:46:a8:a4:fe:00:8f:47:48:bc:df:23:5d:ab: 80:9d:80:45:94:41:8b:80:77:ef:6a:98:eb:d4:24:0c: 31:40:ae:1d:7f:a1:9e:b6:88:8b:ca:5b:85:93:0d:03: 6a:2d:11:54:60:06:77:d7:d7:1c:0f:a1:5d:2f:67:9b: 8c:6d:db:fb:e2:5f:69:c6:ef:e8:ff:45:17:51:57:4c: 48:a2:1f:58:98:93:74:d6:21:a6:d4:74:ad:9b:06:12: d3:7a:62:9e:0e:c5:cc:2e:6e:6f:a0:03:42:71:46:c4: 50:e1:ec:5b:bd:4c:0e:eb:85:eb:a2:ff:05:c7:09:70: df:2e:42:33:53:d7:84:19:02:70:cc:4a:0d:8a:cd:6a: 03:29:fb:af:50:07:88:70:fd:9f:e0:86:7d:e5:b0:17: ca:c5:15:00:75:40:8d:50:d3:28:30:68:7b:d1:c2:43: 8a:28:d7:78:83:d2:08:95:50:87:4a:24:aa:fb:f7:80 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:35:e8:16:63:e1:dd:a8:8e:f0:92:ac:1c: 15:d5:58:f8:03:1d:01:e5:37:b1:34:61:2a:7c:ae:5f: 02:1d:00:c4:f8:d8:2c:d2:08:dc:77:8d:93:29:7a:ca: 20:cd:b2:a9:67:0d:9c:d9:d3:7b:b2:ba:64:46:c2 Fingerprint (SHA-256): A9:BB:07:25:4F:DC:3B:A6:11:09:30:DC:E0:5A:7E:26:3B:F1:A2:90:D3:4B:41:95:F6:5C:70:8C:F6:DF:2F:00 Fingerprint (SHA1): 8D:76:5A:8F:80:61:73:71:0B:58:A8:39:DF:9B:45:A3:A5:D8:70:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193507 (0x1315c3e3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:08 2023 Not After : Mon Mar 20 19:37:08 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:f6:a7:26:17:f1:6d:56:2c:18:b8:52:13:f4:78:fa: 9b:f2:61:3f:a3:8a:ae:55:81:90:1c:d4:d5:80:b2:b2: 7d:b1:d8:ab:f6:28:c6:d7:81:e8:97:77:ec:18:4f:af: 18:78:61:99:40:ca:cb:eb:35:78:f4:f8:f7:19:c1:9d: 71:01:b6:46:a8:a4:fe:00:8f:47:48:bc:df:23:5d:ab: 80:9d:80:45:94:41:8b:80:77:ef:6a:98:eb:d4:24:0c: 31:40:ae:1d:7f:a1:9e:b6:88:8b:ca:5b:85:93:0d:03: 6a:2d:11:54:60:06:77:d7:d7:1c:0f:a1:5d:2f:67:9b: 8c:6d:db:fb:e2:5f:69:c6:ef:e8:ff:45:17:51:57:4c: 48:a2:1f:58:98:93:74:d6:21:a6:d4:74:ad:9b:06:12: d3:7a:62:9e:0e:c5:cc:2e:6e:6f:a0:03:42:71:46:c4: 50:e1:ec:5b:bd:4c:0e:eb:85:eb:a2:ff:05:c7:09:70: df:2e:42:33:53:d7:84:19:02:70:cc:4a:0d:8a:cd:6a: 03:29:fb:af:50:07:88:70:fd:9f:e0:86:7d:e5:b0:17: ca:c5:15:00:75:40:8d:50:d3:28:30:68:7b:d1:c2:43: 8a:28:d7:78:83:d2:08:95:50:87:4a:24:aa:fb:f7:80 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:35:e8:16:63:e1:dd:a8:8e:f0:92:ac:1c: 15:d5:58:f8:03:1d:01:e5:37:b1:34:61:2a:7c:ae:5f: 02:1d:00:c4:f8:d8:2c:d2:08:dc:77:8d:93:29:7a:ca: 20:cd:b2:a9:67:0d:9c:d9:d3:7b:b2:ba:64:46:c2 Fingerprint (SHA-256): A9:BB:07:25:4F:DC:3B:A6:11:09:30:DC:E0:5A:7E:26:3B:F1:A2:90:D3:4B:41:95:F6:5C:70:8C:F6:DF:2F:00 Fingerprint (SHA1): 8D:76:5A:8F:80:61:73:71:0B:58:A8:39:DF:9B:45:A3:A5:D8:70:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193507 (0x1315c3e3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:08 2023 Not After : Mon Mar 20 19:37:08 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:f6:a7:26:17:f1:6d:56:2c:18:b8:52:13:f4:78:fa: 9b:f2:61:3f:a3:8a:ae:55:81:90:1c:d4:d5:80:b2:b2: 7d:b1:d8:ab:f6:28:c6:d7:81:e8:97:77:ec:18:4f:af: 18:78:61:99:40:ca:cb:eb:35:78:f4:f8:f7:19:c1:9d: 71:01:b6:46:a8:a4:fe:00:8f:47:48:bc:df:23:5d:ab: 80:9d:80:45:94:41:8b:80:77:ef:6a:98:eb:d4:24:0c: 31:40:ae:1d:7f:a1:9e:b6:88:8b:ca:5b:85:93:0d:03: 6a:2d:11:54:60:06:77:d7:d7:1c:0f:a1:5d:2f:67:9b: 8c:6d:db:fb:e2:5f:69:c6:ef:e8:ff:45:17:51:57:4c: 48:a2:1f:58:98:93:74:d6:21:a6:d4:74:ad:9b:06:12: d3:7a:62:9e:0e:c5:cc:2e:6e:6f:a0:03:42:71:46:c4: 50:e1:ec:5b:bd:4c:0e:eb:85:eb:a2:ff:05:c7:09:70: df:2e:42:33:53:d7:84:19:02:70:cc:4a:0d:8a:cd:6a: 03:29:fb:af:50:07:88:70:fd:9f:e0:86:7d:e5:b0:17: ca:c5:15:00:75:40:8d:50:d3:28:30:68:7b:d1:c2:43: 8a:28:d7:78:83:d2:08:95:50:87:4a:24:aa:fb:f7:80 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:35:e8:16:63:e1:dd:a8:8e:f0:92:ac:1c: 15:d5:58:f8:03:1d:01:e5:37:b1:34:61:2a:7c:ae:5f: 02:1d:00:c4:f8:d8:2c:d2:08:dc:77:8d:93:29:7a:ca: 20:cd:b2:a9:67:0d:9c:d9:d3:7b:b2:ba:64:46:c2 Fingerprint (SHA-256): A9:BB:07:25:4F:DC:3B:A6:11:09:30:DC:E0:5A:7E:26:3B:F1:A2:90:D3:4B:41:95:F6:5C:70:8C:F6:DF:2F:00 Fingerprint (SHA1): 8D:76:5A:8F:80:61:73:71:0B:58:A8:39:DF:9B:45:A3:A5:D8:70:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193507 (0x1315c3e3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:08 2023 Not After : Mon Mar 20 19:37:08 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:f6:a7:26:17:f1:6d:56:2c:18:b8:52:13:f4:78:fa: 9b:f2:61:3f:a3:8a:ae:55:81:90:1c:d4:d5:80:b2:b2: 7d:b1:d8:ab:f6:28:c6:d7:81:e8:97:77:ec:18:4f:af: 18:78:61:99:40:ca:cb:eb:35:78:f4:f8:f7:19:c1:9d: 71:01:b6:46:a8:a4:fe:00:8f:47:48:bc:df:23:5d:ab: 80:9d:80:45:94:41:8b:80:77:ef:6a:98:eb:d4:24:0c: 31:40:ae:1d:7f:a1:9e:b6:88:8b:ca:5b:85:93:0d:03: 6a:2d:11:54:60:06:77:d7:d7:1c:0f:a1:5d:2f:67:9b: 8c:6d:db:fb:e2:5f:69:c6:ef:e8:ff:45:17:51:57:4c: 48:a2:1f:58:98:93:74:d6:21:a6:d4:74:ad:9b:06:12: d3:7a:62:9e:0e:c5:cc:2e:6e:6f:a0:03:42:71:46:c4: 50:e1:ec:5b:bd:4c:0e:eb:85:eb:a2:ff:05:c7:09:70: df:2e:42:33:53:d7:84:19:02:70:cc:4a:0d:8a:cd:6a: 03:29:fb:af:50:07:88:70:fd:9f:e0:86:7d:e5:b0:17: ca:c5:15:00:75:40:8d:50:d3:28:30:68:7b:d1:c2:43: 8a:28:d7:78:83:d2:08:95:50:87:4a:24:aa:fb:f7:80 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:35:e8:16:63:e1:dd:a8:8e:f0:92:ac:1c: 15:d5:58:f8:03:1d:01:e5:37:b1:34:61:2a:7c:ae:5f: 02:1d:00:c4:f8:d8:2c:d2:08:dc:77:8d:93:29:7a:ca: 20:cd:b2:a9:67:0d:9c:d9:d3:7b:b2:ba:64:46:c2 Fingerprint (SHA-256): A9:BB:07:25:4F:DC:3B:A6:11:09:30:DC:E0:5A:7E:26:3B:F1:A2:90:D3:4B:41:95:F6:5C:70:8C:F6:DF:2F:00 Fingerprint (SHA1): 8D:76:5A:8F:80:61:73:71:0B:58:A8:39:DF:9B:45:A3:A5:D8:70:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320193718Z nextupdate=20240320193718Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 19:37:18 2023 Next Update: Wed Mar 20 19:37:18 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193718Z nextupdate=20240320193718Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:37:18 2023 Next Update: Wed Mar 20 19:37:18 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320193718Z nextupdate=20240320193718Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 19:37:18 2023 Next Update: Wed Mar 20 19:37:18 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320193718Z nextupdate=20240320193718Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 19:37:18 2023 Next Update: Wed Mar 20 19:37:18 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320193719Z addcert 14 20230320193719Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 19:37:19 2023 Next Update: Wed Mar 20 19:37:18 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 20 19:37:19 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193720Z addcert 15 20230320193720Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:37:20 2023 Next Update: Wed Mar 20 19:37:18 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 20 19:37:20 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:13 2023 Not After : Mon Mar 20 19:37:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:f4:73:a2:0d:53:60:e0:8d:15:6b:be:ae:2a:bd:bf: 59:ab:9f:53:e9:b1:55:1d:4a:19:1c:c8:ed:00:93:4e: 3a:88:94:3f:5d:3a:0e:c3:61:27:74:1a:e5:78:e8:24: 85:61:20:21:cd:57:12:56:5a:04:1c:60:e6:24:ad:70: 4f:aa:ec:30:80:b0:ae:5c:c0:d6:ad:f5:3e:d0:67:f2: f4:82:d2:f0:b2:83:69:6b:e2:f4:de:a4:2a:e8:34:55: 73:45:90:e6:d6:f4:15:9a:e5:bf:c4:60:ae:36:47:59: 6f:4b:e6:82:be:87:cc:1f:f1:52:49:fd:15:f0:2e:cd: d7:6e:03:93:7c:52:6a:91:43:cf:da:a6:0d:d9:39:73: a1:6a:92:70:1f:05:22:1a:4a:ed:74:7a:64:e9:62:75: 5a:38:75:b9:6a:86:76:6a:8b:7d:58:45:9f:67:91:19: 97:7a:17:f0:b8:bc:b8:41:30:cd:5a:54:f5:9d:f2:b4: 88:07:68:54:c9:88:e5:5c:f7:89:a4:1a:25:fa:60:0b: 98:cd:b0:10:17:e5:36:98:be:11:63:11:f2:50:a6:f5: 35:1b:f0:06:74:5a:f2:ae:16:f7:9c:4c:76:04:3d:f5: fd:e2:ea:0c:b5:f3:14:a8:8d:aa:fa:de:c4:d7:3b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:1e:c7:5f:82:bd:f4:fd:e3:0d:ca:57:0e:80:d3:8e: 1a:ac:b2:8b:23:83:08:30:91:61:f0:9f:63:61:55:3f: 34:e7:54:e1:47:51:56:a0:f2:64:12:52:f5:ca:d7:15: 84:09:c9:11:af:51:52:e7:9a:6e:fc:d5:f9:c2:ef:20: 23:c3:a0:11:ef:93:19:0a:13:1e:a3:d0:31:c4:85:08: 2f:c2:e9:7d:8f:c4:10:8d:f7:de:b3:1c:98:8d:10:b6: f4:25:64:79:65:5f:59:b0:26:c9:07:4f:af:12:2c:59: a9:de:95:09:b4:b3:44:49:3d:dc:1c:8d:7a:c8:98:a5: d1:94:44:5c:40:cf:05:47:31:db:99:da:00:8b:c3:6d: ff:7d:7e:ed:82:0a:ea:34:e4:a0:8f:8e:92:9d:3a:da: c3:81:de:16:1f:34:27:fb:ca:ca:c6:ca:ba:69:2c:fe: 32:21:e0:78:dd:26:18:db:41:41:31:19:04:47:3a:fe: 4c:3e:00:f7:21:a5:cb:cc:94:31:61:34:a4:27:f6:18: 17:e2:b4:a5:e0:41:14:c0:06:62:0f:84:3d:48:0f:0c: 51:01:8d:e5:83:b2:1b:cf:4b:8c:3d:35:1d:d1:ec:a7: 6f:c8:21:7c:c5:83:1a:65:96:9c:0f:95:e0:2e:62:80 Fingerprint (SHA-256): B8:98:87:54:60:C8:1B:CA:F6:8B:EA:42:17:AE:94:40:3F:01:3A:5D:A3:78:79:D2:04:50:70:0B:0B:B8:15:D3 Fingerprint (SHA1): AA:84:56:B4:36:90:75:78:7E:33:F4:7A:C4:DF:F3:BF:0E:B7:D5:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:13 2023 Not After : Mon Mar 20 19:37:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:f4:73:a2:0d:53:60:e0:8d:15:6b:be:ae:2a:bd:bf: 59:ab:9f:53:e9:b1:55:1d:4a:19:1c:c8:ed:00:93:4e: 3a:88:94:3f:5d:3a:0e:c3:61:27:74:1a:e5:78:e8:24: 85:61:20:21:cd:57:12:56:5a:04:1c:60:e6:24:ad:70: 4f:aa:ec:30:80:b0:ae:5c:c0:d6:ad:f5:3e:d0:67:f2: f4:82:d2:f0:b2:83:69:6b:e2:f4:de:a4:2a:e8:34:55: 73:45:90:e6:d6:f4:15:9a:e5:bf:c4:60:ae:36:47:59: 6f:4b:e6:82:be:87:cc:1f:f1:52:49:fd:15:f0:2e:cd: d7:6e:03:93:7c:52:6a:91:43:cf:da:a6:0d:d9:39:73: a1:6a:92:70:1f:05:22:1a:4a:ed:74:7a:64:e9:62:75: 5a:38:75:b9:6a:86:76:6a:8b:7d:58:45:9f:67:91:19: 97:7a:17:f0:b8:bc:b8:41:30:cd:5a:54:f5:9d:f2:b4: 88:07:68:54:c9:88:e5:5c:f7:89:a4:1a:25:fa:60:0b: 98:cd:b0:10:17:e5:36:98:be:11:63:11:f2:50:a6:f5: 35:1b:f0:06:74:5a:f2:ae:16:f7:9c:4c:76:04:3d:f5: fd:e2:ea:0c:b5:f3:14:a8:8d:aa:fa:de:c4:d7:3b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:1e:c7:5f:82:bd:f4:fd:e3:0d:ca:57:0e:80:d3:8e: 1a:ac:b2:8b:23:83:08:30:91:61:f0:9f:63:61:55:3f: 34:e7:54:e1:47:51:56:a0:f2:64:12:52:f5:ca:d7:15: 84:09:c9:11:af:51:52:e7:9a:6e:fc:d5:f9:c2:ef:20: 23:c3:a0:11:ef:93:19:0a:13:1e:a3:d0:31:c4:85:08: 2f:c2:e9:7d:8f:c4:10:8d:f7:de:b3:1c:98:8d:10:b6: f4:25:64:79:65:5f:59:b0:26:c9:07:4f:af:12:2c:59: a9:de:95:09:b4:b3:44:49:3d:dc:1c:8d:7a:c8:98:a5: d1:94:44:5c:40:cf:05:47:31:db:99:da:00:8b:c3:6d: ff:7d:7e:ed:82:0a:ea:34:e4:a0:8f:8e:92:9d:3a:da: c3:81:de:16:1f:34:27:fb:ca:ca:c6:ca:ba:69:2c:fe: 32:21:e0:78:dd:26:18:db:41:41:31:19:04:47:3a:fe: 4c:3e:00:f7:21:a5:cb:cc:94:31:61:34:a4:27:f6:18: 17:e2:b4:a5:e0:41:14:c0:06:62:0f:84:3d:48:0f:0c: 51:01:8d:e5:83:b2:1b:cf:4b:8c:3d:35:1d:d1:ec:a7: 6f:c8:21:7c:c5:83:1a:65:96:9c:0f:95:e0:2e:62:80 Fingerprint (SHA-256): B8:98:87:54:60:C8:1B:CA:F6:8B:EA:42:17:AE:94:40:3F:01:3A:5D:A3:78:79:D2:04:50:70:0B:0B:B8:15:D3 Fingerprint (SHA1): AA:84:56:B4:36:90:75:78:7E:33:F4:7A:C4:DF:F3:BF:0E:B7:D5:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193516 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 320193517 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193273.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193246.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193273.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 320193518 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193273.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193247.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 320193519 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193273.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193248.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320193273.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320193249.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320193726Z nextupdate=20240320193727Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 19:37:26 2023 Next Update: Wed Mar 20 19:37:27 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193727Z nextupdate=20240320193727Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:37:27 2023 Next Update: Wed Mar 20 19:37:27 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320193727Z nextupdate=20240320193727Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 19:37:27 2023 Next Update: Wed Mar 20 19:37:27 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320193727Z nextupdate=20240320193727Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 19:37:27 2023 Next Update: Wed Mar 20 19:37:27 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193728Z addcert 20 20230320193728Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:37:28 2023 Next Update: Wed Mar 20 19:37:27 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 19:37:28 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320193729Z addcert 40 20230320193729Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 19:37:29 2023 Next Update: Wed Mar 20 19:37:27 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 19:37:28 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 19:37:29 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193516 (0x1315c3ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:21 2023 Not After : Mon Mar 20 19:37:21 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:72:c9:dc:80:5d:a9:e1:e2:3e:17:39:ed:dd:84:c4: a1:73:85:9a:50:dd:98:7e:a1:93:3b:61:54:57:e6:fc: b3:8c:d5:f8:dc:e3:3b:c5:85:02:c7:24:30:ba:a0:92: 33:5d:c1:cc:3a:73:6b:c7:4d:9c:86:a5:4e:58:b7:87: b4:db:b0:c3:d9:1f:b9:28:1d:d2:bc:1f:10:06:32:0e: bb:43:b5:d6:5d:80:07:33:12:e9:25:94:cc:b7:6f:3c: 54:72:81:44:b5:ef:ce:6e:b0:fd:aa:22:dc:0b:3d:18: 65:e6:b8:bb:bb:00:08:db:10:c5:c5:68:56:e4:15:3c: 43:89:a5:b9:cf:0d:63:ed:7f:cb:46:81:53:c4:2b:87: ac:10:76:21:e9:5d:26:80:e1:f0:27:8c:10:97:29:6c: 08:1a:16:54:6c:1d:c6:e4:97:2d:3c:6a:b2:bc:64:7f: 43:e9:8c:a3:18:98:80:c4:14:7b:47:81:ba:77:20:29: 85:21:a4:ed:86:f4:e8:4f:ee:e2:70:eb:48:f4:e5:91: 44:e5:1a:31:94:5b:de:d7:16:f4:7f:51:4e:96:6b:a1: 88:74:22:54:5d:af:3f:f6:ec:91:1f:80:88:f4:1c:3c: 90:f3:14:5a:a3:d6:57:77:21:48:5b:61:aa:ff:7e:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:f1:e2:be:68:9d:3f:29:cf:2d:56:e8:d1:e2:34:1c: 22:1c:a2:dd:1c:ab:50:f5:2c:af:c1:d8:7d:c4:6f:6f: c2:29:46:60:92:5a:8b:10:55:5d:bf:bb:92:24:4a:24: b8:f1:05:ab:82:ac:32:fb:8e:42:a4:7e:fa:d0:c1:c3: 3b:ab:ef:09:59:ff:31:6e:f2:81:fe:1b:1d:43:93:9e: c5:28:23:35:d5:96:c3:7b:af:44:07:04:d1:5e:4d:c8: dd:f0:9a:30:a8:8f:40:4a:e8:21:90:a9:e6:51:86:c1: b9:ad:62:8b:81:84:ee:ea:e9:41:a1:0d:d7:1b:73:f8: 3d:df:d9:de:53:97:2e:0a:f1:f4:97:49:10:4f:33:67: a2:a7:91:25:1f:7a:a3:14:67:47:c0:1c:55:92:ee:a8: 70:b9:81:bd:66:ef:1e:53:53:73:b2:0a:be:5d:03:2e: 91:a2:35:10:5f:b3:dd:a8:18:8d:ef:f3:f0:b1:4c:44: a1:4d:1f:0d:1f:47:45:40:c1:83:c7:2f:db:5b:b5:07: a2:e3:31:53:d0:af:70:bd:08:e0:3e:cd:b8:8f:2e:5b: 88:99:05:cf:db:e4:bd:b2:c4:04:41:8c:b8:c6:ff:e7: 76:85:d7:59:2d:ee:1e:41:e8:6f:6e:51:fe:70:3f:a1 Fingerprint (SHA-256): 1F:E5:13:15:A8:FB:87:6F:E0:6F:FF:88:35:A6:B5:E7:CD:28:A6:6B:E6:93:6B:35:5F:ED:B2:1B:74:76:3C:0E Fingerprint (SHA1): 86:17:73:6F:3A:48:06:96:FF:3D:77:70:01:8D:A7:5E:55:F5:10:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193516 (0x1315c3ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 19:37:21 2023 Not After : Mon Mar 20 19:37:21 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:72:c9:dc:80:5d:a9:e1:e2:3e:17:39:ed:dd:84:c4: a1:73:85:9a:50:dd:98:7e:a1:93:3b:61:54:57:e6:fc: b3:8c:d5:f8:dc:e3:3b:c5:85:02:c7:24:30:ba:a0:92: 33:5d:c1:cc:3a:73:6b:c7:4d:9c:86:a5:4e:58:b7:87: b4:db:b0:c3:d9:1f:b9:28:1d:d2:bc:1f:10:06:32:0e: bb:43:b5:d6:5d:80:07:33:12:e9:25:94:cc:b7:6f:3c: 54:72:81:44:b5:ef:ce:6e:b0:fd:aa:22:dc:0b:3d:18: 65:e6:b8:bb:bb:00:08:db:10:c5:c5:68:56:e4:15:3c: 43:89:a5:b9:cf:0d:63:ed:7f:cb:46:81:53:c4:2b:87: ac:10:76:21:e9:5d:26:80:e1:f0:27:8c:10:97:29:6c: 08:1a:16:54:6c:1d:c6:e4:97:2d:3c:6a:b2:bc:64:7f: 43:e9:8c:a3:18:98:80:c4:14:7b:47:81:ba:77:20:29: 85:21:a4:ed:86:f4:e8:4f:ee:e2:70:eb:48:f4:e5:91: 44:e5:1a:31:94:5b:de:d7:16:f4:7f:51:4e:96:6b:a1: 88:74:22:54:5d:af:3f:f6:ec:91:1f:80:88:f4:1c:3c: 90:f3:14:5a:a3:d6:57:77:21:48:5b:61:aa:ff:7e:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:f1:e2:be:68:9d:3f:29:cf:2d:56:e8:d1:e2:34:1c: 22:1c:a2:dd:1c:ab:50:f5:2c:af:c1:d8:7d:c4:6f:6f: c2:29:46:60:92:5a:8b:10:55:5d:bf:bb:92:24:4a:24: b8:f1:05:ab:82:ac:32:fb:8e:42:a4:7e:fa:d0:c1:c3: 3b:ab:ef:09:59:ff:31:6e:f2:81:fe:1b:1d:43:93:9e: c5:28:23:35:d5:96:c3:7b:af:44:07:04:d1:5e:4d:c8: dd:f0:9a:30:a8:8f:40:4a:e8:21:90:a9:e6:51:86:c1: b9:ad:62:8b:81:84:ee:ea:e9:41:a1:0d:d7:1b:73:f8: 3d:df:d9:de:53:97:2e:0a:f1:f4:97:49:10:4f:33:67: a2:a7:91:25:1f:7a:a3:14:67:47:c0:1c:55:92:ee:a8: 70:b9:81:bd:66:ef:1e:53:53:73:b2:0a:be:5d:03:2e: 91:a2:35:10:5f:b3:dd:a8:18:8d:ef:f3:f0:b1:4c:44: a1:4d:1f:0d:1f:47:45:40:c1:83:c7:2f:db:5b:b5:07: a2:e3:31:53:d0:af:70:bd:08:e0:3e:cd:b8:8f:2e:5b: 88:99:05:cf:db:e4:bd:b2:c4:04:41:8c:b8:c6:ff:e7: 76:85:d7:59:2d:ee:1e:41:e8:6f:6e:51:fe:70:3f:a1 Fingerprint (SHA-256): 1F:E5:13:15:A8:FB:87:6F:E0:6F:FF:88:35:A6:B5:E7:CD:28:A6:6B:E6:93:6B:35:5F:ED:B2:1B:74:76:3C:0E Fingerprint (SHA1): 86:17:73:6F:3A:48:06:96:FF:3D:77:70:01:8D:A7:5E:55:F5:10:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193520 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320193521 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320193522 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 320193523 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 320193524 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 320193525 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 320193526 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193520 (0x1315c3f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:37:30 2023 Not After : Mon Mar 20 19:37:30 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b6:e0:7f:3f:52:9b:3b:b6:78:bb:8d:4e:e3:9b:18: 9f:e7:85:af:2f:1b:e7:00:cc:02:de:ea:7d:31:90:9d: 39:5d:89:cd:da:c3:bb:78:7d:4e:dc:7c:24:58:c0:b1: 4d:f8:41:b1:bf:aa:a0:a2:9c:bc:b2:d8:9b:67:0b:89: e6:6d:e8:4f:7c:d2:6a:8c:ca:ea:12:af:33:36:8b:8f: 49:16:26:69:62:1b:71:95:c2:34:07:c3:0a:c7:ad:03: c2:c6:b1:1f:39:fc:78:80:e5:8e:76:8c:5e:37:42:18: ab:3e:30:12:ad:c6:bd:72:74:dd:d4:e9:52:97:da:21: 18:e9:42:f2:98:4c:62:62:52:e1:52:f4:75:61:6d:ae: 41:98:77:41:6d:6f:26:c0:2c:d6:da:4e:16:2c:90:d4: 63:6f:45:27:1f:b2:5f:b3:70:08:4e:13:05:0f:ac:4c: c2:77:33:9d:25:4a:cc:8a:1d:6f:de:3b:92:88:d7:97: f8:45:f1:e9:6b:66:e5:2b:c7:e1:33:61:f0:29:0b:e8: 05:87:fb:5d:42:cc:94:f2:12:3e:9c:63:ba:53:31:dd: d0:05:11:27:51:b1:4e:84:f6:9c:72:88:02:ad:62:c4: 64:cc:40:cc:ee:c1:8d:fd:02:6b:19:19:f2:09:e9:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ed:3d:2d:8e:da:f6:fa:97:61:d1:08:8f:0d:6f:35: fb:dc:b0:f4:c1:7e:3e:94:5b:60:80:d0:9f:d5:00:f7: 5e:4a:0b:db:4e:42:bd:ee:50:06:a1:72:ed:60:91:b7: e6:2d:d4:39:2a:e4:48:bd:8f:8a:3b:0c:e9:15:9d:58: 68:37:bd:e1:04:1f:16:bf:e5:7d:8e:61:80:e2:ea:bb: 2f:c8:51:4c:49:b0:e3:97:44:f4:44:98:cd:f4:1f:00: 8a:93:25:16:c8:51:40:f8:7a:5c:d6:c0:f4:b1:29:0d: 87:46:c2:28:2b:2c:ff:68:ec:98:5f:de:fd:67:30:75: 4e:70:17:af:17:b0:53:93:38:e4:e7:c3:a6:bd:c3:5f: ab:0d:27:5b:06:53:6a:bd:14:8d:a0:0d:de:78:9c:e4: 95:a1:84:3f:86:1b:03:68:22:83:7e:bc:d5:86:a4:8d: 39:77:65:cb:15:f2:01:fc:c1:c5:0d:97:d8:48:ef:35: ae:f6:32:2c:7d:f7:7e:54:45:1c:15:82:eb:65:99:d3: 84:de:29:27:8e:c9:c3:25:26:10:7b:53:76:ea:3d:e0: d1:43:88:7d:1a:b3:a8:bf:cf:76:7d:3a:8f:5e:b0:e1: c4:ef:96:0e:c9:bc:2e:ad:90:72:f3:18:28:52:f5:8f Fingerprint (SHA-256): 7A:5A:D1:DD:EE:C4:64:05:81:0E:F2:0A:E5:A6:CD:1C:D0:10:3A:C8:C5:8D:37:95:7C:4F:4F:DB:7F:B1:72:8F Fingerprint (SHA1): C6:09:3C:2C:88:47:91:0B:36:91:B4:C3:29:E9:9F:8B:F3:27:B5:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193522 (0x1315c3f2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:37:32 2023 Not After : Mon Mar 20 19:37:32 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:ad:bb:8e:a0:aa:e3:fd:eb:38:6c:bc:95:50:44:da: 2a:44:18:c8:af:2e:9b:72:8c:5e:83:92:7f:52:34:da: f5:bc:93:97:cc:e4:f7:8e:af:6b:2e:12:bf:2b:8c:aa: e0:c1:04:1b:50:cb:5d:4c:22:4c:1e:35:87:99:cc:33: 7c:67:d9:f2:b7:0e:8c:4a:68:37:25:92:74:7c:55:5e: 81:07:ab:50:a2:3c:78:ad:94:34:70:d4:cd:d5:2c:fa: 0a:5b:97:40:81:07:62:fe:37:9e:8e:dd:35:0c:d4:14: cb:6d:3b:08:34:ab:20:21:d7:de:6e:fc:09:73:45:87: f7:83:97:b7:ce:01:58:b0:29:66:7a:e9:10:4b:f6:9c: 12:83:ef:d1:f4:6a:5a:85:6d:e3:58:15:81:c6:e1:94: b9:4d:aa:bb:98:da:ff:fc:47:28:d8:0f:df:3a:2d:ac: 60:5e:76:ce:c9:d3:89:45:ca:46:99:27:97:9b:61:b6: 70:b4:8a:d0:0d:8e:a8:98:09:c8:c4:0f:f4:c6:9e:46: 12:a2:c3:c4:eb:7f:8b:d1:c5:56:77:6e:d9:36:3d:5a: 43:e6:96:e8:70:d6:6d:b4:09:bb:55:d5:8e:9a:b3:39: 06:52:0e:81:09:f3:18:44:c6:91:a2:2b:60:3f:9b:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:61:08:56:3e:df:f6:69:2e:df:24:c8:78:5b:2d:fb: 4c:55:fb:c7:a4:52:85:8f:ef:8e:af:c7:e9:13:5e:10: e8:14:90:df:cd:15:22:62:06:86:56:90:95:87:87:5a: 05:91:9e:62:76:bc:44:ef:13:0e:fc:ab:e6:b7:a2:f6: 5b:8f:50:31:68:63:59:5a:da:44:8b:ef:f6:e3:86:75: eb:1f:3a:7e:ab:c9:3d:36:4b:61:e6:82:c9:40:30:c9: 88:dd:e8:b9:c1:cf:0d:b3:c1:4b:d0:10:c1:ce:4c:81: 43:e6:ef:e4:d6:b1:08:8a:39:1f:e3:a6:5d:a6:ba:f8: de:99:85:0d:c6:ad:ac:a6:45:9d:64:c9:2e:ee:dc:bd: c2:c9:5d:7d:eb:1d:b0:9a:f7:84:5e:1f:b5:a7:f5:7c: 06:e1:e5:16:f3:86:75:39:30:ad:e9:64:8f:fe:cb:8d: 55:dc:2c:6b:90:a5:63:e6:09:54:13:06:cb:c9:f5:44: 27:23:1b:a7:8e:19:76:f2:24:95:5e:0d:ff:81:d7:49: e0:5c:c0:ed:2d:ff:ae:e5:49:81:93:0f:44:41:e3:95: c1:a1:69:9b:53:ab:77:25:49:90:21:da:eb:1a:0f:36: 95:86:03:e8:90:21:f9:5a:de:ba:c9:09:84:c5:54:e8 Fingerprint (SHA-256): EA:65:14:D0:44:39:AB:75:A1:0B:9A:A6:D5:2E:00:CF:87:4C:C9:51:05:60:DC:52:3D:9B:1D:81:46:12:D4:93 Fingerprint (SHA1): 08:27:EF:02:1D:0D:F5:1B:71:38:1C:EA:D3:26:AD:CD:E9:78:68:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193520 (0x1315c3f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:37:30 2023 Not After : Mon Mar 20 19:37:30 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b6:e0:7f:3f:52:9b:3b:b6:78:bb:8d:4e:e3:9b:18: 9f:e7:85:af:2f:1b:e7:00:cc:02:de:ea:7d:31:90:9d: 39:5d:89:cd:da:c3:bb:78:7d:4e:dc:7c:24:58:c0:b1: 4d:f8:41:b1:bf:aa:a0:a2:9c:bc:b2:d8:9b:67:0b:89: e6:6d:e8:4f:7c:d2:6a:8c:ca:ea:12:af:33:36:8b:8f: 49:16:26:69:62:1b:71:95:c2:34:07:c3:0a:c7:ad:03: c2:c6:b1:1f:39:fc:78:80:e5:8e:76:8c:5e:37:42:18: ab:3e:30:12:ad:c6:bd:72:74:dd:d4:e9:52:97:da:21: 18:e9:42:f2:98:4c:62:62:52:e1:52:f4:75:61:6d:ae: 41:98:77:41:6d:6f:26:c0:2c:d6:da:4e:16:2c:90:d4: 63:6f:45:27:1f:b2:5f:b3:70:08:4e:13:05:0f:ac:4c: c2:77:33:9d:25:4a:cc:8a:1d:6f:de:3b:92:88:d7:97: f8:45:f1:e9:6b:66:e5:2b:c7:e1:33:61:f0:29:0b:e8: 05:87:fb:5d:42:cc:94:f2:12:3e:9c:63:ba:53:31:dd: d0:05:11:27:51:b1:4e:84:f6:9c:72:88:02:ad:62:c4: 64:cc:40:cc:ee:c1:8d:fd:02:6b:19:19:f2:09:e9:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ed:3d:2d:8e:da:f6:fa:97:61:d1:08:8f:0d:6f:35: fb:dc:b0:f4:c1:7e:3e:94:5b:60:80:d0:9f:d5:00:f7: 5e:4a:0b:db:4e:42:bd:ee:50:06:a1:72:ed:60:91:b7: e6:2d:d4:39:2a:e4:48:bd:8f:8a:3b:0c:e9:15:9d:58: 68:37:bd:e1:04:1f:16:bf:e5:7d:8e:61:80:e2:ea:bb: 2f:c8:51:4c:49:b0:e3:97:44:f4:44:98:cd:f4:1f:00: 8a:93:25:16:c8:51:40:f8:7a:5c:d6:c0:f4:b1:29:0d: 87:46:c2:28:2b:2c:ff:68:ec:98:5f:de:fd:67:30:75: 4e:70:17:af:17:b0:53:93:38:e4:e7:c3:a6:bd:c3:5f: ab:0d:27:5b:06:53:6a:bd:14:8d:a0:0d:de:78:9c:e4: 95:a1:84:3f:86:1b:03:68:22:83:7e:bc:d5:86:a4:8d: 39:77:65:cb:15:f2:01:fc:c1:c5:0d:97:d8:48:ef:35: ae:f6:32:2c:7d:f7:7e:54:45:1c:15:82:eb:65:99:d3: 84:de:29:27:8e:c9:c3:25:26:10:7b:53:76:ea:3d:e0: d1:43:88:7d:1a:b3:a8:bf:cf:76:7d:3a:8f:5e:b0:e1: c4:ef:96:0e:c9:bc:2e:ad:90:72:f3:18:28:52:f5:8f Fingerprint (SHA-256): 7A:5A:D1:DD:EE:C4:64:05:81:0E:F2:0A:E5:A6:CD:1C:D0:10:3A:C8:C5:8D:37:95:7C:4F:4F:DB:7F:B1:72:8F Fingerprint (SHA1): C6:09:3C:2C:88:47:91:0B:36:91:B4:C3:29:E9:9F:8B:F3:27:B5:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193520 (0x1315c3f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:37:30 2023 Not After : Mon Mar 20 19:37:30 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b6:e0:7f:3f:52:9b:3b:b6:78:bb:8d:4e:e3:9b:18: 9f:e7:85:af:2f:1b:e7:00:cc:02:de:ea:7d:31:90:9d: 39:5d:89:cd:da:c3:bb:78:7d:4e:dc:7c:24:58:c0:b1: 4d:f8:41:b1:bf:aa:a0:a2:9c:bc:b2:d8:9b:67:0b:89: e6:6d:e8:4f:7c:d2:6a:8c:ca:ea:12:af:33:36:8b:8f: 49:16:26:69:62:1b:71:95:c2:34:07:c3:0a:c7:ad:03: c2:c6:b1:1f:39:fc:78:80:e5:8e:76:8c:5e:37:42:18: ab:3e:30:12:ad:c6:bd:72:74:dd:d4:e9:52:97:da:21: 18:e9:42:f2:98:4c:62:62:52:e1:52:f4:75:61:6d:ae: 41:98:77:41:6d:6f:26:c0:2c:d6:da:4e:16:2c:90:d4: 63:6f:45:27:1f:b2:5f:b3:70:08:4e:13:05:0f:ac:4c: c2:77:33:9d:25:4a:cc:8a:1d:6f:de:3b:92:88:d7:97: f8:45:f1:e9:6b:66:e5:2b:c7:e1:33:61:f0:29:0b:e8: 05:87:fb:5d:42:cc:94:f2:12:3e:9c:63:ba:53:31:dd: d0:05:11:27:51:b1:4e:84:f6:9c:72:88:02:ad:62:c4: 64:cc:40:cc:ee:c1:8d:fd:02:6b:19:19:f2:09:e9:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ed:3d:2d:8e:da:f6:fa:97:61:d1:08:8f:0d:6f:35: fb:dc:b0:f4:c1:7e:3e:94:5b:60:80:d0:9f:d5:00:f7: 5e:4a:0b:db:4e:42:bd:ee:50:06:a1:72:ed:60:91:b7: e6:2d:d4:39:2a:e4:48:bd:8f:8a:3b:0c:e9:15:9d:58: 68:37:bd:e1:04:1f:16:bf:e5:7d:8e:61:80:e2:ea:bb: 2f:c8:51:4c:49:b0:e3:97:44:f4:44:98:cd:f4:1f:00: 8a:93:25:16:c8:51:40:f8:7a:5c:d6:c0:f4:b1:29:0d: 87:46:c2:28:2b:2c:ff:68:ec:98:5f:de:fd:67:30:75: 4e:70:17:af:17:b0:53:93:38:e4:e7:c3:a6:bd:c3:5f: ab:0d:27:5b:06:53:6a:bd:14:8d:a0:0d:de:78:9c:e4: 95:a1:84:3f:86:1b:03:68:22:83:7e:bc:d5:86:a4:8d: 39:77:65:cb:15:f2:01:fc:c1:c5:0d:97:d8:48:ef:35: ae:f6:32:2c:7d:f7:7e:54:45:1c:15:82:eb:65:99:d3: 84:de:29:27:8e:c9:c3:25:26:10:7b:53:76:ea:3d:e0: d1:43:88:7d:1a:b3:a8:bf:cf:76:7d:3a:8f:5e:b0:e1: c4:ef:96:0e:c9:bc:2e:ad:90:72:f3:18:28:52:f5:8f Fingerprint (SHA-256): 7A:5A:D1:DD:EE:C4:64:05:81:0E:F2:0A:E5:A6:CD:1C:D0:10:3A:C8:C5:8D:37:95:7C:4F:4F:DB:7F:B1:72:8F Fingerprint (SHA1): C6:09:3C:2C:88:47:91:0B:36:91:B4:C3:29:E9:9F:8B:F3:27:B5:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193522 (0x1315c3f2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 19:37:32 2023 Not After : Mon Mar 20 19:37:32 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:ad:bb:8e:a0:aa:e3:fd:eb:38:6c:bc:95:50:44:da: 2a:44:18:c8:af:2e:9b:72:8c:5e:83:92:7f:52:34:da: f5:bc:93:97:cc:e4:f7:8e:af:6b:2e:12:bf:2b:8c:aa: e0:c1:04:1b:50:cb:5d:4c:22:4c:1e:35:87:99:cc:33: 7c:67:d9:f2:b7:0e:8c:4a:68:37:25:92:74:7c:55:5e: 81:07:ab:50:a2:3c:78:ad:94:34:70:d4:cd:d5:2c:fa: 0a:5b:97:40:81:07:62:fe:37:9e:8e:dd:35:0c:d4:14: cb:6d:3b:08:34:ab:20:21:d7:de:6e:fc:09:73:45:87: f7:83:97:b7:ce:01:58:b0:29:66:7a:e9:10:4b:f6:9c: 12:83:ef:d1:f4:6a:5a:85:6d:e3:58:15:81:c6:e1:94: b9:4d:aa:bb:98:da:ff:fc:47:28:d8:0f:df:3a:2d:ac: 60:5e:76:ce:c9:d3:89:45:ca:46:99:27:97:9b:61:b6: 70:b4:8a:d0:0d:8e:a8:98:09:c8:c4:0f:f4:c6:9e:46: 12:a2:c3:c4:eb:7f:8b:d1:c5:56:77:6e:d9:36:3d:5a: 43:e6:96:e8:70:d6:6d:b4:09:bb:55:d5:8e:9a:b3:39: 06:52:0e:81:09:f3:18:44:c6:91:a2:2b:60:3f:9b:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:61:08:56:3e:df:f6:69:2e:df:24:c8:78:5b:2d:fb: 4c:55:fb:c7:a4:52:85:8f:ef:8e:af:c7:e9:13:5e:10: e8:14:90:df:cd:15:22:62:06:86:56:90:95:87:87:5a: 05:91:9e:62:76:bc:44:ef:13:0e:fc:ab:e6:b7:a2:f6: 5b:8f:50:31:68:63:59:5a:da:44:8b:ef:f6:e3:86:75: eb:1f:3a:7e:ab:c9:3d:36:4b:61:e6:82:c9:40:30:c9: 88:dd:e8:b9:c1:cf:0d:b3:c1:4b:d0:10:c1:ce:4c:81: 43:e6:ef:e4:d6:b1:08:8a:39:1f:e3:a6:5d:a6:ba:f8: de:99:85:0d:c6:ad:ac:a6:45:9d:64:c9:2e:ee:dc:bd: c2:c9:5d:7d:eb:1d:b0:9a:f7:84:5e:1f:b5:a7:f5:7c: 06:e1:e5:16:f3:86:75:39:30:ad:e9:64:8f:fe:cb:8d: 55:dc:2c:6b:90:a5:63:e6:09:54:13:06:cb:c9:f5:44: 27:23:1b:a7:8e:19:76:f2:24:95:5e:0d:ff:81:d7:49: e0:5c:c0:ed:2d:ff:ae:e5:49:81:93:0f:44:41:e3:95: c1:a1:69:9b:53:ab:77:25:49:90:21:da:eb:1a:0f:36: 95:86:03:e8:90:21:f9:5a:de:ba:c9:09:84:c5:54:e8 Fingerprint (SHA-256): EA:65:14:D0:44:39:AB:75:A1:0B:9A:A6:D5:2E:00:CF:87:4C:C9:51:05:60:DC:52:3D:9B:1D:81:46:12:D4:93 Fingerprint (SHA1): 08:27:EF:02:1D:0D:F5:1B:71:38:1C:EA:D3:26:AD:CD:E9:78:68:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193520 (0x1315c3f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:37:30 2023 Not After : Mon Mar 20 19:37:30 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b6:e0:7f:3f:52:9b:3b:b6:78:bb:8d:4e:e3:9b:18: 9f:e7:85:af:2f:1b:e7:00:cc:02:de:ea:7d:31:90:9d: 39:5d:89:cd:da:c3:bb:78:7d:4e:dc:7c:24:58:c0:b1: 4d:f8:41:b1:bf:aa:a0:a2:9c:bc:b2:d8:9b:67:0b:89: e6:6d:e8:4f:7c:d2:6a:8c:ca:ea:12:af:33:36:8b:8f: 49:16:26:69:62:1b:71:95:c2:34:07:c3:0a:c7:ad:03: c2:c6:b1:1f:39:fc:78:80:e5:8e:76:8c:5e:37:42:18: ab:3e:30:12:ad:c6:bd:72:74:dd:d4:e9:52:97:da:21: 18:e9:42:f2:98:4c:62:62:52:e1:52:f4:75:61:6d:ae: 41:98:77:41:6d:6f:26:c0:2c:d6:da:4e:16:2c:90:d4: 63:6f:45:27:1f:b2:5f:b3:70:08:4e:13:05:0f:ac:4c: c2:77:33:9d:25:4a:cc:8a:1d:6f:de:3b:92:88:d7:97: f8:45:f1:e9:6b:66:e5:2b:c7:e1:33:61:f0:29:0b:e8: 05:87:fb:5d:42:cc:94:f2:12:3e:9c:63:ba:53:31:dd: d0:05:11:27:51:b1:4e:84:f6:9c:72:88:02:ad:62:c4: 64:cc:40:cc:ee:c1:8d:fd:02:6b:19:19:f2:09:e9:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ed:3d:2d:8e:da:f6:fa:97:61:d1:08:8f:0d:6f:35: fb:dc:b0:f4:c1:7e:3e:94:5b:60:80:d0:9f:d5:00:f7: 5e:4a:0b:db:4e:42:bd:ee:50:06:a1:72:ed:60:91:b7: e6:2d:d4:39:2a:e4:48:bd:8f:8a:3b:0c:e9:15:9d:58: 68:37:bd:e1:04:1f:16:bf:e5:7d:8e:61:80:e2:ea:bb: 2f:c8:51:4c:49:b0:e3:97:44:f4:44:98:cd:f4:1f:00: 8a:93:25:16:c8:51:40:f8:7a:5c:d6:c0:f4:b1:29:0d: 87:46:c2:28:2b:2c:ff:68:ec:98:5f:de:fd:67:30:75: 4e:70:17:af:17:b0:53:93:38:e4:e7:c3:a6:bd:c3:5f: ab:0d:27:5b:06:53:6a:bd:14:8d:a0:0d:de:78:9c:e4: 95:a1:84:3f:86:1b:03:68:22:83:7e:bc:d5:86:a4:8d: 39:77:65:cb:15:f2:01:fc:c1:c5:0d:97:d8:48:ef:35: ae:f6:32:2c:7d:f7:7e:54:45:1c:15:82:eb:65:99:d3: 84:de:29:27:8e:c9:c3:25:26:10:7b:53:76:ea:3d:e0: d1:43:88:7d:1a:b3:a8:bf:cf:76:7d:3a:8f:5e:b0:e1: c4:ef:96:0e:c9:bc:2e:ad:90:72:f3:18:28:52:f5:8f Fingerprint (SHA-256): 7A:5A:D1:DD:EE:C4:64:05:81:0E:F2:0A:E5:A6:CD:1C:D0:10:3A:C8:C5:8D:37:95:7C:4F:4F:DB:7F:B1:72:8F Fingerprint (SHA1): C6:09:3C:2C:88:47:91:0B:36:91:B4:C3:29:E9:9F:8B:F3:27:B5:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193524 (0x1315c3f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 19:37:34 2023 Not After : Mon Mar 20 19:37:34 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:6a:44:bd:c8:c4:78:4d:28:02:b5:5d:b3:39:87:15: 16:81:f9:cd:78:12:50:7d:c5:38:80:0f:9d:21:63:31: b4:b5:f4:7f:96:d9:11:4e:eb:ec:cb:3b:92:10:4f:36: ec:70:4d:72:aa:bd:ad:f4:fa:ed:73:7f:da:77:4a:1b: ed:60:cb:c7:28:bb:1f:ff:b5:bb:04:2f:3c:6d:cb:d6: 9f:03:90:2f:39:cb:4d:f7:e9:15:9c:29:17:73:17:8d: 3f:b8:c7:58:32:4d:de:4f:4a:bb:1b:91:5e:e7:b4:30: b8:f0:f0:c9:ec:31:b9:2a:b0:1c:70:28:5f:a8:f3:07: 70:70:d0:97:aa:be:2a:ab:5b:d7:f9:3f:e7:1d:23:a5: 86:57:c0:47:8d:ad:ef:e2:ce:e2:11:8d:6d:fd:57:fb: cc:d6:26:3f:38:2f:82:4b:58:8b:f0:60:b2:ea:cc:cb: d0:75:9c:17:82:5e:f2:9a:91:00:58:42:34:aa:6f:4c: 21:ad:2d:6b:0a:19:c8:9f:81:91:52:98:23:7e:48:1d: f2:fd:a8:de:4e:98:fa:3e:3b:52:6e:56:5c:be:3c:b7: a5:17:cb:e6:6c:52:9d:88:af:cc:bd:b3:dd:84:0a:f4: 14:9c:a1:bb:ab:cb:ee:68:94:00:b2:3f:2f:a5:c2:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:d8:80:29:aa:3b:0a:4c:c8:9f:d6:40:fe:73:7b:ce: d2:6d:f7:69:a3:e6:ee:0d:e3:fd:15:71:66:e4:7a:e4: ab:21:de:34:bd:b5:ee:b6:d3:2b:da:e4:ea:00:0c:09: 15:2c:69:40:47:bc:a2:9b:66:e0:6e:61:4e:68:2b:d6: 40:3e:a0:0e:94:a8:82:22:3d:e8:5c:5a:f2:8b:8a:4b: e0:46:8d:d8:23:2d:df:7f:d8:3c:ee:e0:0f:a7:bc:d2: e3:5b:b3:16:6e:b7:ba:cf:2a:d4:96:4c:99:1e:f6:47: 65:b8:93:82:51:7a:56:27:26:18:f9:79:0e:5e:b5:4f: 47:65:93:5a:72:c3:07:79:60:e6:8f:20:71:e8:1a:f8: 50:40:c7:a4:bc:44:54:36:c9:ac:ba:f2:ab:1b:d0:9d: fb:33:cb:c1:fa:61:1b:a9:ab:5a:e4:02:af:18:cb:89: 26:f1:5b:71:c8:bf:e0:bb:6d:25:f7:46:1c:25:7d:66: 53:65:26:90:b9:8b:14:27:c4:50:06:e6:1c:76:fd:d1: dc:28:c4:42:e5:a3:05:d9:63:78:c1:ec:5e:05:59:55: 29:58:78:89:a0:2f:8c:41:a4:35:b0:66:84:4a:9d:43: ce:38:f1:a2:6e:5f:f7:f7:d5:52:6d:58:b8:b8:e9:7c Fingerprint (SHA-256): 3A:F2:21:2C:37:D5:3D:E5:34:02:1E:80:5D:A7:65:36:62:EA:88:79:6E:C4:43:58:9D:3B:EC:E9:4E:1C:6C:A1 Fingerprint (SHA1): F4:27:07:F5:A0:07:7D:27:B7:2B:08:BD:61:88:1E:C7:F4:FB:FF:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193520 (0x1315c3f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 19:37:30 2023 Not After : Mon Mar 20 19:37:30 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b6:e0:7f:3f:52:9b:3b:b6:78:bb:8d:4e:e3:9b:18: 9f:e7:85:af:2f:1b:e7:00:cc:02:de:ea:7d:31:90:9d: 39:5d:89:cd:da:c3:bb:78:7d:4e:dc:7c:24:58:c0:b1: 4d:f8:41:b1:bf:aa:a0:a2:9c:bc:b2:d8:9b:67:0b:89: e6:6d:e8:4f:7c:d2:6a:8c:ca:ea:12:af:33:36:8b:8f: 49:16:26:69:62:1b:71:95:c2:34:07:c3:0a:c7:ad:03: c2:c6:b1:1f:39:fc:78:80:e5:8e:76:8c:5e:37:42:18: ab:3e:30:12:ad:c6:bd:72:74:dd:d4:e9:52:97:da:21: 18:e9:42:f2:98:4c:62:62:52:e1:52:f4:75:61:6d:ae: 41:98:77:41:6d:6f:26:c0:2c:d6:da:4e:16:2c:90:d4: 63:6f:45:27:1f:b2:5f:b3:70:08:4e:13:05:0f:ac:4c: c2:77:33:9d:25:4a:cc:8a:1d:6f:de:3b:92:88:d7:97: f8:45:f1:e9:6b:66:e5:2b:c7:e1:33:61:f0:29:0b:e8: 05:87:fb:5d:42:cc:94:f2:12:3e:9c:63:ba:53:31:dd: d0:05:11:27:51:b1:4e:84:f6:9c:72:88:02:ad:62:c4: 64:cc:40:cc:ee:c1:8d:fd:02:6b:19:19:f2:09:e9:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ed:3d:2d:8e:da:f6:fa:97:61:d1:08:8f:0d:6f:35: fb:dc:b0:f4:c1:7e:3e:94:5b:60:80:d0:9f:d5:00:f7: 5e:4a:0b:db:4e:42:bd:ee:50:06:a1:72:ed:60:91:b7: e6:2d:d4:39:2a:e4:48:bd:8f:8a:3b:0c:e9:15:9d:58: 68:37:bd:e1:04:1f:16:bf:e5:7d:8e:61:80:e2:ea:bb: 2f:c8:51:4c:49:b0:e3:97:44:f4:44:98:cd:f4:1f:00: 8a:93:25:16:c8:51:40:f8:7a:5c:d6:c0:f4:b1:29:0d: 87:46:c2:28:2b:2c:ff:68:ec:98:5f:de:fd:67:30:75: 4e:70:17:af:17:b0:53:93:38:e4:e7:c3:a6:bd:c3:5f: ab:0d:27:5b:06:53:6a:bd:14:8d:a0:0d:de:78:9c:e4: 95:a1:84:3f:86:1b:03:68:22:83:7e:bc:d5:86:a4:8d: 39:77:65:cb:15:f2:01:fc:c1:c5:0d:97:d8:48:ef:35: ae:f6:32:2c:7d:f7:7e:54:45:1c:15:82:eb:65:99:d3: 84:de:29:27:8e:c9:c3:25:26:10:7b:53:76:ea:3d:e0: d1:43:88:7d:1a:b3:a8:bf:cf:76:7d:3a:8f:5e:b0:e1: c4:ef:96:0e:c9:bc:2e:ad:90:72:f3:18:28:52:f5:8f Fingerprint (SHA-256): 7A:5A:D1:DD:EE:C4:64:05:81:0E:F2:0A:E5:A6:CD:1C:D0:10:3A:C8:C5:8D:37:95:7C:4F:4F:DB:7F:B1:72:8F Fingerprint (SHA1): C6:09:3C:2C:88:47:91:0B:36:91:B4:C3:29:E9:9F:8B:F3:27:B5:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320193525 (0x1315c3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 19:37:35 2023 Not After : Mon Mar 20 19:37:35 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1f:57:7f:44:58:47:02:fa:88:07:0a:ee:bd:87:79: 98:ed:9d:90:2f:92:ac:33:95:29:6b:59:83:99:94:71: ec:fc:3c:7e:4b:a0:04:46:88:e6:de:aa:f0:2d:2c:19: 93:66:5a:5e:a6:41:66:ba:77:0f:e4:70:ca:18:1e:2a: cc:09:81:ef:da:ee:bd:39:7a:0f:e9:c6:4f:cf:ea:85: 22:10:93:26:34:93:78:43:81:fc:bc:27:12:8c:63:0b: f3:42:ed:68:03:ad:ac:55:8a:f8:b6:9a:14:5b:93:80: 3a:bb:b5:2e:46:e0:52:44:4b:5a:f4:0e:32:f8:11:ce: 34:7c:e4:38:46:0a:92:4d:dd:de:12:10:f6:7f:e1:d7: f2:57:18:e9:dc:23:75:90:10:5f:a3:be:3c:d7:b9:dc: 21:71:75:fb:c4:86:72:6a:30:bd:f3:f3:29:43:68:fb: b7:9a:c7:8b:e2:04:68:3e:47:91:8a:31:65:35:71:68: 7e:5c:9e:10:0d:8c:58:7d:f6:d1:bd:8e:ec:6b:44:24: aa:25:42:80:9d:6d:d8:27:89:fb:91:a0:dd:b9:78:a0: 9c:fe:06:9d:a9:bd:58:45:0b:c2:ee:a4:fc:1a:d4:c7: e7:f7:db:07:57:7e:98:cc:20:34:77:8f:56:fb:f9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:29:88:6f:4d:5a:f3:45:52:6f:fd:10:b1:b5:28:19: c1:9b:9d:3a:84:ce:89:34:3b:a3:42:e6:a6:49:8c:fd: 78:35:e4:00:d8:64:ea:27:4c:61:f0:3d:68:b1:10:52: cb:85:d9:cc:3c:4f:35:fb:3e:1e:bc:a2:18:60:ba:5c: 3f:6b:d2:1d:2d:3d:e5:96:90:08:98:ae:83:98:87:84: 4a:80:7b:c2:3f:4d:bd:c9:b6:d0:d3:f6:5a:5e:06:5b: 2c:a8:a5:d3:54:89:48:40:d6:ef:3d:5d:8f:7b:3c:dc: 15:07:a7:29:41:6f:96:c0:7c:fa:1c:f1:99:f2:21:c1: 90:ac:44:11:51:ae:a2:72:b1:fe:72:4b:11:db:ed:67: b9:f1:5d:69:b0:43:4d:1b:6a:27:d6:2d:bd:cb:19:e2: 4a:b5:de:80:70:9d:4f:40:57:20:8f:2c:80:8d:e9:c5: 83:a1:62:31:a0:22:f6:cf:60:d9:fc:4f:7e:16:a0:d4: 70:20:e3:dd:67:c0:50:83:82:21:0f:48:9c:fd:ac:5f: 01:28:30:12:90:56:af:84:fb:47:b5:ca:c0:23:20:b4: 21:5e:7a:95:82:62:1f:d1:85:19:41:31:c1:3a:3a:fe: fc:ab:4d:de:b0:81:18:6c:95:27:aa:1d:23:08:e3:76 Fingerprint (SHA-256): 76:7C:22:53:CB:C3:B7:7E:C4:29:58:D8:1D:B6:00:96:7D:84:B3:EB:CC:F1:01:D0:8A:9D:E8:77:C7:DE:60:00 Fingerprint (SHA1): 0D:BE:13:FB:CB:7B:77:62:23:3E:2E:28:94:29:1E:4B:09:A9:45:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 38865 at Mon Mar 20 19:37:40 UTC 2023 kill -USR1 38865 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 38865 killed at Mon Mar 20 19:37:40 UTC 2023 TIMESTAMP chains END: Mon Mar 20 19:37:40 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Mon Mar 20 19:37:40 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Mon Mar 20 19:37:40 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Mon Mar 20 19:37:40 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Mon Mar 20 19:37:40 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Mon Mar 20 19:37:41 UTC 2023 TIMESTAMP ec END: Mon Mar 20 19:37:41 UTC 2023 ec.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Mar 20 19:37:41 UTC 2023 TIMESTAMP libpkix END: Mon Mar 20 19:37:41 UTC 2023 Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 20 19:37:41 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #87: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #111: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 0ddde40161e1a692291bc416bd340126fe15b9ea -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k f8853112152d95911d5bc8b29c6db0ba144c3ab2 -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:4e:03:6b:74:5a:a8:46:32:15:4a:8c:26:cd:6f:0a: b5:ce:70:cc:d4:a0:9a:17:63:27:73:71:c9:9d:ff:b8: 12:55:f9:66:fd:fb:0a:a5:a9:ff:34:57:d6:76:31:c5: cf:45:ae:bd:69:05:30:15:df:dd:76:e9:37:dc:fa:69: ea:15:36:50:fa:9e:17:d7:ea:83:03:c3:0c:8f:33:a8: ea:ce:81:c3:8a:3d:19:40:b7:9b:ae:6f:de:b2:a7:b0: 2c:86:65:07:87:c8:85:5d:95:87:1a:a4:71:87:b6:0e: d0:ce:c4:bb:84:df:40:df:35:ef:6f:ff:08:ed:85:c2: 0e:6e:06:57:22:00:d0:85:a6:fb:bc:b3:28:9c:de:ad: ec:c7:c6:f1:7e:97:3d:f3:40:20:aa:e9:96:ac:72:9a: 19:d7:b8:3e:74:6f:55:dd:5e:cd:a7:33:a4:b5:79:27: 21:32:74:57:4e:82:4e:b6:dc:d3:81:ed:ee:da:b7:01: ea:d7:a9:c9:a2:72:58:e1:3b:c6:54:9a:9e:c5:57:2a: 67:07:c2:90:ad:15:74:7c:59:c5:fb:fa:ca:59:40:ae: b3:91:13:62:be:d7:46:9f:af:f7:95:9b:ee:58:c7:50: 55:7b:56:68:6d:a1:ac:69:97:c5:03:97:5f:a6:68:41 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:63:6b:b5:60:10:1c:7f:89:33:07:b3:64:15:f9:ea: 92:8a:be:e0:6d:1a:0f:62:db:c9:f5:b6:d6:9b:2d:52: c5:8a:1e:00:5c:09:03:a0:8c:5e:ff:b2:e9:18:03:ef: 51:9f:fa:ef:73:71:3c:60:f2:8c:85:72:9a:bf:b0:16: 8e:2b:59:a5:53:64:3d:a9:0c:cc:82:11:8e:e8:da:8f: 9a:c3:b0:ba:d0:45:3b:8d:5c:33:ba:c8:31:35:4f:b9: 10:15:c3:c2:30:d7:0d:44:d7:92:48:93:ba:cc:53:c5: 42:6e:d5:f0:c4:64:81:dc:71:9d:af:2f:af:63:96:1b: 28:db:26:83:98:7a:65:6e:5e:00:f1:55:53:c2:00:88: e4:69:93:e2:dc:65:c5:50:37:b8:b2:29:d1:44:1e:47: e7:3a:06:3d:19:72:ec:6e:13:94:87:a6:5d:10:d2:13: 3b:5e:90:82:3b:70:b9:60:a5:26:1c:78:f0:70:82:83: 4b:9f:43:50:a5:76:e7:6c:c7:06:a0:72:f1:dd:be:a1: d4:00:c0:ce:2e:1b:09:bc:a8:79:d2:cd:1a:fd:fe:6d: de:a7:50:73:80:8c:5f:87:2a:85:c5:50:20:56:50:1f: e3:24:9e:c4:87:24:60:f6:44:c7:48:4e:42:62:92:d8 Fingerprint (SHA-256): 22:65:B9:B5:8F:FF:1C:2E:2F:40:F5:2A:C9:C6:4E:D6:D2:7D:B8:4A:21:5C:0F:99:91:09:29:BA:36:18:BD:57 Fingerprint (SHA1): FA:6D:00:3B:9B:98:F7:8B:D9:EA:9D:BF:99:86:B2:35:2C:F6:D3:24 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:3f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:24 2023 Not After : Tue Jun 20 19:38:24 2023 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:b7:62:4f:b4:bd:54:9d:5d:1f:c9:be:b6:9d:3a:ed: 3f:fb:52:b4:a7:5f:cb:67:7c:2f:e9:6c:c6:b8:1a:97: 52:17:41:37:61:be:15:c0:2c:77:ff:7a:8e:c5:0c:d9: 77:65:dd:42:ad:2b:e6:b8:8c:fa:ac:63:ff:b5:92:3b: c2:0e:00:03:cc:68:62:ec:77:e5:55:a3:47:65:74:02: 13:cd:a7:92:24:1f:02:1e:6f:69:f0:d8:d5:e8:a2:57: ba:c1:8a:71:a8:72:2c:0a:9d:80:6d:32:b5:2e:3f:43: e9:df:3c:6e:f8:07:1b:1c:1e:6a:94:61:cb:4c:97:29: 6b:2a:ec:f9:32:92:e8:b0:39:8a:dc:f7:f7:d4:34:74: 03:90:5c:f6:c5:ef:cc:9d:05:3d:48:68:5b:47:69:08: db:1a:cf:9b:7a:26:ea:c2:68:d9:b3:f6:62:8b:34:90: 7f:c3:53:aa:ae:4e:53:6e:49:6b:b9:7b:12:5d:9b:80: 92:60:1c:6d:30:85:c7:d2:1b:0c:2e:13:b4:a7:40:23: 7b:80:be:bc:6a:74:02:d4:ea:cc:5f:91:31:cb:87:b9: 8f:e4:fd:f0:09:41:ae:f3:d2:e0:cd:64:f2:fc:a1:a8: c7:0b:fe:dd:ec:e1:4c:ff:ed:4a:c2:65:f9:2f:8b:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:0b:b0:95:73:f4:62:83:11:ab:80:ed:48:23:5d:02: 65:2b:2c:98:01:90:7c:cf:1d:67:2c:18:ea:87:50:f4: cf:6d:82:49:18:43:11:20:fd:da:3b:d6:85:25:35:54: bd:47:b7:d6:17:0e:5c:95:be:91:c2:f2:1a:c3:6a:ba: 79:0a:39:f1:ef:54:fb:2e:b5:21:51:5d:79:0c:41:b5: aa:47:43:64:d3:33:8a:82:f1:bd:7b:f5:8b:79:bc:f9: 47:0c:6f:e3:d7:b0:20:3e:c3:94:fa:f6:3e:e0:81:8a: 55:44:3c:e5:10:27:52:46:24:e7:0d:19:b2:0e:03:d2: b8:c7:58:a0:b4:4b:c8:51:51:4f:85:10:38:dc:ec:ba: fd:9e:e2:d5:b5:f4:43:3b:a3:a7:17:1e:c8:62:6e:f0: 93:76:08:41:4c:eb:5f:17:7b:f0:34:a7:06:aa:df:67: ab:ff:4b:98:a1:dc:6c:81:c0:68:c0:0f:3a:b4:62:31: dc:cd:88:1f:c7:df:75:5f:04:64:81:6d:28:3f:96:57: 8a:c8:a4:93:27:50:2e:24:27:a5:90:fd:fa:03:c2:c0: 0f:5d:97:77:70:14:2e:db:09:e9:fb:cb:cc:d4:e3:65: 18:98:17:09:9e:82:3b:ba:4f:f0:e7:30:92:f8:b2:c7 Fingerprint (SHA-256): 5E:1E:E6:3F:65:00:EA:22:29:9E:15:07:E9:00:48:87:68:C4:E0:44:76:02:DF:1F:E2:C3:41:BA:9C:E8:89:1E Fingerprint (SHA1): BE:54:81:97:6B:53:9B:07:E6:77:10:A7:17:8E:F4:4A:3A:38:8A:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:40 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:25 2023 Not After : Tue Jun 20 19:38:25 2023 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:29:fc:e3:77:3b:32:86:59:36:5f:c6:0a:d2:0b:7f: 21:3f:96:29:d7:58:9a:cf:4a:e5:58:d7:3d:5d:8d:b2: 4c:79:a6:db:66:48:41:0d:c9:c6:7f:0d:7e:bc:58:80: 0e:c4:ef:2b:b0:49:e5:14:91:d8:c2:ec:bf:74:df:55: e1:8e:f6:51:0b:36:e0:9b:3e:39:ec:c3:ee:3a:3c:17: 28:c6:59:c8:d8:8e:b3:eb:03:fe:ca:5e:57:d1:32:be: 34:26:de:59:45:75:4d:aa:e0:30:b7:20:62:97:5e:a9: e4:30:91:4e:bf:9a:6c:e9:43:51:01:4e:a3:e3:ab:c7: 6c:99:df:12:e3:31:dc:55:33:ed:c9:d3:99:75:fe:10: 67:a9:04:e6:f5:2c:13:39:97:7b:d8:af:54:04:8d:d1: 14:79:ef:1a:29:fb:73:7f:8d:b3:1d:43:c2:2a:37:ec: 31:15:99:18:54:40:f9:75:7d:05:2b:03:dd:87:e0:f4: af:b9:7d:93:ef:eb:a1:16:16:c3:4f:5e:41:09:be:48: 30:31:fa:51:93:92:9a:39:91:2c:53:a8:79:7c:9b:6f: e6:b8:51:e2:c9:99:71:a6:e1:25:fa:fa:3e:21:c2:1a: c0:64:4d:d7:9b:26:0b:f3:5e:81:41:2b:de:fc:57:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:0b:3b:1f:d3:e6:33:39:68:ac:12:bd:7e:2c:94:38: f2:66:bc:a8:26:b6:e9:67:0d:86:ee:33:94:c5:9b:45: 18:c8:f4:2e:6e:70:cb:55:0c:0f:af:5e:4a:30:96:0a: 6e:17:6b:91:40:22:35:2c:e7:bc:8b:01:14:93:fc:cc: 15:5c:51:d9:06:19:04:dc:e6:17:0e:88:ea:99:b2:22: 51:15:a1:c2:25:e8:e7:e9:fe:ff:90:5b:32:6e:bc:f2: 02:46:44:ac:6c:26:fd:d6:bc:28:52:96:93:58:90:37: e4:44:99:fc:7c:bb:88:c3:4b:5a:d5:9e:c1:c0:23:df: d2:43:fe:a9:fa:24:f9:49:02:30:9b:d8:ea:ff:45:29: 75:40:ab:f9:8e:56:12:0d:71:0d:66:a2:34:ad:8a:4d: 22:49:72:96:9d:30:72:5e:21:a1:af:3d:93:d9:13:e1: 99:11:a3:4c:de:e2:51:bc:29:50:f2:0a:4e:84:a0:f5: dc:ad:8a:83:ba:35:5c:42:b0:46:dc:c6:32:5d:3e:69: f2:86:fb:e6:3a:06:7f:7d:f7:7f:aa:bb:00:8b:63:d3: 36:25:7d:1a:53:45:5a:74:fb:40:84:ad:60:51:b6:c7: 6d:32:59:82:ff:45:02:8c:e8:c3:95:10:84:ac:34:7f Fingerprint (SHA-256): C2:CF:EE:D0:04:05:E1:E5:EB:4A:45:96:B3:CC:22:3D:D5:BD:F5:C3:E5:93:30:9B:6C:AC:B3:E5:45:CD:00:A6 Fingerprint (SHA1): 83:89:37:5E:13:A8:DE:C9:31:A4:28:E5:C2:43:A2:5E:87:48:7E:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:41 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:25 2023 Not After : Tue Jun 20 19:38:25 2023 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:1e:aa:ca:90:83:93:36:ed:70:01:d0:1b:cf:44:bc: 88:96:a5:27:fa:75:b2:7c:01:1a:71:78:e4:f6:cd:e8: f2:4d:43:90:7e:95:f6:ed:4c:31:aa:c6:8b:cb:9e:7b: 90:44:9c:08:5c:ae:fa:f8:0a:cc:dc:c3:8b:73:f4:47: 48:ba:26:d5:e4:fb:35:b7:0d:0d:65:65:67:a9:60:98: 94:19:bc:0d:16:a7:c9:4d:29:05:12:83:04:0a:64:17: 74:77:e1:ac:a7:d4:b3:02:42:f0:68:ae:ac:ad:45:e7: ba:0e:85:4c:14:21:34:c3:eb:66:0c:07:c8:9f:30:31: d7:20:7c:9e:78:d1:0a:b2:b6:b9:79:3a:76:3e:c1:a1: 74:a3:47:21:c2:27:18:cc:1f:76:f3:0c:55:88:f5:a8: 7f:8a:df:df:83:1c:90:db:24:52:8b:58:53:b9:95:42: 36:f3:56:99:e8:b4:65:05:a0:da:fe:47:71:6e:de:8e: 8e:fe:77:80:70:a5:85:d2:1b:7b:cb:96:6d:09:9e:2d: 0a:9a:d0:3d:0f:f0:74:a5:e1:e6:ba:5b:92:dc:e0:8d: 80:e5:f1:a6:8b:7e:0e:0e:ed:6e:10:2f:c7:ee:80:81: 55:a5:0e:98:0b:53:95:7f:aa:9e:9c:08:4d:27:6d:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:41:2b:84:28:1e:65:bb:d4:a6:c4:d4:68:f9:79:a3: 08:97:a6:ad:00:a5:5e:22:4f:d1:9e:a0:a6:d6:9f:3a: c9:d5:1d:c0:13:2f:e7:ec:63:d9:62:0b:5c:4a:c6:7e: 80:7b:f0:bf:b3:ba:f8:6f:74:6c:3e:33:3b:cf:48:3a: 6b:ca:26:eb:0d:f8:1c:5d:5a:4c:ad:1c:b5:8d:f9:23: 47:6c:6d:3e:cd:3e:04:f4:e7:a6:0b:df:99:e8:3b:50: cb:c9:6e:ac:43:1c:7f:22:33:1d:45:8b:43:ea:84:16: 3c:81:09:2c:ed:cb:c6:07:92:7d:fa:cf:39:4c:7a:19: 64:10:ba:4e:d6:24:fa:7b:04:e4:83:4c:e5:25:32:e2: 40:30:1e:9c:c3:4c:10:66:63:4d:f0:1a:ab:be:23:e0: 28:bf:11:9f:ed:ee:df:af:f2:74:1e:d6:48:7c:4c:3a: de:01:17:18:fb:a5:72:c6:9c:f7:61:07:d8:70:24:aa: f2:05:3d:41:4d:c4:4b:f0:aa:12:fd:04:ca:2b:6d:c6: b3:a5:63:66:b1:de:14:a4:52:d8:87:92:85:2d:35:32: f1:15:c6:b5:35:ea:52:49:bc:be:ba:f2:13:c8:d9:24: bc:ae:e5:8a:70:0c:9f:b8:7a:61:cf:66:f5:0f:4b:f0 Fingerprint (SHA-256): EE:43:56:C9:C5:EF:FE:8A:32:51:7B:97:D1:55:79:F0:BC:BC:AC:D8:CD:77:81:B0:2A:91:72:90:A5:8D:CF:62 Fingerprint (SHA1): AF:1D:75:B9:24:68:56:5D:15:EA:73:FB:CC:5C:99:99:83:72:C8:F7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:42 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:26 2023 Not After : Tue Jun 20 19:38:26 2023 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:3f:c0:14:f4:85:84:8e:f6:1c:b7:83:27:ff:cb:8f: d5:db:62:8a:6f:bc:a1:fa:6b:c6:9f:38:7b:5d:7c:7b: 5d:bc:7f:b2:fa:fe:13:bb:e4:fa:b8:8c:1e:ae:f5:55: a8:9d:39:74:85:6a:7e:05:cf:b1:fe:a6:89:d7:ea:0e: 46:05:0c:e7:f7:e0:8a:17:99:50:19:e7:77:13:b4:ad: 47:43:98:0a:2e:12:3a:ca:47:45:6e:bf:3e:6a:1c:b7: 42:b5:10:57:e8:3f:b6:35:74:e9:bf:58:3a:96:b9:1b: 69:39:88:16:4a:8a:6b:5f:70:9f:df:f9:49:a9:00:29: 2c:81:1c:73:51:94:55:ee:09:0a:85:64:21:fd:50:34: cd:b8:34:1e:a3:a3:56:bd:02:4d:2c:b2:22:a9:6f:ba: 62:f3:15:f0:ce:14:d2:e6:7b:6c:d0:77:78:00:d0:a5: 26:d1:6b:05:4f:9c:50:9f:ed:99:ab:8b:ea:ce:dc:24: 1f:e4:12:79:5a:90:a4:b9:36:dc:f7:b1:f3:8e:d5:d3: dc:f1:bc:a3:6a:6e:99:1b:13:73:16:e4:16:0e:0a:a8: 6e:59:80:56:02:67:64:61:da:d0:12:4a:b9:73:ad:06: 85:c1:a4:f5:ba:f5:44:1e:6e:76:6f:74:01:6e:26:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:c3:01:b9:34:42:4c:99:4d:74:75:bd:f5:5f:3a:fe: 9b:03:99:50:37:e4:4d:1b:29:8c:02:1a:72:69:e6:04: 34:a0:c8:4c:9a:4e:9e:96:d6:8e:eb:5f:29:5b:a7:29: 9a:56:af:66:de:fc:27:fc:df:c9:0d:e9:25:df:93:f8: dd:df:f9:2e:c3:84:bd:7e:c4:25:90:77:cb:2d:27:38: cf:b6:aa:d8:17:af:a0:67:32:52:29:f6:12:cb:ba:ad: 6f:d7:88:4a:eb:32:86:4b:a8:0a:f2:3a:ed:48:24:94: 0b:95:49:eb:e8:3b:34:9c:93:aa:bf:a2:4e:38:ae:24: 87:80:5f:11:09:de:70:08:37:bf:ae:6b:68:ea:59:27: 5a:df:f7:79:75:9e:a0:2e:4c:3b:ac:1c:d9:d9:77:8f: e3:3f:fd:d0:31:a1:3e:01:56:9a:12:02:92:f8:8d:a9: 56:55:f3:8f:72:cd:9f:b6:5b:14:bf:05:76:e6:7f:d3: a8:ee:40:3f:7d:18:61:7f:2d:11:04:7a:aa:5f:75:50: c8:a1:ca:7d:1e:c8:28:e4:6d:64:98:7c:e5:0b:dd:ba: 69:d7:ff:5c:9d:bd:97:c5:eb:2d:c7:70:de:40:dd:ad: e6:3b:40:68:ea:5a:3d:77:c4:cb:9f:b7:0d:4f:76:6d Fingerprint (SHA-256): D9:70:B1:1F:45:2E:C7:68:33:18:B0:C1:A4:C8:48:26:E2:DF:72:67:2F:3C:B3:5C:80:0D:50:CC:1E:08:24:9A Fingerprint (SHA1): 94:38:78:3F:80:70:8D:0B:90:BB:68:BD:B6:FC:FC:A4:4C:FA:E8:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:44 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:27 2023 Not After : Tue Jun 20 19:38:27 2023 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:96:92:01:55:73:3f:70:d1:e3:c4:92:4c:04:ee:e5: 52:9a:f2:4a:46:70:45:c6:25:09:84:aa:f1:03:55:40: 62:36:8f:1f:39:71:af:25:d9:a1:0a:e0:af:24:4b:82: 69:d1:97:7b:cc:d4:46:4e:ef:17:b7:24:72:73:c5:47: f3:c0:52:25:23:1e:c4:e4:49:ce:8e:e6:31:a7:ed:59: f0:0c:0f:3f:da:87:b7:f4:2b:66:96:82:51:47:6b:ee: 78:f0:56:54:6b:95:23:ed:e7:e8:8a:a5:4f:5d:a5:ca: 47:18:82:6b:f1:a9:70:db:dd:04:3a:ab:6e:cc:cb:80: 5d:62:1c:78:b4:02:01:8e:ad:3a:ef:9c:9a:ad:a9:7b: 97:c0:6c:f0:0c:82:da:7b:83:54:0d:be:4d:dd:08:06: 6d:01:09:1e:cf:f2:a1:2e:98:25:87:30:fe:da:fd:be: 28:75:7a:c0:57:92:f8:38:c0:23:02:a3:76:84:f2:f9: ac:a0:06:92:7b:6d:8c:73:c8:c6:83:63:e7:26:68:da: cf:c7:69:0a:59:f3:6f:31:5f:62:a2:eb:ba:16:9f:40: 81:25:94:30:9b:17:58:05:96:2b:90:f2:7e:d4:b2:f1: a0:53:68:91:f8:d9:3b:17:8a:35:61:33:3c:e4:7e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:f5:52:14:8c:b8:37:88:03:e3:c3:3c:b3:64:13:73: 8a:36:cf:0b:de:79:a0:e4:34:3d:2b:b2:84:a5:49:65: b2:2d:e2:60:3d:d3:8c:c1:8e:89:4b:d3:33:4c:13:bc: b4:fb:20:3b:4d:77:34:15:fe:01:63:59:32:43:be:2f: 87:2c:71:8a:b5:fc:ca:ad:66:2b:cb:3d:d5:a4:17:40: f8:ef:50:df:e1:9d:91:07:89:eb:2e:60:3b:1d:4c:ef: cd:49:25:a1:a3:3c:d4:85:ab:a6:1d:e3:bf:13:76:8a: aa:62:91:a9:4b:bc:51:8b:40:1a:a5:98:e4:da:06:33: c2:b0:1c:19:04:0e:43:4f:86:08:20:37:75:b1:6e:a1: 88:d6:1b:51:e9:ac:c2:79:8f:e0:dc:fb:fd:fa:eb:e5: 84:04:3e:17:57:28:7e:a9:44:67:a4:6b:68:50:c9:9b: 50:3e:83:28:15:37:8c:62:dc:b5:ef:9b:26:8f:25:30: d4:be:2c:65:96:11:fa:b6:45:6b:00:ad:da:a3:05:64: 85:91:1d:84:c7:52:0d:6d:a8:19:cc:3e:b4:b2:1f:4e: bb:65:bb:e5:4c:3c:10:68:97:a0:0e:be:8e:bd:80:eb: 5e:5d:f4:a7:00:fe:f1:4e:08:47:b0:33:f3:98:2a:ec Fingerprint (SHA-256): 63:C8:EB:57:51:37:64:B9:BB:F3:50:C6:EA:BE:8C:3E:0D:19:41:16:DC:F1:84:9E:37:3A:60:46:38:FE:A1:E8 Fingerprint (SHA1): 27:52:0C:EA:1B:DC:24:A7:3C:E7:66:E8:70:E3:23:98:4B:00:3D:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:45 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:27 2023 Not After : Tue Jun 20 19:38:27 2023 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:94:76:4a:3d:98:0a:e1:a3:dc:f0:af:c8:4e:b1:fa: 5e:05:aa:98:44:2f:50:05:c3:12:02:86:e3:54:53:37: 73:a6:bb:97:8b:69:08:e4:d2:8c:e2:8a:8b:91:29:58: 52:a8:3f:96:18:f3:30:7d:67:7d:c8:f2:70:5e:4c:32: ee:cb:87:34:67:15:9b:b4:67:ff:31:17:47:23:0b:a2: b5:f4:24:cc:69:b8:6b:a4:a8:1f:f3:21:43:a0:f6:33: 0f:65:fc:00:38:86:c0:c2:d9:14:60:61:ad:eb:0f:c2: a1:61:79:8d:bf:13:37:06:46:67:fc:c3:43:84:64:89: 73:3c:8f:d2:21:c8:63:b6:c4:bc:10:b8:f0:e2:5c:f1: 04:75:da:78:2a:ca:81:2d:e1:9c:b5:b6:34:97:93:7f: 9e:ba:c1:b6:56:17:57:e9:19:7a:f1:b4:af:98:d8:db: ba:9b:94:1a:b4:6d:89:40:38:95:41:82:8b:2b:15:ee: e1:61:59:56:1a:cc:98:24:df:ba:dd:82:79:06:a4:02: ec:32:e2:33:cd:85:d9:4f:18:eb:51:96:c6:25:84:e0: 19:8a:08:9c:d4:99:91:51:29:eb:67:0b:c4:6e:29:e3: d9:63:33:4b:46:16:73:4b:d9:c1:d6:54:43:8a:44:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:b9:56:76:e4:6d:40:75:c3:7d:38:65:8d:e7:f9:60: f5:7c:5f:7d:87:10:cb:ef:c5:d6:a3:c5:be:0d:e8:fe: ae:ad:e0:94:d1:a6:d3:35:a0:f0:03:c8:27:77:2f:6d: 57:5e:46:58:10:43:2d:f6:0a:4c:52:b8:2f:d5:47:75: bc:84:da:e3:76:04:28:dd:d5:73:f6:19:d4:9b:45:3d: 85:0d:30:81:88:9d:72:c4:4f:84:63:cf:bf:95:35:8f: a4:31:3c:4a:c1:5e:7f:ba:4b:64:b4:59:ac:07:7a:f9: d5:98:20:d1:42:0e:6f:28:1c:58:44:06:83:5b:1d:4e: 83:0d:37:e8:d4:c2:df:1f:ee:83:ac:64:5f:bd:24:c5: a7:63:58:b4:43:3c:76:2f:42:72:5e:31:ee:73:89:00: af:41:c5:08:aa:d4:e7:04:07:82:ff:d3:64:91:48:bd: 4e:01:d7:dc:81:37:f9:99:ad:3f:ea:ab:1a:5b:a9:47: f8:86:fe:8b:9e:8b:73:00:c8:31:1b:7c:b8:b3:e7:6f: 2e:34:da:41:ae:5f:94:5a:f0:6e:d1:18:04:2f:c1:59: ea:2c:37:4a:15:77:2f:ca:77:fb:2c:01:e0:10:c8:6c: bd:9f:16:e1:4a:da:66:52:9c:23:1c:ed:81:d9:27:b2 Fingerprint (SHA-256): 02:09:CF:24:3D:9A:87:77:8C:1B:1C:A6:2E:67:D9:07:EF:A8:61:41:73:BC:10:3C:44:F0:F1:FA:AC:18:14:C9 Fingerprint (SHA1): BB:E9:65:36:6B:CC:72:93:B4:40:11:5B:36:D1:D7:2F:E9:88:B1:F7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:46 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:28 2023 Not After : Tue Jun 20 19:38:28 2023 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:a3:2e:f3:14:46:d7:b4:65:a4:e5:a2:8f:a7:e4:0b: eb:a4:43:0a:50:f0:f0:ca:4a:f1:3e:47:ce:31:1a:af: f3:10:88:3e:3b:c8:5e:e5:6c:85:12:9c:a0:b8:77:50: bb:1a:17:b3:b6:7c:eb:1c:4b:16:10:89:fa:92:52:50: b1:5a:3d:1c:a0:9a:3d:71:bd:27:7a:0b:c6:17:c4:a0: de:71:24:24:8c:8d:a3:4d:db:71:4e:e8:b8:d8:9d:c0: 71:3c:49:ac:ce:31:e2:03:b2:fe:38:0d:f4:dc:eb:09: 8c:5f:d0:dc:1f:35:ff:9c:5d:60:c1:c0:ad:5d:8e:9a: 58:93:4a:00:c0:2c:0d:71:a3:0f:07:1a:a9:33:aa:f5: fd:00:20:9e:ac:49:e3:6d:4a:dc:25:ad:6b:8c:8a:35: 9f:1c:bd:dd:ea:55:77:74:cb:dc:3e:77:94:c9:c5:99: f6:71:db:69:d6:7a:17:d3:69:ba:cd:47:0a:6e:46:c0: d9:4e:0a:5a:39:1b:a5:d5:a5:7c:f9:9b:8a:39:c8:0c: f5:05:48:69:b2:79:d5:1c:8a:0d:5f:30:57:61:0c:37: a6:fe:89:ac:f2:1e:f3:f0:4e:64:2c:f1:79:bc:55:10: 09:bf:88:e9:37:59:fb:b3:72:5a:86:36:95:b2:f4:1f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:30:ae:37:af:b2:c6:69:ea:f2:a3:40:53:06:1c:10: 71:25:ab:84:0b:38:cf:72:3b:10:e3:c9:30:81:2e:c9: 0f:74:34:4d:00:67:4e:af:8d:af:d4:20:ef:06:12:4d: d3:34:c6:0a:30:a8:b5:95:fe:bf:6c:c7:26:b3:d4:d8: f5:53:03:49:3d:07:c4:d9:a5:10:4e:dc:0e:c7:41:35: 52:6c:4f:27:e0:13:d9:dc:c6:64:e7:79:7d:2e:e8:a9: 00:d9:c4:00:84:77:29:a8:28:51:6d:d8:07:84:62:a3: fa:cb:7b:00:62:ed:30:ac:a1:15:6c:13:02:ea:73:69: 52:eb:21:d6:9e:f1:52:b2:1b:af:ef:38:ee:85:60:b3: 84:d2:5f:40:25:43:61:79:0a:88:e9:53:a4:22:3d:4f: f2:e9:4d:0c:61:e5:8b:be:30:2b:d5:5e:07:53:9d:10: b0:07:0e:10:e8:fc:d3:bc:c6:bc:d0:56:c1:9a:0d:03: de:26:77:f9:a8:8f:5c:1f:0b:58:7a:e7:7b:22:76:56: 47:3f:fd:4c:5a:15:8c:13:ca:c6:4a:5a:ee:28:88:33: d8:f0:6e:9b:6e:5f:23:39:e5:2a:c2:19:d1:44:49:54: 3d:9c:06:ae:65:c9:87:c4:5e:7c:a0:28:11:df:4c:93 Fingerprint (SHA-256): 1D:90:E5:BF:D9:6A:A9:01:9E:C7:E6:E1:7A:73:96:34:E0:2B:DC:17:C8:F3:0E:98:32:25:E6:08:DD:75:96:4C Fingerprint (SHA1): D7:98:90:03:21:50:71:7E:B1:84:9D:87:A2:1B:73:D7:95:7B:4C:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:47 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:28 2023 Not After : Tue Jun 20 19:38:28 2023 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:fc:1e:a1:88:0e:f6:7b:1f:df:93:08:22:32:c3:7b: 3d:4e:f4:8d:97:30:32:89:8e:71:a3:12:e4:b6:44:6b: a5:31:95:47:6e:09:23:0e:75:e2:97:53:28:c3:a2:51: ee:02:83:ec:59:6c:f2:90:a8:bf:4b:81:7d:00:92:20: 49:4d:59:0a:80:dd:3c:85:27:2e:11:80:96:d8:42:a4: 2c:66:20:f3:cb:cd:87:89:5b:5f:44:df:04:07:54:b6: a5:f0:58:18:a4:ab:ec:8b:5e:b1:10:30:9b:fd:c3:9e: 02:7a:88:f5:d7:31:72:6a:d4:ec:c6:de:43:c4:73:bf: 59:0c:e7:3f:cb:0d:fb:37:41:2f:1d:68:3c:1f:bf:d1: c8:71:80:b1:17:31:39:14:12:74:62:6e:af:c7:99:fe: e1:63:58:02:ad:59:10:5b:f5:cc:62:53:bc:93:47:58: 8d:28:e0:27:db:e0:ee:08:66:e5:47:cb:19:5c:8e:7f: fd:ce:e1:ea:5e:d8:62:98:15:f7:c1:89:ec:fb:5d:a9: 28:80:eb:05:2b:bc:80:80:b2:f0:e4:f3:44:4a:fd:17: 2a:de:0b:65:09:e9:9c:f1:8e:f3:f6:5f:9d:07:36:fc: f3:77:36:ba:55:3d:9d:3c:28:cc:ad:0b:7b:ac:9e:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:50:6f:fa:17:5b:d8:4e:8a:18:1a:57:a8:f5:9f:4c: 2e:e3:a6:ef:71:8d:37:b4:1d:f2:ea:f9:23:93:68:1e: 05:5d:04:aa:ca:ab:4f:2a:b7:53:d7:f4:d7:07:06:b8: 83:8b:a6:0c:f2:8e:9a:5b:1a:7d:b6:ff:19:a7:62:d6: b7:7f:6c:12:5a:d3:ee:4b:9e:04:7e:42:68:e0:85:c0: 84:54:98:4e:3a:6d:65:c0:9d:41:ac:51:ff:14:b1:37: 09:a3:8a:10:89:9e:7c:90:41:a1:f4:d9:eb:d6:65:e6: f0:d4:ec:c5:60:df:70:56:71:c4:80:a1:77:bc:92:2b: d9:23:6a:c7:27:09:1b:c1:ef:73:74:6d:30:89:cf:8b: c1:be:5e:39:21:af:00:48:ac:47:e2:61:6f:a6:fa:34: f6:4f:8c:08:92:b2:f8:c7:2c:e3:e4:67:5f:7f:dc:27: d9:28:b6:cc:f8:1d:8a:0e:9f:f7:ab:93:26:f1:82:38: 41:b7:2a:2c:c7:0c:47:37:e1:b1:3e:93:b6:6b:fc:66: 70:97:3c:41:01:dc:d4:0b:2a:97:f2:b7:03:7a:26:47: 70:b1:da:b3:94:db:41:ac:2d:1f:06:e0:8c:6c:cf:75: 4f:8b:d5:22:fa:19:db:50:a8:5c:46:a1:15:4d:15:65 Fingerprint (SHA-256): 5B:ED:A1:29:46:49:C7:1F:2B:22:C4:FE:3F:6E:BD:29:0A:1B:53:13:43:5B:35:98:B7:41:82:95:6E:F4:E5:37 Fingerprint (SHA1): 97:4E:7E:4A:BE:92:90:79:5E:F2:1B:8D:AB:0F:2A:E2:55:65:BD:8F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:48 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:29 2023 Not After : Tue Jun 20 19:38:29 2023 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:c5:1a:4f:58:13:a0:09:9d:ca:42:81:c9:85:f5:89: 52:b0:9c:6d:70:11:4e:5e:1b:c1:a5:b0:7b:6e:4f:cc: 28:09:c2:b8:d6:7b:1a:0c:de:e9:09:ec:06:c5:d2:d9: ae:a8:b3:64:ed:92:c2:a6:ac:f9:8d:95:5f:af:eb:0f: 0e:d4:47:28:37:98:2e:ed:77:93:89:90:80:b2:56:1c: 2f:7e:c8:47:fa:46:ee:4f:b7:16:b3:1e:7f:d6:29:14: 14:0c:3a:e4:b3:91:33:72:51:dc:e9:ae:c9:1e:c4:8e: d0:eb:6a:d3:41:9f:36:a1:03:70:2d:7f:72:f0:ca:ec: 58:ee:b2:93:fb:ee:8d:4c:f4:64:f2:6f:5d:11:ad:16: 16:ee:9b:52:d3:cb:0b:4f:22:a3:be:c9:fa:bc:98:19: b7:f1:33:79:26:0b:77:7b:17:0b:77:a8:8c:1d:15:d9: 59:d0:a8:7b:8e:6f:a5:b0:02:30:09:2a:83:f6:7d:69: 1c:7e:ec:e3:97:42:d1:38:23:88:63:e4:10:ff:77:d1: de:3e:51:63:e9:be:cd:18:ec:a1:dc:38:01:73:ee:86: 68:eb:42:33:9d:a9:4e:97:64:2a:be:ee:99:0a:55:7a: f7:42:a1:08:7e:fc:22:37:fe:2a:b8:e6:e3:8d:6a:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:63:fa:f2:69:2c:7c:e8:b1:73:6d:6b:42:cd:39:72: 2e:c5:af:4d:67:25:20:0e:5c:f2:46:6b:eb:23:b4:cd: d3:d2:06:22:68:03:72:f2:07:04:4d:87:80:47:bb:8a: 41:7e:d4:29:3b:65:09:70:84:86:8e:81:50:59:2b:04: fe:47:6a:5a:c7:a2:02:05:81:b9:2c:72:34:d3:19:c4: de:99:80:9f:57:30:c9:b6:c6:98:21:7f:04:8d:c1:de: 4b:41:36:26:02:b5:e0:5e:f7:78:af:cb:88:c4:c1:21: a1:2b:5f:bc:31:cb:f7:c9:62:cf:b2:2b:0c:d1:87:f2: c4:41:17:ca:41:14:1f:61:d5:14:6e:f4:39:51:b4:10: 61:4e:69:52:1d:21:f4:ef:39:89:ec:0a:f8:b2:77:96: 78:42:81:e8:c6:30:d8:f5:62:d0:19:50:02:61:40:11: 31:71:c0:22:74:ce:70:a2:9c:7c:ef:0f:47:67:fe:d9: bf:c9:b0:70:bd:48:28:86:f3:a6:d6:71:52:17:41:cb: 6e:7e:0a:75:da:c8:53:4f:ea:fe:15:33:43:42:19:91: 8e:6b:3c:78:d1:8b:85:c4:76:d4:e3:5e:b7:25:43:31: 6d:94:a1:00:c1:fc:16:9c:46:8f:c5:2a:65:69:f1:1a Fingerprint (SHA-256): 14:24:A6:B1:F3:F2:8E:BD:2B:47:E9:35:BE:7B:57:A3:72:B7:C7:83:E6:4F:F8:18:6D:67:46:76:8B:ED:12:48 Fingerprint (SHA1): CA:59:F9:42:8B:FC:8B:97:88:10:F9:B1:2E:18:FB:08:17:6D:D5:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:49 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:30 2023 Not After : Tue Jun 20 19:38:30 2023 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:76:55:10:8f:d4:26:93:27:0a:90:c0:24:c8:a6:d7: 7d:c9:0c:6c:ec:0f:64:a1:3f:b6:ac:75:90:0e:0c:ca: 8d:b1:a5:5b:5a:f0:9e:84:f8:a2:e1:e9:9b:94:9a:80: e7:37:ca:a5:49:15:53:b7:ac:6d:f7:45:92:8f:1b:59: 7d:2e:e7:f7:79:94:bb:17:c9:6b:48:3f:9e:32:66:b4: 7e:a2:37:3a:28:50:87:f7:fe:e2:b9:81:c8:7f:4e:93: 38:89:4e:be:14:9b:99:fd:c7:6c:88:56:62:f4:81:93: 5e:76:4c:0e:96:ba:fc:01:40:cd:35:31:37:f3:7b:a6: 4c:48:d8:02:d3:5d:05:9b:3f:a7:50:80:38:dd:1d:85: 8e:5f:ad:12:1f:b8:ea:7a:4b:f7:f0:a2:50:bf:09:fd: c9:26:f5:38:86:9d:03:ad:85:65:d4:f2:d2:4a:c4:db: b8:2c:cd:f8:b7:81:99:93:fb:fb:b0:bf:56:51:12:49: 16:85:63:88:a2:b1:ae:b4:a7:ac:c0:1e:83:e6:3c:8f: c3:f5:3c:76:8a:91:9d:aa:06:76:8e:9f:03:52:49:83: 94:e2:7c:77:92:93:ed:cd:0a:b9:47:57:7a:c5:0c:69: 58:97:23:3c:dc:02:d8:9b:4b:c2:65:bf:fc:7d:48:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:83:5a:43:4b:59:13:a4:77:50:71:9b:f6:40:92:a0: 2f:6c:3e:c9:d8:a6:e2:9c:22:b6:b9:3a:40:be:cd:a3: e7:eb:21:13:6b:81:77:4d:9c:28:66:2f:b5:a0:83:55: 59:8d:06:12:2f:25:e3:83:8b:75:26:45:a3:94:b2:a8: be:ed:6e:58:e6:45:04:29:09:b5:95:36:60:98:49:d4: be:45:1e:7a:ea:09:32:92:c0:a6:a7:d0:b7:98:0b:ed: c5:c8:e6:a8:8d:d9:de:14:d0:8a:c0:2b:ec:fc:c3:bf: 8b:52:3a:9a:0e:9b:4e:73:bb:36:12:a3:ad:df:13:e0: 93:6c:76:3b:06:21:5d:47:af:6c:fb:ad:d8:44:99:0a: 17:06:e0:9d:6a:3c:43:72:2f:f4:84:8a:76:7a:51:d9: da:9a:04:7e:97:14:b4:22:3c:5f:28:1d:0f:8f:f4:52: 3e:c6:21:dc:b2:9f:f9:94:f1:c6:05:a3:ec:5f:3b:64: 14:29:cc:14:41:8e:02:04:5d:17:2e:34:d4:4d:ae:83: 00:74:77:63:c8:4a:ef:87:10:c4:aa:30:c1:f9:41:19: af:15:f6:7c:13:85:4c:05:1b:7f:ef:22:48:1f:40:4c: b4:1f:03:85:fd:35:e7:63:d8:cb:04:a1:1e:70:e7:6f Fingerprint (SHA-256): 08:97:7E:A2:F8:72:2F:D7:C4:43:2E:2B:69:D2:C2:7B:CE:EE:C4:07:3B:4E:BF:82:F5:61:48:56:C7:56:D6:F6 Fingerprint (SHA1): 99:F8:ED:9D:EE:9C:5D:34:3F:6B:73:F2:21:7C:9B:AB:C9:C5:12:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:4a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 19:38:30 2023 Not After : Tue Jun 20 19:38:30 2023 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:b2:77:90:1e:a1:72:e1:ff:57:0f:5a:2c:d7:de:77: e8:38:86:b8:0e:bc:aa:21:f2:9f:18:ed:18:54:ad:d1: e5:3e:38:ee:8a:ee:6f:94:92:5f:5e:11:31:e9:2f:eb: 10:fe:a3:bb:4e:5f:d6:30:80:9e:6e:dc:1a:27:33:82: cc:05:c6:ec:3f:96:3e:d4:a9:23:e7:24:f7:9f:c9:e2: 44:9e:1c:2f:84:7c:0b:bf:66:ad:35:97:3c:c6:a6:e5: fa:49:41:2b:6d:96:4b:02:e2:68:31:71:2e:d8:6d:b6: cf:fa:c9:b7:d9:cf:52:c8:9b:49:3d:8d:da:cc:3a:aa: 97:a8:a9:f1:e0:d2:f0:c4:47:b4:b8:25:75:2b:3e:09: 55:a9:64:d7:c6:01:4d:98:f8:35:bf:8f:19:70:36:9c: f1:c9:8c:a1:6a:db:5a:be:4c:5e:86:7a:5e:cd:91:89: ba:bb:34:ba:f2:a2:4c:28:d2:db:a2:fa:0e:e1:1e:bd: f0:ea:4e:a5:c6:b9:0f:c9:e8:ab:1e:6d:d6:dc:79:db: 50:34:d5:91:76:66:4a:60:2d:e3:d2:d3:97:cc:37:37: 22:56:f1:77:d3:66:ee:87:19:99:54:26:e0:e9:4a:ad: fb:42:bc:f3:72:14:17:30:ee:2e:2d:fb:a1:dd:4d:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:fc:e0:b5:37:77:44:29:03:c5:98:d7:24:04:cd:67: df:c0:cc:13:66:0e:95:1d:11:5d:73:04:e9:75:9d:88: 0b:26:62:92:8a:94:79:7e:63:71:5a:d0:a0:9f:c1:08: 1e:bf:19:4d:18:20:2b:8e:ab:50:9c:bd:db:a1:22:2d: 01:6f:32:aa:0e:61:2c:30:2d:99:83:1d:2a:d3:75:70: e8:ed:51:e4:39:cb:ff:4e:40:fa:3c:96:6a:31:41:fe: 46:3b:54:a5:56:0f:24:a0:f6:a9:32:58:9b:bd:02:83: 98:80:63:b2:d0:4e:ba:62:88:cc:de:8a:b8:38:e7:82: 98:69:8d:b5:d3:49:07:99:5a:11:87:91:72:ea:7c:ad: f7:84:83:d0:b1:cd:4f:0f:33:94:6c:48:01:b8:2e:c5: 38:68:be:83:4c:8b:a9:f1:3e:d0:dc:c6:77:80:b7:4f: 8e:aa:98:5a:c1:c2:8e:86:e0:5f:3e:22:e2:c8:15:7b: 43:a9:25:e0:c9:21:6f:92:8c:da:02:77:39:4a:41:e9: 5b:17:08:ee:d8:fa:54:49:0c:ee:03:c0:3a:d2:0f:be: ff:dd:0c:f0:96:a1:de:41:a5:b1:93:18:bd:af:5a:49: 7c:3f:d7:fb:95:19:b3:d1:cc:18:4c:c6:4a:97:cd:c9 Fingerprint (SHA-256): 27:98:3E:A0:C8:49:5B:CE:02:59:3E:37:36:0B:4C:20:CA:98:F1:F8:12:8B:77:4F:98:E9:CE:0E:D4:98:64:34 Fingerprint (SHA1): 04:7D:99:66:4B:FD:7A:FA:60:E6:91:78:F6:AF:70:32:46:44:1F:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:4d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 19:38:32 2023 Not After : Tue Jun 20 19:38:32 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:4a:3f:14:33:b4:df:81:3a:a7:bc:97:8e:e9:a0:75: 08:cf:2a:1f:7e:33:d3:bb:48:09:10:72:e3:00:30:df: c0:39:ae:89:68:64:e8:f7:f2:ec:8d:5e:0e:4d:7a:44: f8:c9:14:8a:3c:aa:66:66:04:82:a1:e6:e6:c4:99:d0: ef:36:2a:ae:12:b9:fb:55:df:91:7d:6a:9d:85:e8:c9: 13:b2:31:63:14:37:92:60:56:09:3e:a1:d5:b4:2f:aa: 11:63:00:c9:2e:34:d5:d9:65:9d:76:f3:2d:b0:13:67: d9:41:d7:71:1a:01:34:22:90:c5:a1:23:d4:c5:cc:01: 4a:54:91:1d:11:37:71:24:53:c0:c0:f1:9b:2b:fe:40: f1:c1:9f:e9:a4:4e:1f:52:19:1e:e9:15:0b:46:64:85: 40:e1:70:34:1e:20:68:ab:0f:3d:6f:1c:77:28:1f:8b: 7f:63:50:00:29:90:31:8f:6a:28:0f:2c:08:b1:af:cf: 55:4a:85:15:e4:da:4f:83:c6:37:70:d1:9a:0d:64:a5: c4:4e:86:b3:20:18:a9:33:24:a4:28:93:93:6c:63:0e: 96:60:01:42:01:66:70:3c:13:3f:e7:05:3c:a4:21:63: 99:09:47:b4:eb:d7:9f:90:92:38:08:73:44:40:a5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:e4:85:dc:06:ff:20:ca:99:e8:b5:b4:5c:6c:aa:f1: 45:8b:8b:5a:c7:76:f0:5f:19:f0:23:9d:8d:32:8d:42: 99:94:d9:f4:40:6d:ea:76:b5:f0:d5:b3:3b:86:08:9b: 00:c8:c1:09:45:d7:fc:01:84:38:fc:02:db:50:da:01: 1a:0b:31:94:c2:2d:0b:4b:38:95:eb:94:7c:79:ad:83: 5b:73:2f:28:ce:71:37:79:9a:8d:88:a5:1e:de:35:3d: ef:b2:52:3c:18:3d:e9:d3:3a:63:89:1b:71:71:62:cf: 78:73:d5:dc:40:c4:2a:6b:a0:47:7a:ed:f1:79:1d:70: df:51:fd:6e:13:92:88:cb:fd:61:ef:14:ae:5e:b2:15: 59:93:30:cf:1d:6d:dd:b4:3d:62:4c:47:09:7d:a1:c4: 99:7b:78:a9:ed:a3:ca:6f:15:b7:81:08:5e:2e:09:41: c5:21:0a:4a:0d:b4:95:a8:d6:a3:7f:99:b4:43:ff:b9: af:32:74:34:63:31:0c:88:7a:34:47:57:68:07:5c:3f: 41:5b:f0:58:78:80:ff:1d:06:ef:e9:91:5e:dd:bf:98: bc:9c:fd:d7:1f:eb:bc:d2:05:74:21:a2:3c:2b:49:58: 01:f5:58:0d:88:8b:ea:e9:d0:be:44:8b:45:78:0c:3c Fingerprint (SHA-256): 67:E2:D7:F7:53:EC:E6:9B:74:A9:24:FB:E9:47:49:26:BC:1D:C8:5C:0A:8E:EC:6F:8C:72:E8:00:14:B8:BC:1E Fingerprint (SHA1): 29:54:A1:0E:32:5B:B2:43:0E:48:6A:E6:83:D4:33:23:28:2B:74:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:42:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 19:38:34 2023 Not After : Tue Jun 20 19:38:34 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:12:be:bd:69:bf:c7:03:a8:ba:a8:25:24:ec:96:f4: e2:49:c0:f5:ee:b8:76:8e:fb:4c:96:12:37:f0:e3:e5: a4:82:22:73:50:b2:98:ac:b2:31:ab:90:79:2b:71:cb: 81:92:d3:a6:b5:bd:48:03:07:4e:44:2b:43:e7:8e:c4: bc:7c:07:d8:58:10:c4:1b:e1:a4:7e:21:69:07:78:d8: 8d:e7:4b:5a:bb:f3:76:04:65:da:44:fd:cc:c3:42:59: 4c:19:5c:79:ff:d7:5e:6f:db:8b:32:4b:84:29:d2:c2: ac:9a:38:cb:a9:de:fe:7b:b8:0f:09:96:7a:a0:77:da: 3e:c8:c0:ab:fb:2a:f1:ee:c5:2b:44:9a:9d:56:75:62: 4e:53:75:11:53:9d:64:ae:97:15:dd:0e:ee:92:94:8f: f4:75:6d:be:f8:38:b1:27:7b:51:f6:95:46:2b:b6:77: 71:a6:7e:f4:29:da:1c:a6:11:ee:9b:bf:17:37:97:e0: 03:86:6d:17:cf:05:83:43:21:90:0d:52:59:dc:1f:a1: 1e:b7:04:57:32:5a:9b:be:51:3d:ce:9d:8b:9c:56:dc: f2:f8:b8:4c:ab:0e:5d:ce:3c:79:6b:19:f0:33:1c:bc: 9a:86:db:24:3d:54:d3:17:0d:e0:58:32:02:cb:04:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:1a:83:60:b7:da:3c:46:91:84:56:c8:0a:4f:50:1e: 98:9f:03:10:9f:8c:3b:cd:8f:b4:c1:d1:63:d9:c4:b1: ce:e7:71:7e:e2:81:37:0a:94:af:fb:8d:21:e1:88:cb: 1c:8d:94:5e:0b:fa:16:52:f5:e2:99:bd:9e:a8:40:f2: 80:a8:95:48:b1:bb:ed:eb:e9:7a:e2:1e:b7:da:5c:e5: 43:c9:99:94:b4:f4:ea:48:47:e3:eb:2b:46:d8:82:7c: dc:32:df:ca:43:e2:a1:bb:df:e2:64:92:d7:67:c0:c1: 2f:15:11:cb:f7:c9:1b:68:20:15:2b:29:3a:1c:ae:3b: f9:1c:db:31:a1:21:b5:61:be:78:fb:1e:a9:65:cc:68: 42:19:c3:10:df:ee:35:82:73:19:ac:f2:6a:02:00:92: e6:4c:3b:e8:15:28:8b:53:ee:df:8b:9d:bc:e2:9b:08: c4:f9:bd:55:fe:93:61:bf:a6:4d:69:92:51:71:7d:7d: bc:c6:6a:10:a9:6e:13:4e:96:33:1c:2f:ae:c7:ba:b6: 55:b5:fa:fe:4e:e4:8b:1c:4c:30:40:45:21:a9:42:3f: 88:5c:e0:74:57:bf:93:1b:88:0a:b9:0e:3e:58:79:21: fd:13:24:a7:35:fb:01:30:85:4e:b4:d0:ed:95:c5:d9 Fingerprint (SHA-256): E8:A5:F5:9A:64:BD:D3:6F:60:05:70:E0:25:6F:62:88:AA:D6:0E:57:B1:49:75:87:CD:99:1F:8D:E8:F6:E8:39 Fingerprint (SHA1): 06:F9:73:99:70:0B:44:46:76:D7:D7:3B:9E:81:FE:B1:12:A6:F5:70 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> dsa 0416973544741ae3b13abe2d848d6314860b666b NSS Certificate DB:localhost.localdomain-dsa < 1> dsa 77e45282ce5a8030b7fd8af60cac0d09c4b84f8f NSS Certificate DB:localhost.localdomain-dsamixed < 2> ec f058457352c6f05c6c7f415d2507ab3db353b55e NSS Certificate DB:localhost.localdomain-ec < 3> dsa df6fb70329e81633d8045d1c02bbc8e40e19b9dc NSS Certificate DB:localhost-sni.localdomain-dsa < 4> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 5> rsa f8853112152d95911d5bc8b29c6db0ba144c3ab2 (orphan) < 6> ec 511543b1db7abbb2ec740201997ce1d08d82ef78 NSS Certificate DB:localhost.localdomain-ecmixed < 7> rsa 86581616c4d9c264368a45ec20ec8cc3e0cfc4a2 NSS Certificate DB:localhost-sni.localdomain < 8> dsa 2bbd527406d47baba54f717b17e180974b015bd4 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 0ffd07abf50757ebe82f017b0277d8dd6016ad73 NSS Certificate DB:localhost-sni.localdomain-ec <10> rsa 93034391d8897cded46e4002c46ac1d5aa2ee296 NSS Certificate DB:localhost.localdomain <11> ec dc9b6143f46f894940bb12537995dd1589f31bc6 NSS Certificate DB:localhost-sni.localdomain-ecmixed cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 20 19:39:33 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 20 19:39:33 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:66:08:98:2d:07:6d:18:e4:dc:ae:f0:ed:e2:8a:2d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:83:e3:f3:fd:34:a7:cb:b3:04:b9:20:04:28:5b:28 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 19:37:47 2023 Not After : Mon Mar 20 19:37:47 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:b0:53:a3:c7:3c:71:90:92:69:f6:96:45:99:92: d1:aa:c2:57:76:61:b1:4c:3a:98:cb:3b:25:5a:fc:e5: b4:39:b9:e8:8c:61:68:21:fe:35:92:24:1e:2e:59:48: 02:de:4f:30:3e:e4:48:e1:7a:6c:d0:0c:cc:3e:e2:aa: 60:b3:97:00:3c:e9:bc:61:6b:fc:5a:e7:7c:09:62:bf: 47:f3:88:63:98:a7:74:ce:0b:ce:06:e0:d8:97:c0:70: f2:b5:fc:71:77:66:97:90:99:88:7b:4e:f7:81:70:74: a7:84:31:ed:17:c3:dc:97:9b:e6:8b:a8:0a:a2:bd:cb: 22:93:0e:23:cc Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:23:76:3e:9e:30:2b:24:de:a2:0c: 64:2f:f5:0b:6f:92:ac:69:d7:02:d9:99:3e:fd:bd:52: 3e:aa:04:c8:fc:98:28:87:0e:12:1f:9e:26:bf:f2:3f: c7:f5:69:c9:28:d5:6b:b4:e3:71:7d:f1:1c:66:00:19: 96:65:72:da:b2:05:1a:02:42:01:77:81:80:ad:50:5d: b5:c2:73:f1:cb:22:c8:5d:0c:a8:36:23:32:ab:87:69: c5:c2:67:a2:7f:f7:35:4c:e1:d7:42:b3:06:af:e3:f7: 27:cf:27:ff:cd:42:f9:8f:bb:00:7f:ea:9c:0e:fe:de: d0:bb:33:c4:b5:9c:9e:b6:bc:71:2d Fingerprint (SHA-256): FA:2E:E1:93:2D:9D:7B:00:F8:F5:24:4C:D9:73:90:B7:10:48:EA:CD:71:18:D7:AA:BA:BE:2A:C0:8E:49:A5:44 Fingerprint (SHA1): 9A:2D:A7:C1:4A:2F:2B:23:1E:AE:6A:08:24:F7:40:60:2B:B9:D6:0F Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 19:38:09 2023 Not After : Mon Mar 20 19:38:09 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:f9:a6:e6:88:fb:bc:a2:07:db:06:fe:1d:22:6c:e3: be:03:ad:7c:b6:e5:82:58:89:ed:3d:3d:48:b1:63:ff: 35:18:66:94:e9:9f:fc:df:56:aa:72:70:7a:03:36:24: a1:8a:7e:5e:a7:04:f9:c5:d3:03:af:be:76:4f:eb:28: f0:ea:e1:60:1e:40:9c:42:0e:8b:a3:1a:5e:79:82:d7: 07:ff:e3:93:ea:9a:f9:1a:c6:95:21:69:47:af:11:81: 65 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:eb:f0:6b:8d:12:54:07:53:7f:10: 55:2a:c1:bd:9a:1b:54:7d:c5:ac:f1:e3:1f:e2:38:af: 97:17:11:de:53:4a:85:16:72:d9:b5:44:8a:96:54:da: 13:1f:3e:2e:29:9b:7d:2e:a2:9a:32:6f:df:84:80:ac: 08:54:8e:b4:2b:e4:d6:02:42:00:8e:3f:a3:d2:d9:78: 01:8b:2a:75:35:ee:aa:a1:f7:aa:cf:24:66:24:d2:df: 50:4b:04:7d:01:ac:cc:6a:43:39:01:cc:60:70:33:fc: f7:26:af:e0:dc:21:3e:6f:c4:bc:13:43:8a:78:94:b2: e4:21:b9:92:2c:3b:e8:86:d6:ed:29 Fingerprint (SHA-256): C2:08:1A:1A:19:60:BA:EA:23:0D:63:0F:36:4E:A5:96:07:A4:32:7B:6D:B6:14:8A:71:7B:C2:EB:22:41:71:3E Fingerprint (SHA1): 41:E4:B4:0B:B7:96:B1:81:1E:20:27:F5:55:0F:39:68:DF:52:F3:E0 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ff:89:f5:41:a5:c9:14:f8:6f:47:30:0a:e0:51:83:fc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 19:37:47 2023 Not After : Mon Mar 20 19:37:47 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:b0:53:a3:c7:3c:71:90:92:69:f6:96:45:99:92: d1:aa:c2:57:76:61:b1:4c:3a:98:cb:3b:25:5a:fc:e5: b4:39:b9:e8:8c:61:68:21:fe:35:92:24:1e:2e:59:48: 02:de:4f:30:3e:e4:48:e1:7a:6c:d0:0c:cc:3e:e2:aa: 60:b3:97:00:3c:e9:bc:61:6b:fc:5a:e7:7c:09:62:bf: 47:f3:88:63:98:a7:74:ce:0b:ce:06:e0:d8:97:c0:70: f2:b5:fc:71:77:66:97:90:99:88:7b:4e:f7:81:70:74: a7:84:31:ed:17:c3:dc:97:9b:e6:8b:a8:0a:a2:bd:cb: 22:93:0e:23:cc Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:23:76:3e:9e:30:2b:24:de:a2:0c: 64:2f:f5:0b:6f:92:ac:69:d7:02:d9:99:3e:fd:bd:52: 3e:aa:04:c8:fc:98:28:87:0e:12:1f:9e:26:bf:f2:3f: c7:f5:69:c9:28:d5:6b:b4:e3:71:7d:f1:1c:66:00:19: 96:65:72:da:b2:05:1a:02:42:01:77:81:80:ad:50:5d: b5:c2:73:f1:cb:22:c8:5d:0c:a8:36:23:32:ab:87:69: c5:c2:67:a2:7f:f7:35:4c:e1:d7:42:b3:06:af:e3:f7: 27:cf:27:ff:cd:42:f9:8f:bb:00:7f:ea:9c:0e:fe:de: d0:bb:33:c4:b5:9c:9e:b6:bc:71:2d Fingerprint (SHA-256): FA:2E:E1:93:2D:9D:7B:00:F8:F5:24:4C:D9:73:90:B7:10:48:EA:CD:71:18:D7:AA:BA:BE:2A:C0:8E:49:A5:44 Fingerprint (SHA1): 9A:2D:A7:C1:4A:2F:2B:23:1E:AE:6A:08:24:F7:40:60:2B:B9:D6:0F Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 19:38:09 2023 Not After : Mon Mar 20 19:38:09 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:f9:a6:e6:88:fb:bc:a2:07:db:06:fe:1d:22:6c:e3: be:03:ad:7c:b6:e5:82:58:89:ed:3d:3d:48:b1:63:ff: 35:18:66:94:e9:9f:fc:df:56:aa:72:70:7a:03:36:24: a1:8a:7e:5e:a7:04:f9:c5:d3:03:af:be:76:4f:eb:28: f0:ea:e1:60:1e:40:9c:42:0e:8b:a3:1a:5e:79:82:d7: 07:ff:e3:93:ea:9a:f9:1a:c6:95:21:69:47:af:11:81: 65 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:eb:f0:6b:8d:12:54:07:53:7f:10: 55:2a:c1:bd:9a:1b:54:7d:c5:ac:f1:e3:1f:e2:38:af: 97:17:11:de:53:4a:85:16:72:d9:b5:44:8a:96:54:da: 13:1f:3e:2e:29:9b:7d:2e:a2:9a:32:6f:df:84:80:ac: 08:54:8e:b4:2b:e4:d6:02:42:00:8e:3f:a3:d2:d9:78: 01:8b:2a:75:35:ee:aa:a1:f7:aa:cf:24:66:24:d2:df: 50:4b:04:7d:01:ac:cc:6a:43:39:01:cc:60:70:33:fc: f7:26:af:e0:dc:21:3e:6f:c4:bc:13:43:8a:78:94:b2: e4:21:b9:92:2c:3b:e8:86:d6:ed:29 Fingerprint (SHA-256): C2:08:1A:1A:19:60:BA:EA:23:0D:63:0F:36:4E:A5:96:07:A4:32:7B:6D:B6:14:8A:71:7B:C2:EB:22:41:71:3E Fingerprint (SHA1): 41:E4:B4:0B:B7:96:B1:81:1E:20:27:F5:55:0F:39:68:DF:52:F3:E0 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 49:f2:ff:95:78:91:ad:8a:56:51:b5:90:35:df:89:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a7:5d:ef:c3:d6:d4:2f:f1:b1:4a:9a:f5:7a:05:38:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:8b:8f:af:e8:3f:ea:73:ec:8f:3d:58:78:5b:d9:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a6:eb:c5:56:ac:75:26:88:ff:1b:87:bf:a0:81:5a:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e9:7e:2b:a3:f4:b4:b7:72:11:27:4f:5c:17:e7:8a:7e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5e:4b:fa:98:f7:88:a4:2e:bb:6c:78:aa:dd:01: 94:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9f:69:95:b5:11:38:5e:79:75:3e:95:f5:76:eb:af:35 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 55:53:c2:8d:5a:f5:e6:7d:9a:ac:55:e1:33:f7:99:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2a:5a:ad:87:35:4c:b0:ed:a5:7b:b0:37:20:be:98:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 82:a9:ad:0d:09:8f:0b:da:9b:6b:78:0b:d1:e9:8c:4a Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6b:c0:09:f7:e6:2d:1b:d2:e2:5e:78:46:c2:3c:59:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 51:09:b7:3e:a5:ea:22:f8:da:d8:6f:cd:8d:a6:c8:40 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c6:f8:2a:7d:20:bf:21:74:bf:6e:8e:d1:ec:f7:58:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 68:41:80:67:9c:e4:34:52:8d:8f:9b:8c:81:f0:96:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f1:59:66:c4:66:21:31:74:c3:8c:09:5e:71:b0:b0:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:7a:33:f3:16:4a:ac:c1:5f:5c:4c:21:ba:be:8d:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2b:87:85:e2:a9:4d:f1:ee:31:aa:42:88:a4:5f: 8b:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 2e:62:87:45:5e:b0:2c:8f:88:b3:45:2b:f3:30:ff:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:93:b3:7d:81:7a:87:6c:9a:1f:21:a2:9a:89:dc:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b6:7d:c8:c4:cb:8b:61:3c:73:b2:9e:52:71:43:5e:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a4:18:1b:e5:f4:a4:9b:2a:d7:61:f5:61:38:d2:59:49 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8f:19:05:b1:d4:ad:a0:f3:bf:e1:b7:20:ea:b1:ba:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:93:4b:d8:42:cd:d4:41:99:81:dc:33:5c:11:35:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3f:fc:ff:53:fc:84:5a:e9:60:5e:a7:49:3c:37:61:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a2:03:4a:39:5a:e9:50:f1:fe:04:1c:4b:cd:12:81:23 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1e:80:ff:88:a6:f4:59:d3:fb:47:fb:3c:56:d7: ed:a6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: be:80:e8:05:2d:48:25:3d:e6:be:f1:20:e9:b5:1b:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:ac:75:c0:a7:41:97:e0:06:78:19:d3:cb:28:42:aa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:5a:0d:3c:aa:6a:58:01:31:8a:e9:24:d9:e7:e5:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:5a:bc:57:6f:23:0a:7d:67:e5:30:53:8c:3b:22:4d Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 46:e3:61:e5:30:8d:67:f7:44:8f:71:c9:b9:4a:77:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 95:3b:b5:15:25:81:11:ec:f0:38:48:33:28:a4:61:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 2e:50:28:3d:61:84:8f:44:13:18:04:d5:85:dc:00:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 48:90:af:ca:bc:4a:ad:da:6e:7c:e2:5f:84:f3:1c:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 7b:70:9c:5c:91:73:39:63:09:3c:a2:10:61:69:cb:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:ab:63:aa:96:c9:24:85:67:4d:1e:a0:8e:21:5a:e7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6d:d1:0d:eb:85:b1:f0:19:71:b3:c7:bc:c4:30: f1:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9e:f6:88:13:97:20:37:91:7f:25:c6:42:a9:9d:5f:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:a3:70:f4:b1:5a:14:f6:69:17:b5:ad:c1:10:ef:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9a:d4:05:31:22:d6:f9:56:f4:0f:51:cc:98:90:7c:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a2:28:3a:a3:06:20:b8:02:e4:4e:33:48:fd:83:c8:ca Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 20:90:24:62:85:33:5a:f1:d8:27:85:10:95:49:e5:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 30:26:e6:e3:dd:2c:f5:4f:e2:c4:3d:c0:06:9a:19:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a1:6d:21:59:b8:35:9c:55:7b:c0:7d:10:aa:77:85:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:15:45:3a:bd:6c:80:49:1a:b0:c5:8b:7d:8c:f9:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ee:76:e1:19:43:b9:32:fe:f7:99:dd:7b:f3:32:06:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 91:69:f7:6d:e0:26:f9:13:5e:e9:f1:24:8d:3d:46:09 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:43:0a:72:84:2d:32:c6:82:d6:8b:31:aa:c0:d1: 37:95 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 54:dd:7c:a9:48:85:5e:92:98:e3:18:e2:0b:86:ea:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f2:4e:e4:a9:2b:f0:7e:55:ce:3f:5c:37:0d:22:5a:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: f7:17:18:8c:1b:e4:24:26:d3:06:dd:cb:6c:c9:6f:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9f:88:cc:d8:eb:05:bb:14:c7:8e:73:4c:e5:ff:51:b5 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 6a:b1:10:86:20:2d:6a:69:2c:93:25:39:0e:cd:f1:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 36:d3:c2:6a:d0:e4:ef:d6:4a:ad:3a:f5:0d:c1:28:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:bf:01:68:63:61:c7:0d:1e:b9:2b:f3:4d:d5:13:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:a9:47:e8:7e:34:49:ba:f3:18:ec:7f:5b:85:24:28 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d2:33:ae:71:5d:38:7d:01:68:c7:71:33:86:ee: 13:16 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:49:6b:dd:ea:23:e9:22:2a:0c:69:61:71:c1:f4:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:cb:fb:5b:3a:99:eb:43:f5:79:32:d1:e8:a3:e6:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:68:2e:1e:13:b9:be:6c:aa:ce:bb:d0:b7:9d:fd:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:af:b8:d4:52:56:91:be:3a:79:f5:48:a7:f5:89:8f Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d0:72:58:d0:37:75:cf:56:eb:4a:c6:d1:3e:60:86:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 87:2c:1c:b8:3c:74:70:2d:1d:5f:e9:a6:86:3d:13:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 06:20:1f:e1:79:99:2c:08:76:42:16:c5:95:6a:eb:cd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 73:8f:8d:58:18:d3:3c:f1:c5:05:64:92:40:b3:5a:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 87:3e:bf:58:ab:10:ad:3a:36:c9:a2:7c:23:93:52:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:d9:7f:2a:7b:05:04:0e:39:1b:55:a1:02:b4:45:58 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:71:5d:85:e1:5b:40:d8:05:60:b8:5d:dc:47:72: 1a:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 50:2b:2b:3c:f6:d9:12:4c:82:70:31:50:91:e6:ba:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:fc:11:52:7b:74:72:a7:cf:20:29:14:80:80:76:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 99:54:5b:88:16:33:53:3a:62:a4:67:65:3c:2d:a6:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ba:0f:ae:ef:97:87:d4:a5:a2:ce:53:64:8a:cc:43:83 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5a:b0:f7:db:86:a8:db:5e:38:de:bd:1d:1b:29:b4:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e6:02:05:63:2c:9b:58:65:ae:f7:dc:46:77:92:ec:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8b:6b:f9:2c:fa:68:7d:06:e3:ce:1d:aa:f9:07:91:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4f:c5:a9:ed:1a:86:c6:90:a1:80:6a:6a:50:06:cc:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 05:f7:90:fc:6c:b1:62:c9:6d:49:52:35:04:c2:ab:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:f0:6f:bf:55:40:0c:51:11:11:0a:c3:42:dd:a9:f3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:64:9a:c7:ff:85:1f:fd:ca:de:64:c2:48:4f:a5: fb:13 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 66:76:e9:b7:48:82:d7:ec:32:2f:0c:b3:e6:64:85:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:b5:a3:7c:9c:ed:04:70:6c:12:37:93:ec:f0:77:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 1d:a2:95:57:e3:73:25:ba:64:08:21:3c:e5:a6:7b:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 1d:61:f5:05:90:ed:39:87:da:4c:53:c2:2a:25:aa:76 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c9:6e:66:7c:04:fa:c3:cf:01:43:8e:39:74:67:f2:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ae:3d:c2:e2:a6:9b:44:1f:e2:c6:13:43:de:22:3a:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: fd:47:ce:ed:3d:b2:9c:ee:c7:79:c6:c4:53:d1:b8:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 74:cb:a3:13:83:26:a9:80:a1:bf:3f:af:a3:20:4e:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d2:23:09:df:7c:3d:a4:46:46:2b:e5:37:34:c4:17:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 36:b2:7a:ec:0b:cb:c4:19:e2:2d:91:b8:b7:08:86:42 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8f:05:88:79:ed:42:79:7f:99:2a:e9:94:05:61: 95:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: cf:5e:85:d6:41:ef:19:2a:7d:99:e7:dd:0b:cd:19:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: aa:2a:30:e0:ac:c6:97:d3:05:81:54:44:f2:e1:21:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8f:26:7a:60:f1:3c:b7:90:6f:b0:10:dd:2f:2e:3f:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5e:0a:a9:b8:fb:5d:93:2f:46:f2:ae:ff:2c:19:d1:18 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 28:d5:d2:c8:ab:32:e6:c5:14:81:2e:1a:ee:53:67:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a7:d1:b5:55:eb:45:6b:0d:99:fc:7a:e3:b3:08:70:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:45:fe:72:49:b8:27:e8:0d:6a:d1:0d:9a:f0:61:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:6d:6f:25:7e:d0:39:dc:9d:18:b3:ef:38:1b:4f:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:25:24:df:16:4d:43:4d:eb:a4:92:77:d1:bc:f4:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:af:06:91:a2:f6:6e:f1:f9:44:ac:d6:3e:85:a5:48 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:95:b2:d2:91:24:8f:7a:53:2e:8a:63:cc:7b:77: bd:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:42:f8:ee:b6:4d:dc:ee:3c:ce:f6:e3:94:ce:75:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:b9:a6:3b:62:cb:db:27:b4:88:f4:75:c3:23:81:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:99:53:5c:fb:06:8f:2a:e2:0c:43:66:d3:bd:6d:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:5e:6b:4f:a9:dd:f3:95:3d:74:05:d1:21:3b:01:38 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:f2:37:19:c4:61:f9:70:61:75:ce:c4:96:ba:6a:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: dc:b5:e7:e7:35:b8:38:01:e4:c8:23:c9:b0:2d:1c:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f6:27:45:97:0a:32:31:fc:30:b3:94:f9:f6:c8:81:0c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:71:5e:e5:50:40:d1:8f:6c:bc:0d:42:be:01:a9: 0f:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:aa:03:57:5c:a8:bf:73:c8:ce:56:0d:12:6e:38:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:5d:8a:f3:88:e6:fc:1d:c3:cd:f1:2e:a1:51:0f:24 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:c0:57:b8:a8:61:2e:54:81:af:87:82:3f:29:5a: 7c:5f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:f5:26:4b:bb:16:f9:68:cd:ea:56:00:01:6a:b2:e1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:29:4b:49:ce:d5:14:42:e1:4a:78:b1:3c:f2:c9: 6b:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:36:17:00:65:2e:6d:68:4a:e2:3b:5b:5e:37:48:d9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:99:7b:5d:6b:1b:99:cb:88:df:ab:22:2b:c0:68: f2:35 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:fb:26:fd:bb:11:fa:66:6d:35:89:f5:98:06:46:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:83:1a:75:fe:58:a8:28:94:ba:74:ee:bf:89:df:fd Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:f1:c4:e2:05:d5:8f:33:20:be:c3:a4:3a:a7:7e: f2:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 23:95:8f:6b:13:64:e1:55:d5:49:5b:39:4e:e6:77:6a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:fc:31:41:31:62:b2:de:ac:73:4e:72:9b:3f:35: c8:4e tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5a:f2:37:34:d1:7c:a5:c6:63:cc:83:18:c8:f6:10:8c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:1d:b3:30:28:be:df:f0:95:27:54:1d:08:be:29: 9b:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0c:95:30:88:b3:d7:b3:45:5c:05:c4:a7:92:77:47:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f5:cb:2f:bb:b4:2a:18:a4:b5:7b:c9:e0:83:e8:d0:a0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:f9:8a:06:f9:20:a6:bb:a7:4d:ec:3d:3e:d0:9f: 20:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a0:62:bf:22:98:dc:5f:98:d5:8b:98:65:13:8b:33:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:7b:ab:69:d1:50:ff:d9:d6:f2:68:cf:8a:0d:f5:2a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:6e:09:c1:f4:ed:b0:32:23:fc:0b:6c:0c:1e:e6: ec:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a3:83:9d:c3:28:d4:75:26:60:f2:cf:02:04:3c:73:86 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0f:c6:d5:71:a9:f4:9e:57:e0:92:c5:16:3b:fa: b1:bc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 36:1d:36:ed:2a:d8:12:a8:57:cb:7d:4f:71:ef:d0:0b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:76:74:85:e5:6a:75:26:55:56:c3:26:d1:f6:87: 5f:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6a:4c:55:a5:95:f7:70:5a:aa:0f:be:aa:ea:22:f3:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:2b:35:64:61:47:ac:a8:53:88:8f:45:94:9d:67:41 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:3b:e3:e3:f9:f8:bc:f5:61:0f:19:aa:64:c0:ff: b8:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:e5:cb:fe:1e:13:14:96:16:8b:98:82:ff:c2:46:92 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:5e:c3:5d:79:04:ed:65:e6:2a:9f:c3:fe:66:2f: f6:6b tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:21:c4:76:c8:5a:fa:4c:ec:20:46:a9:aa:75:75:82 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:cd:6e:83:05:51:5c:16:d7:59:52:aa:dc:bd:53: 7b:10 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8e:ba:70:6a:9e:e7:46:4b:d7:9b:71:e2:15:67:df:1d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:0b:2a:8a:6a:4f:7b:0f:64:f7:a4:ed:e8:2e:26:5b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:f9:2f:b6:15:d8:b7:e9:b6:ac:6a:98:26:7b:ed: 82:cc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:ef:9f:81:f2:98:c9:51:94:d1:2f:df:ca:d0:f4:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8d:ac:74:c1:9a:09:4a:e2:34:88:a1:a1:1c:f5:f7:a8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:9d:ac:79:e4:f6:07:95:cb:43:28:0b:1d:73:9b: 63:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:b0:47:f9:e5:b7:98:ba:a8:82:7b:40:d5:9f:c6:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7f:6a:e1:f7:f1:46:96:cf:dd:48:53:c2:b1:74:55:8b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:13:08:04:b6:a9:f9:89:5b:a5:d8:b5:74:2a:22: d9:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:87:6a:80:78:67:d7:78:0c:76:85:b2:b7:05:97:e5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:32:77:7a:85:04:f2:01:10:2b:ae:68:35:67:15: 50:44 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:21:46:56:79:e3:30:67:fa:dc:95:98:bb:b5:aa:4a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:36:82:12:17:43:5b:70:97:4c:5d:57:91:a6:77: 12:88 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 66:88:96:ca:25:15:82:25:09:d9:43:fd:3b:6c:ba:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:db:7e:0c:14:6a:ed:34:64:0b:4c:ee:91:94:d3:2e Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:17:6b:38:2c:20:f4:74:7c:54:40:3b:7b:17:8c: b5:f2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 06:cc:92:e0:97:53:d4:71:05:bb:b3:e1:e0:00:8d:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:38:44:e7:13:33:16:23:d8:58:bd:7d:fa:db:f1:65 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:06:7f:07:90:20:89:ec:25:51:87:bf:99:df:46: a4:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ef:ad:11:45:1b:c4:7f:95:e6:66:ab:29:e3:2f:26:f4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:44:77:ba:c1:7a:d9:5d:45:89:92:8c:da:a8:a4: 1c:24 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:7c:74:ce:80:fa:ab:3c:53:b7:db:f2:b3:26:b1:27 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:09:06:d1:ae:a0:af:a6:11:da:db:ea:b0:e8:b3: 05:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:72:01:2c:b5:78:df:56:29:b9:35:25:53:a7:aa:e9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:3c:55:32:5d:05:e1:89:4d:85:bd:39:c6:2d:41:a8 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:52:80:a4:a4:6f:24:e6:33:7d:58:50:14:33:f4: f0:82 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 85:c9:1e:01:ee:f7:4d:c9:5d:49:58:12:85:f9:04:99 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:7c:b4:a7:5e:d7:43:ca:82:c8:73:2e:02:81:8d: 0e:10 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:2a:8f:26:c7:50:7e:bf:92:cb:35:39:0d:00:0e:d1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:cf:f6:0b:4e:dd:88:2a:c8:38:20:e5:0b:5e:01: 78:c1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bb:d3:a3:bd:9d:6c:fc:e9:2a:e9:9d:38:37:fd:3b:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:ed:cd:dc:c3:e0:9e:5a:66:a3:fb:63:2c:01:13:bc Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:3f:4d:d4:da:10:e6:4e:80:3b:39:d9:16:a1:43: d2:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5f:18:4b:97:b4:e4:a3:7c:4e:a2:73:aa:ae:c2:5e:c0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 86:3e:53:cc:0e:62:1f:26:8c:b3:19:61:02:e8:aa:1b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:94:35:a8:04:7d:74:32:ec:bd:b9:02:83:ea:cc: 05:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 52:8c:3b:e6:0a:cb:09:96:28:ce:60:52:7f:d6:3c:d9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3e:40:98:35:64:e8:6b:55:d0:77:84:dc:21:99: 3b:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:06:f0:6b:24:f1:95:25:5a:f7:c0:ce:83:29:56:fa Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:1d:a7:a6:16:27:a2:b5:f1:ed:2b:c4:33:1a:5a: 85:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:86:d8:0a:3d:6c:a5:29:47:da:b5:1b:81:c2:ba:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:fb:66:20:f7:62:b1:6d:3d:08:e1:ef:c8:5a:2d:5b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:d1:ce:a7:f5:83:9b:0a:0d:fb:5a:82:7a:91:50: 16:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:9f:00:8c:89:40:fd:a7:b9:4e:93:b0:84:a6:c6:2a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:5b:a3:89:35:4b:7c:25:62:5e:71:6f:6f:ce:04: b6:7f tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:42:d9:8c:f3:f6:2e:4f:aa:e7:f5:f6:74:76:46:2b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:03:eb:de:c5:9b:af:e7:3a:c9:bb:96:5f:9c:f4: 3f:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 85:0b:c2:45:ae:2c:03:8e:91:04:fa:77:4f:e5:96:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:97:4f:46:41:de:47:02:8b:53:29:7f:2f:af:ba:b0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:59:73:f9:d9:29:2e:15:c8:d1:dd:83:38:fe:a5: 7f:3b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:c0:2a:76:c3:8f:e1:f9:41:a8:4e:6d:2a:d3:2b:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:c5:33:98:fb:3c:aa:fe:8b:8d:f4:3c:43:3f:21:01 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:64:33:0f:b6:13:bc:78:19:7c:e6:a5:c8:f8:c7: a3:23 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:d3:8b:73:7b:6a:c1:e0:6a:34:80:2d:92:76:bc:38 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dd:60:03:09:57:b2:24:3e:9c:a1:e4:ea:41:a6: 77:5c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:da:5b:f0:2f:22:c3:ef:34:21:b8:db:28:d4:39:ce Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:1a:ff:6d:b1:7a:f3:fc:dd:0b:e7:2c:ad:79:3b: 27:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b3:e4:ab:d4:f2:55:83:0b:ff:54:6b:49:d1:44:bd:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:75:47:01:4a:83:00:a5:4b:26:b7:a6:1e:40:0c:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:ce:e2:95:89:88:7c:f8:b6:b4:e7:97:04:ff:af: 9e:80 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:aa:a5:23:5c:6b:28:15:34:e3:a1:e7:b1:eb:18:0e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:b0:52:4f:f1:66:52:5c:c6:82:79:14:39:78:18: fa:50 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:e0:a6:56:2e:ef:bb:cd:ce:a7:46:9f:f3:55:88:22 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:cb:d1:fd:47:e2:e0:18:37:20:2c:07:bd:b3:66: d8:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f0:ae:09:39:10:18:62:f6:4f:a0:50:36:9e:54:b2:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:fd:94:4d:29:a2:81:16:04:c6:b3:02:ab:3f:af:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:ae:84:77:22:a0:5a:60:11:15:e6:3c:c8:a1:58:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 06:40:29:9c:18:91:df:84:a7:d3:9b:ec:a9:8a:91:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 59:5f:b5:49:d4:c1:06:b1:04:8f:55:ae:ab:92:07:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5e:4e:a1:c4:41:6c:4d:73:cd:06:99:ec:09:42:15:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:a6:63:5c:59:5c:36:99:f7:de:0d:34:ac:79:91:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:52:37:c9:e4:17:6b:bd:f1:62:3a:77:24:df:c5:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 57:30:56:bd:68:29:e4:92:6f:5c:71:32:24:2b:ad:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:e7:9b:f9:8c:15:a3:94:cf:c1:05:2a:a9:2d:bf:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:e2:05:fc:c9:9b:6b:56:65:b2:79:4a:de:09:32:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:00:c3:21:62:25:eb:be:7b:d6:fe:c2:20:28:47:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:78:1f:0b:02:20:30:61:3a:aa:53:61:3d:a2:ef:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b5:5e:8e:58:02:89:06:c6:a0:79:18:76:2c:dc: dd:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cc:ed:1f:72:f7:b1:57:a4:06:cd:45:73:e9:db:7c:45 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:e6:d0:b6:cd:61:b7:f3:2b:57:12:bc:5c:9d:7b: 50:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:92:de:3c:b7:a1:17:d0:c5:4e:0a:eb:f9:00:6d:94 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:1b:d7:c9:4f:d8:2f:b3:bb:29:91:25:4d:78:9b: 62:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:27:31:ea:1b:97:49:9d:16:0a:d0:dd:47:24:df:68 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:fe:c8:8a:89:5d:b5:1b:36:f5:91:fb:85:b2:17: 30:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d4:d2:2f:0b:d9:2b:c3:89:1f:0e:79:ec:e3:54:04:c1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:1c:c5:bc:06:e5:84:61:fc:4e:38:21:f3:52:30: f5:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:c0:b8:f8:5e:bf:c0:25:da:76:46:48:15:f5:89:ac Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:14:10:93:c3:cd:75:90:42:43:63:60:5f:a9:d7: 3b:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:22:94:2e:f5:07:d9:7a:99:b2:ba:81:7d:78:0c:6f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e7:17:f1:ef:ad:93:81:a7:83:18:80:9d:1a:ff:ee:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3b:69:a3:9e:51:80:cf:9c:56:7c:ff:ca:e4:b5:9e:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:ae:64:5b:9b:3f:07:e0:aa:a4:69:d9:e2:76:11:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4e:fc:bd:00:50:3b:3f:49:69:1e:22:37:1a:99:d2:6d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a0:96:e3:11:d4:35:a1:84:b6:29:e4:3e:09:d2:2c:f2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:37:42 2023 Not After : Mon Mar 20 19:37:42 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e9:93:3c:b5:5e:4f:c2:ae:f1:c1:20:51:f3:c4:ff: 28:6f:1e:7d:28:6c:4e:11:1a:0c:a4:d0:ba:07:c6:03: bc:50:0c:b5:25:3e:db:78:d7:fe:04:8e:b0:5e:65:9c: f4:02:ac:78:14:90:ac:2f:7f:28:14:05:0f:f9:45:1b: 84:66:2c:9a:49:97:a4:4e:64:a7:d7:01:ba:73:5b:f5: d6:a5:2e:9c:f4:5a:77:a8:82:94:a9:02:eb:1e:0e:fa: 99:ce:19:07:c0:f6:ab:62:7c:bc:fb:d8:ae:bd:69:b6: bc:73:29:60:c5:9b:e8:12:10:7f:ce:ba:3e:f7:e4:32: c2:b0:c7:13:83:6d:b8:b9:fd:19:b3:e9:a5:07:ea:2d: ed:c8:95:06:c7:38:e6:f0:75:af:4e:1e:3f:db:cf:e5: 05:f7:1e:f2:90:0b:d7:96:cf:d5:54:c9:f1:08:40:fa: 25:c7:95:73:45:24:83:6d:b4:bf:89:ad:fa:80:16:9b: 6e:51:1d:e8:e3:1f:77:fb:05:d8:aa:15:a1:3c:9e:a6: 1f:e3:eb:a1:54:dc:63:0b:e8:0c:cc:bc:71:f0:7f:eb: a3:94:c0:e0:1c:33:8c:d4:a9:04:dd:e6:3d:b0:a9:dc: 8f:20:18:29:e5:d4:56:8e:68:41:70:3e:d6:b3:d5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e5:86:d0:a4:5d:d8:22:0d:f4:b3:f8:05:95:57:e1: 7e:08:81:4f:29:bf:ca:84:06:71:49:db:07:83:91:8c: 96:a6:ed:3f:80:d8:b7:1e:bd:75:a5:46:dd:e5:4f:d8: cc:59:b9:62:e6:04:9a:5c:7d:a9:c3:84:a9:f0:b3:b7: 29:f0:0c:0c:ed:f2:1a:2f:4c:46:72:3e:cc:b0:6f:79: f8:c2:ae:2c:39:5a:05:a4:ca:c4:7f:39:ea:f6:8b:4b: 51:73:5e:ec:62:35:64:53:ce:33:0c:8f:c1:b2:a5:c5: 41:7c:48:17:6e:e0:94:11:0e:3a:37:ba:2e:d6:d0:6a: ec:0c:9c:a5:fa:dd:0d:35:25:0d:3d:47:82:a1:bc:27: 4d:d8:f9:a8:39:e9:19:59:3e:66:bf:e5:eb:c5:97:cc: 93:71:df:80:f5:d5:3f:e0:d6:e3:56:60:0f:99:12:cd: 60:b0:f1:60:47:f5:db:ed:a9:b4:11:73:c8:c9:11:6a: f9:c5:ca:95:7d:ef:28:42:82:43:ce:2c:eb:b6:ae:cd: 73:87:ab:5b:1d:5e:64:38:3d:3c:20:ea:ae:40:c9:dd: bf:a0:48:67:db:6b:ef:0d:9e:de:55:28:2d:f3:3e:00: 68:6b:80:c7:fd:a4:aa:98:ed:1e:ba:fd:99:9b:cd:cb Fingerprint (SHA-256): 07:F3:45:06:AE:06:14:32:FB:CB:FE:C6:39:9B:59:D2:01:98:C5:B8:FF:11:6D:E7:5C:E0:BC:51:2D:65:3E:F1 Fingerprint (SHA1): 49:0F:1C:77:9F:89:64:83:4D:F1:61:95:5A:2C:2D:6E:E5:BF:5D:FC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 19:38:08 2023 Not After : Mon Mar 20 19:38:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:62:03:29:56:1b:40:62:db:b6:4c:68:23:a9:4e:53: 1b:1a:fc:c3:f6:85:cf:9f:38:ed:b2:ed:2f:b0:da:8a: 40:84:ad:33:60:cf:20:3a:56:1b:b6:0c:14:a2:97:90: b9:d3:bf:37:f1:d3:f9:85:d3:69:46:93:0b:70:6b:02: cd:28:67:0b:b3:d9:09:d4:74:5e:b2:0f:bf:02:dd:26: 04:9f:16:7c:3f:92:86:32:71:3d:f9:2e:67:43:21:cc: 20:56:e4:70:fe:a8:fb:88:c3:bd:37:17:cc:6f:83:19: e6:c0:ef:bc:2b:46:37:c3:5a:90:16:2e:c3:83:2e:f9: a6:1f:36:2c:b9:8d:5f:05:7c:4b:6b:ea:9c:b5:86:ae: c8:88:34:d3:09:1f:d7:bd:22:bf:58:63:d1:33:48:06: f4:52:3f:21:bc:a0:cf:86:e4:77:e6:6b:3d:c7:b9:11: 34:c2:a5:32:e7:69:58:10:d1:a4:85:db:cb:df:ff:20: 61:e8:57:69:e8:2a:36:e9:4d:9b:d2:3c:74:86:b2:9f: 6a:7e:12:cd:e0:ea:4e:04:b6:31:1e:d1:0b:ae:b6:6b: 20:34:37:7f:8f:c4:9d:1a:c6:53:04:4c:34:41:7f:16: cf:fe:d2:0f:86:a8:b1:ba:b6:fd:f0:88:e8:29:4e:15 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:d1:98:c1:e0:3b:30:be:a8:ce:12:dc:8d:c7:e0:35: fd:f1:c3:42:ff:ed:fe:0d:66:b8:77:e1:4c:6c:2c:67: eb:b4:38:2f:05:af:df:b1:66:db:b1:f4:b7:29:2e:16: 7d:85:a4:28:42:85:04:b9:67:e8:65:c2:cd:75:8e:c9: 82:80:1d:ec:ff:2b:5a:4f:69:39:78:82:7f:4f:7e:0d: e4:58:1b:f6:ca:64:73:44:ee:e6:a7:3c:d9:50:9e:39: c3:43:e3:a0:d8:c9:5c:0e:ea:b0:a2:e7:61:2b:9a:c5: a6:5d:c7:2d:61:da:ba:a3:81:36:6a:97:7e:51:51:0f: ca:dd:dd:56:45:a1:4f:13:36:72:f2:98:b6:81:2e:0d: 19:c6:d8:f9:78:f8:28:80:dc:48:b5:f9:3e:a1:11:25: e0:f7:86:7a:a7:18:51:51:4b:5d:36:51:ed:0d:ce:f8: 99:08:c6:e5:9e:77:38:31:48:0a:3e:92:81:aa:3c:48: bc:63:77:9c:14:3c:66:a6:35:2e:62:c1:0b:b2:6f:3d: f6:a4:65:da:f3:31:9d:61:d8:c3:be:be:a1:3d:c2:1b: fc:0c:71:91:e2:70:b1:3c:cb:20:ad:52:ab:5f:a8:07: a8:c3:79:33:7c:04:bf:c4:ea:66:cc:0f:0b:af:3a:98 Fingerprint (SHA-256): F8:37:8E:B6:5A:B4:6C:E4:7B:2F:83:F4:42:90:83:80:29:A2:AC:8C:11:9C:CD:6E:45:A5:38:71:14:76:9D:06 Fingerprint (SHA1): 5A:7B:BA:CB:E3:5F:3A:E6:EC:76:3B:62:27:40:5F:FD:FC:ED:97:F0 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Mon Mar 20 19:54:24 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 20 19:54:24 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 796a45c3a6b71081a4fa0847156bd9279e178989 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 796a45c3a6b71081a4fa0847156bd9279e178989 FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 796a45c3a6b71081a4fa0847156bd9279e178989 FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x0005139c (332700): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 20 19:54:37 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 20 19:54:37 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21833 found at Mon Mar 20 19:54:37 UTC 2023 selfserv_9887 with PID 21833 started at Mon Mar 20 19:54:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21833 at Mon Mar 20 19:54:37 UTC 2023 kill -USR1 21833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21833 killed at Mon Mar 20 19:54:37 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21885 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21885 found at Mon Mar 20 19:54:38 UTC 2023 selfserv_9887 with PID 21885 started at Mon Mar 20 19:54:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21885 at Mon Mar 20 19:54:38 UTC 2023 kill -USR1 21885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21885 killed at Mon Mar 20 19:54:38 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21937 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21937 found at Mon Mar 20 19:54:38 UTC 2023 selfserv_9887 with PID 21937 started at Mon Mar 20 19:54:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21937 at Mon Mar 20 19:54:39 UTC 2023 kill -USR1 21937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21937 killed at Mon Mar 20 19:54:39 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22003 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22003 found at Mon Mar 20 19:54:39 UTC 2023 selfserv_9887 with PID 22003 started at Mon Mar 20 19:54:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22003 at Mon Mar 20 19:54:39 UTC 2023 kill -USR1 22003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22003 killed at Mon Mar 20 19:54:40 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22057 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22057 found at Mon Mar 20 19:54:40 UTC 2023 selfserv_9887 with PID 22057 started at Mon Mar 20 19:54:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22057 at Mon Mar 20 19:54:40 UTC 2023 kill -USR1 22057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22057 killed at Mon Mar 20 19:54:40 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22113 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22113 found at Mon Mar 20 19:54:40 UTC 2023 selfserv_9887 with PID 22113 started at Mon Mar 20 19:54:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22113 at Mon Mar 20 19:54:41 UTC 2023 kill -USR1 22113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22113 killed at Mon Mar 20 19:54:41 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22190 found at Mon Mar 20 19:54:41 UTC 2023 selfserv_9887 with PID 22190 started at Mon Mar 20 19:54:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22190 at Mon Mar 20 19:54:41 UTC 2023 kill -USR1 22190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22190 killed at Mon Mar 20 19:54:41 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22242 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22242 found at Mon Mar 20 19:54:42 UTC 2023 selfserv_9887 with PID 22242 started at Mon Mar 20 19:54:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22242 at Mon Mar 20 19:54:42 UTC 2023 kill -USR1 22242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22242 killed at Mon Mar 20 19:54:42 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22295 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22295 found at Mon Mar 20 19:54:42 UTC 2023 selfserv_9887 with PID 22295 started at Mon Mar 20 19:54:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22295 at Mon Mar 20 19:54:42 UTC 2023 kill -USR1 22295 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22295 killed at Mon Mar 20 19:54:43 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22362 found at Mon Mar 20 19:54:43 UTC 2023 selfserv_9887 with PID 22362 started at Mon Mar 20 19:54:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22362 at Mon Mar 20 19:54:43 UTC 2023 kill -USR1 22362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22362 killed at Mon Mar 20 19:54:43 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22415 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22415 found at Mon Mar 20 19:54:43 UTC 2023 selfserv_9887 with PID 22415 started at Mon Mar 20 19:54:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22415 at Mon Mar 20 19:54:44 UTC 2023 kill -USR1 22415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22415 killed at Mon Mar 20 19:54:44 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22467 found at Mon Mar 20 19:54:44 UTC 2023 selfserv_9887 with PID 22467 started at Mon Mar 20 19:54:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22467 at Mon Mar 20 19:54:44 UTC 2023 kill -USR1 22467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22467 killed at Mon Mar 20 19:54:44 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22533 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22533 found at Mon Mar 20 19:54:45 UTC 2023 selfserv_9887 with PID 22533 started at Mon Mar 20 19:54:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22533 at Mon Mar 20 19:54:45 UTC 2023 kill -USR1 22533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22533 killed at Mon Mar 20 19:54:45 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22585 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22585 found at Mon Mar 20 19:54:45 UTC 2023 selfserv_9887 with PID 22585 started at Mon Mar 20 19:54:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22585 at Mon Mar 20 19:54:45 UTC 2023 kill -USR1 22585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22585 killed at Mon Mar 20 19:54:45 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22637 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22637 found at Mon Mar 20 19:54:46 UTC 2023 selfserv_9887 with PID 22637 started at Mon Mar 20 19:54:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22637 at Mon Mar 20 19:54:46 UTC 2023 kill -USR1 22637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22637 killed at Mon Mar 20 19:54:46 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22703 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22703 found at Mon Mar 20 19:54:46 UTC 2023 selfserv_9887 with PID 22703 started at Mon Mar 20 19:54:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22703 at Mon Mar 20 19:54:46 UTC 2023 kill -USR1 22703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22703 killed at Mon Mar 20 19:54:47 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22755 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22755 found at Mon Mar 20 19:54:47 UTC 2023 selfserv_9887 with PID 22755 started at Mon Mar 20 19:54:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22755 at Mon Mar 20 19:54:47 UTC 2023 kill -USR1 22755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22755 killed at Mon Mar 20 19:54:47 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22807 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22807 found at Mon Mar 20 19:54:47 UTC 2023 selfserv_9887 with PID 22807 started at Mon Mar 20 19:54:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22807 at Mon Mar 20 19:54:48 UTC 2023 kill -USR1 22807 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22807 killed at Mon Mar 20 19:54:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22873 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22873 found at Mon Mar 20 19:54:48 UTC 2023 selfserv_9887 with PID 22873 started at Mon Mar 20 19:54:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22873 at Mon Mar 20 19:54:48 UTC 2023 kill -USR1 22873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22873 killed at Mon Mar 20 19:54:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22925 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22925 found at Mon Mar 20 19:54:48 UTC 2023 selfserv_9887 with PID 22925 started at Mon Mar 20 19:54:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22925 at Mon Mar 20 19:54:49 UTC 2023 kill -USR1 22925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22925 killed at Mon Mar 20 19:54:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22977 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22977 found at Mon Mar 20 19:54:49 UTC 2023 selfserv_9887 with PID 22977 started at Mon Mar 20 19:54:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22977 at Mon Mar 20 19:54:49 UTC 2023 kill -USR1 22977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22977 killed at Mon Mar 20 19:54:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23043 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23043 found at Mon Mar 20 19:54:49 UTC 2023 selfserv_9887 with PID 23043 started at Mon Mar 20 19:54:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23043 at Mon Mar 20 19:54:50 UTC 2023 kill -USR1 23043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23043 killed at Mon Mar 20 19:54:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23096 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23096 found at Mon Mar 20 19:54:50 UTC 2023 selfserv_9887 with PID 23096 started at Mon Mar 20 19:54:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23096 at Mon Mar 20 19:54:50 UTC 2023 kill -USR1 23096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23096 killed at Mon Mar 20 19:54:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23148 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23148 found at Mon Mar 20 19:54:50 UTC 2023 selfserv_9887 with PID 23148 started at Mon Mar 20 19:54:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23148 at Mon Mar 20 19:54:51 UTC 2023 kill -USR1 23148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23148 killed at Mon Mar 20 19:54:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23214 found at Mon Mar 20 19:54:51 UTC 2023 selfserv_9887 with PID 23214 started at Mon Mar 20 19:54:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23214 at Mon Mar 20 19:54:51 UTC 2023 kill -USR1 23214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23214 killed at Mon Mar 20 19:54:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23269 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23269 found at Mon Mar 20 19:54:51 UTC 2023 selfserv_9887 with PID 23269 started at Mon Mar 20 19:54:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23269 at Mon Mar 20 19:54:51 UTC 2023 kill -USR1 23269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23269 killed at Mon Mar 20 19:54:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23321 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23321 found at Mon Mar 20 19:54:52 UTC 2023 selfserv_9887 with PID 23321 started at Mon Mar 20 19:54:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23321 at Mon Mar 20 19:54:52 UTC 2023 kill -USR1 23321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23321 killed at Mon Mar 20 19:54:52 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23387 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23387 found at Mon Mar 20 19:54:52 UTC 2023 selfserv_9887 with PID 23387 started at Mon Mar 20 19:54:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23387 at Mon Mar 20 19:54:52 UTC 2023 kill -USR1 23387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23387 killed at Mon Mar 20 19:54:52 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23439 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23439 found at Mon Mar 20 19:54:53 UTC 2023 selfserv_9887 with PID 23439 started at Mon Mar 20 19:54:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23439 at Mon Mar 20 19:54:53 UTC 2023 kill -USR1 23439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23439 killed at Mon Mar 20 19:54:53 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23491 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23491 found at Mon Mar 20 19:54:53 UTC 2023 selfserv_9887 with PID 23491 started at Mon Mar 20 19:54:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23491 at Mon Mar 20 19:54:53 UTC 2023 kill -USR1 23491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23491 killed at Mon Mar 20 19:54:53 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23558 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23558 found at Mon Mar 20 19:54:53 UTC 2023 selfserv_9887 with PID 23558 started at Mon Mar 20 19:54:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23558 at Mon Mar 20 19:54:54 UTC 2023 kill -USR1 23558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23558 killed at Mon Mar 20 19:54:54 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23610 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23610 found at Mon Mar 20 19:54:54 UTC 2023 selfserv_9887 with PID 23610 started at Mon Mar 20 19:54:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23610 at Mon Mar 20 19:54:54 UTC 2023 kill -USR1 23610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23610 killed at Mon Mar 20 19:54:54 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23662 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23662 found at Mon Mar 20 19:54:54 UTC 2023 selfserv_9887 with PID 23662 started at Mon Mar 20 19:54:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23662 at Mon Mar 20 19:54:54 UTC 2023 kill -USR1 23662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23662 killed at Mon Mar 20 19:54:54 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23728 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23728 found at Mon Mar 20 19:54:55 UTC 2023 selfserv_9887 with PID 23728 started at Mon Mar 20 19:54:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23728 at Mon Mar 20 19:54:55 UTC 2023 kill -USR1 23728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23728 killed at Mon Mar 20 19:54:55 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23780 found at Mon Mar 20 19:54:55 UTC 2023 selfserv_9887 with PID 23780 started at Mon Mar 20 19:54:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23780 at Mon Mar 20 19:54:55 UTC 2023 kill -USR1 23780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23780 killed at Mon Mar 20 19:54:55 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23832 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23832 found at Mon Mar 20 19:54:56 UTC 2023 selfserv_9887 with PID 23832 started at Mon Mar 20 19:54:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 23832 at Mon Mar 20 19:54:56 UTC 2023 kill -USR1 23832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23832 killed at Mon Mar 20 19:54:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23898 found at Mon Mar 20 19:54:56 UTC 2023 selfserv_9887 with PID 23898 started at Mon Mar 20 19:54:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23898 at Mon Mar 20 19:54:57 UTC 2023 kill -USR1 23898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23898 killed at Mon Mar 20 19:54:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23950 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23950 found at Mon Mar 20 19:54:57 UTC 2023 selfserv_9887 with PID 23950 started at Mon Mar 20 19:54:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23950 at Mon Mar 20 19:54:57 UTC 2023 kill -USR1 23950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23950 killed at Mon Mar 20 19:54:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:54:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24002 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24002 found at Mon Mar 20 19:54:58 UTC 2023 selfserv_9887 with PID 24002 started at Mon Mar 20 19:54:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24002 at Mon Mar 20 19:54:58 UTC 2023 kill -USR1 24002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24002 killed at Mon Mar 20 19:54:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24068 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24068 found at Mon Mar 20 19:54:59 UTC 2023 selfserv_9887 with PID 24068 started at Mon Mar 20 19:54:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24068 at Mon Mar 20 19:54:59 UTC 2023 kill -USR1 24068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24068 killed at Mon Mar 20 19:54:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:54:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:54:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24121 found at Mon Mar 20 19:54:59 UTC 2023 selfserv_9887 with PID 24121 started at Mon Mar 20 19:54:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24121 at Mon Mar 20 19:55:00 UTC 2023 kill -USR1 24121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24121 killed at Mon Mar 20 19:55:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24173 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24173 found at Mon Mar 20 19:55:00 UTC 2023 selfserv_9887 with PID 24173 started at Mon Mar 20 19:55:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24173 at Mon Mar 20 19:55:01 UTC 2023 kill -USR1 24173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24173 killed at Mon Mar 20 19:55:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24241 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24241 found at Mon Mar 20 19:55:01 UTC 2023 selfserv_9887 with PID 24241 started at Mon Mar 20 19:55:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24241 at Mon Mar 20 19:55:02 UTC 2023 kill -USR1 24241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24241 killed at Mon Mar 20 19:55:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24293 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24293 found at Mon Mar 20 19:55:02 UTC 2023 selfserv_9887 with PID 24293 started at Mon Mar 20 19:55:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24293 at Mon Mar 20 19:55:02 UTC 2023 kill -USR1 24293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24293 killed at Mon Mar 20 19:55:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24345 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24345 found at Mon Mar 20 19:55:03 UTC 2023 selfserv_9887 with PID 24345 started at Mon Mar 20 19:55:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24345 at Mon Mar 20 19:55:03 UTC 2023 kill -USR1 24345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24345 killed at Mon Mar 20 19:55:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24411 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24411 found at Mon Mar 20 19:55:04 UTC 2023 selfserv_9887 with PID 24411 started at Mon Mar 20 19:55:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24411 at Mon Mar 20 19:55:04 UTC 2023 kill -USR1 24411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24411 killed at Mon Mar 20 19:55:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24463 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24463 found at Mon Mar 20 19:55:04 UTC 2023 selfserv_9887 with PID 24463 started at Mon Mar 20 19:55:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24463 at Mon Mar 20 19:55:05 UTC 2023 kill -USR1 24463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24463 killed at Mon Mar 20 19:55:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24515 found at Mon Mar 20 19:55:05 UTC 2023 selfserv_9887 with PID 24515 started at Mon Mar 20 19:55:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24515 at Mon Mar 20 19:55:06 UTC 2023 kill -USR1 24515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24515 killed at Mon Mar 20 19:55:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24581 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24581 found at Mon Mar 20 19:55:06 UTC 2023 selfserv_9887 with PID 24581 started at Mon Mar 20 19:55:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24581 at Mon Mar 20 19:55:07 UTC 2023 kill -USR1 24581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24581 killed at Mon Mar 20 19:55:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24634 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24634 found at Mon Mar 20 19:55:07 UTC 2023 selfserv_9887 with PID 24634 started at Mon Mar 20 19:55:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24634 at Mon Mar 20 19:55:07 UTC 2023 kill -USR1 24634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24634 killed at Mon Mar 20 19:55:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24687 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24687 found at Mon Mar 20 19:55:08 UTC 2023 selfserv_9887 with PID 24687 started at Mon Mar 20 19:55:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24687 at Mon Mar 20 19:55:08 UTC 2023 kill -USR1 24687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24687 killed at Mon Mar 20 19:55:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24753 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24753 found at Mon Mar 20 19:55:08 UTC 2023 selfserv_9887 with PID 24753 started at Mon Mar 20 19:55:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24753 at Mon Mar 20 19:55:09 UTC 2023 kill -USR1 24753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24753 killed at Mon Mar 20 19:55:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24805 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24805 found at Mon Mar 20 19:55:09 UTC 2023 selfserv_9887 with PID 24805 started at Mon Mar 20 19:55:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24805 at Mon Mar 20 19:55:10 UTC 2023 kill -USR1 24805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24805 killed at Mon Mar 20 19:55:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24857 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24857 found at Mon Mar 20 19:55:10 UTC 2023 selfserv_9887 with PID 24857 started at Mon Mar 20 19:55:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24857 at Mon Mar 20 19:55:11 UTC 2023 kill -USR1 24857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24857 killed at Mon Mar 20 19:55:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24924 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24924 found at Mon Mar 20 19:55:11 UTC 2023 selfserv_9887 with PID 24924 started at Mon Mar 20 19:55:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24924 at Mon Mar 20 19:55:12 UTC 2023 kill -USR1 24924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24924 killed at Mon Mar 20 19:55:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24976 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24976 found at Mon Mar 20 19:55:12 UTC 2023 selfserv_9887 with PID 24976 started at Mon Mar 20 19:55:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24976 at Mon Mar 20 19:55:12 UTC 2023 kill -USR1 24976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24976 killed at Mon Mar 20 19:55:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25028 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25028 found at Mon Mar 20 19:55:13 UTC 2023 selfserv_9887 with PID 25028 started at Mon Mar 20 19:55:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25028 at Mon Mar 20 19:55:13 UTC 2023 kill -USR1 25028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25028 killed at Mon Mar 20 19:55:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25094 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25094 found at Mon Mar 20 19:55:14 UTC 2023 selfserv_9887 with PID 25094 started at Mon Mar 20 19:55:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25094 at Mon Mar 20 19:55:14 UTC 2023 kill -USR1 25094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25094 killed at Mon Mar 20 19:55:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25146 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25146 found at Mon Mar 20 19:55:14 UTC 2023 selfserv_9887 with PID 25146 started at Mon Mar 20 19:55:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25146 at Mon Mar 20 19:55:15 UTC 2023 kill -USR1 25146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25146 killed at Mon Mar 20 19:55:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25198 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25198 found at Mon Mar 20 19:55:15 UTC 2023 selfserv_9887 with PID 25198 started at Mon Mar 20 19:55:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25198 at Mon Mar 20 19:55:16 UTC 2023 kill -USR1 25198 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25198 killed at Mon Mar 20 19:55:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25264 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25264 found at Mon Mar 20 19:55:16 UTC 2023 selfserv_9887 with PID 25264 started at Mon Mar 20 19:55:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25264 at Mon Mar 20 19:55:17 UTC 2023 kill -USR1 25264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25264 killed at Mon Mar 20 19:55:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25316 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25316 found at Mon Mar 20 19:55:17 UTC 2023 selfserv_9887 with PID 25316 started at Mon Mar 20 19:55:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25316 at Mon Mar 20 19:55:17 UTC 2023 kill -USR1 25316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25316 killed at Mon Mar 20 19:55:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25368 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25368 found at Mon Mar 20 19:55:18 UTC 2023 selfserv_9887 with PID 25368 started at Mon Mar 20 19:55:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25368 at Mon Mar 20 19:55:18 UTC 2023 kill -USR1 25368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25368 killed at Mon Mar 20 19:55:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25434 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25434 found at Mon Mar 20 19:55:18 UTC 2023 selfserv_9887 with PID 25434 started at Mon Mar 20 19:55:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25434 at Mon Mar 20 19:55:19 UTC 2023 kill -USR1 25434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25434 killed at Mon Mar 20 19:55:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25486 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25486 found at Mon Mar 20 19:55:19 UTC 2023 selfserv_9887 with PID 25486 started at Mon Mar 20 19:55:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25486 at Mon Mar 20 19:55:20 UTC 2023 kill -USR1 25486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25486 killed at Mon Mar 20 19:55:20 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25538 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25538 found at Mon Mar 20 19:55:20 UTC 2023 selfserv_9887 with PID 25538 started at Mon Mar 20 19:55:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25538 at Mon Mar 20 19:55:21 UTC 2023 kill -USR1 25538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25538 killed at Mon Mar 20 19:55:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25604 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25604 found at Mon Mar 20 19:55:21 UTC 2023 selfserv_9887 with PID 25604 started at Mon Mar 20 19:55:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25604 at Mon Mar 20 19:55:22 UTC 2023 kill -USR1 25604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25604 killed at Mon Mar 20 19:55:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25656 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25656 found at Mon Mar 20 19:55:22 UTC 2023 selfserv_9887 with PID 25656 started at Mon Mar 20 19:55:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25656 at Mon Mar 20 19:55:22 UTC 2023 kill -USR1 25656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25656 killed at Mon Mar 20 19:55:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25708 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25708 found at Mon Mar 20 19:55:23 UTC 2023 selfserv_9887 with PID 25708 started at Mon Mar 20 19:55:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25708 at Mon Mar 20 19:55:23 UTC 2023 kill -USR1 25708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25708 killed at Mon Mar 20 19:55:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25774 found at Mon Mar 20 19:55:23 UTC 2023 selfserv_9887 with PID 25774 started at Mon Mar 20 19:55:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25774 at Mon Mar 20 19:55:24 UTC 2023 kill -USR1 25774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25774 killed at Mon Mar 20 19:55:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25828 found at Mon Mar 20 19:55:24 UTC 2023 selfserv_9887 with PID 25828 started at Mon Mar 20 19:55:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25828 at Mon Mar 20 19:55:25 UTC 2023 kill -USR1 25828 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25828 killed at Mon Mar 20 19:55:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25880 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25880 found at Mon Mar 20 19:55:25 UTC 2023 selfserv_9887 with PID 25880 started at Mon Mar 20 19:55:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25880 at Mon Mar 20 19:55:26 UTC 2023 kill -USR1 25880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25880 killed at Mon Mar 20 19:55:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25947 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25947 found at Mon Mar 20 19:55:26 UTC 2023 selfserv_9887 with PID 25947 started at Mon Mar 20 19:55:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25947 at Mon Mar 20 19:55:26 UTC 2023 kill -USR1 25947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25947 killed at Mon Mar 20 19:55:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25999 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25999 found at Mon Mar 20 19:55:26 UTC 2023 selfserv_9887 with PID 25999 started at Mon Mar 20 19:55:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25999 at Mon Mar 20 19:55:27 UTC 2023 kill -USR1 25999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25999 killed at Mon Mar 20 19:55:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26051 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26051 found at Mon Mar 20 19:55:27 UTC 2023 selfserv_9887 with PID 26051 started at Mon Mar 20 19:55:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26051 at Mon Mar 20 19:55:27 UTC 2023 kill -USR1 26051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26051 killed at Mon Mar 20 19:55:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26117 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26117 found at Mon Mar 20 19:55:27 UTC 2023 selfserv_9887 with PID 26117 started at Mon Mar 20 19:55:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26117 at Mon Mar 20 19:55:28 UTC 2023 kill -USR1 26117 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26117 killed at Mon Mar 20 19:55:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26170 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26170 found at Mon Mar 20 19:55:28 UTC 2023 selfserv_9887 with PID 26170 started at Mon Mar 20 19:55:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26170 at Mon Mar 20 19:55:28 UTC 2023 kill -USR1 26170 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26170 killed at Mon Mar 20 19:55:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26222 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26222 found at Mon Mar 20 19:55:28 UTC 2023 selfserv_9887 with PID 26222 started at Mon Mar 20 19:55:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26222 at Mon Mar 20 19:55:29 UTC 2023 kill -USR1 26222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26222 killed at Mon Mar 20 19:55:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26288 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26288 found at Mon Mar 20 19:55:29 UTC 2023 selfserv_9887 with PID 26288 started at Mon Mar 20 19:55:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26288 at Mon Mar 20 19:55:29 UTC 2023 kill -USR1 26288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26288 killed at Mon Mar 20 19:55:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26340 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26340 found at Mon Mar 20 19:55:29 UTC 2023 selfserv_9887 with PID 26340 started at Mon Mar 20 19:55:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26340 at Mon Mar 20 19:55:30 UTC 2023 kill -USR1 26340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26340 killed at Mon Mar 20 19:55:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26392 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26392 found at Mon Mar 20 19:55:30 UTC 2023 selfserv_9887 with PID 26392 started at Mon Mar 20 19:55:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26392 at Mon Mar 20 19:55:30 UTC 2023 kill -USR1 26392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26392 killed at Mon Mar 20 19:55:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26458 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26458 found at Mon Mar 20 19:55:30 UTC 2023 selfserv_9887 with PID 26458 started at Mon Mar 20 19:55:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26458 at Mon Mar 20 19:55:31 UTC 2023 kill -USR1 26458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26458 killed at Mon Mar 20 19:55:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26510 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26510 found at Mon Mar 20 19:55:31 UTC 2023 selfserv_9887 with PID 26510 started at Mon Mar 20 19:55:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26510 at Mon Mar 20 19:55:31 UTC 2023 kill -USR1 26510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26510 killed at Mon Mar 20 19:55:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26563 found at Mon Mar 20 19:55:31 UTC 2023 selfserv_9887 with PID 26563 started at Mon Mar 20 19:55:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26563 at Mon Mar 20 19:55:32 UTC 2023 kill -USR1 26563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26563 killed at Mon Mar 20 19:55:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26629 found at Mon Mar 20 19:55:32 UTC 2023 selfserv_9887 with PID 26629 started at Mon Mar 20 19:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26629 at Mon Mar 20 19:55:32 UTC 2023 kill -USR1 26629 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26629 killed at Mon Mar 20 19:55:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26681 found at Mon Mar 20 19:55:32 UTC 2023 selfserv_9887 with PID 26681 started at Mon Mar 20 19:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26681 at Mon Mar 20 19:55:32 UTC 2023 kill -USR1 26681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26681 killed at Mon Mar 20 19:55:33 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26733 found at Mon Mar 20 19:55:33 UTC 2023 selfserv_9887 with PID 26733 started at Mon Mar 20 19:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26733 at Mon Mar 20 19:55:33 UTC 2023 kill -USR1 26733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26733 killed at Mon Mar 20 19:55:33 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26799 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26799 found at Mon Mar 20 19:55:33 UTC 2023 selfserv_9887 with PID 26799 started at Mon Mar 20 19:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26799 at Mon Mar 20 19:55:33 UTC 2023 kill -USR1 26799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26799 killed at Mon Mar 20 19:55:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26851 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26851 found at Mon Mar 20 19:55:34 UTC 2023 selfserv_9887 with PID 26851 started at Mon Mar 20 19:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26851 at Mon Mar 20 19:55:34 UTC 2023 kill -USR1 26851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26851 killed at Mon Mar 20 19:55:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26903 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26903 found at Mon Mar 20 19:55:34 UTC 2023 selfserv_9887 with PID 26903 started at Mon Mar 20 19:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26903 at Mon Mar 20 19:55:34 UTC 2023 kill -USR1 26903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26903 killed at Mon Mar 20 19:55:34 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26969 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26969 found at Mon Mar 20 19:55:35 UTC 2023 selfserv_9887 with PID 26969 started at Mon Mar 20 19:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26969 at Mon Mar 20 19:55:35 UTC 2023 kill -USR1 26969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26969 killed at Mon Mar 20 19:55:35 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27021 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27021 found at Mon Mar 20 19:55:35 UTC 2023 selfserv_9887 with PID 27021 started at Mon Mar 20 19:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27021 at Mon Mar 20 19:55:35 UTC 2023 kill -USR1 27021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27021 killed at Mon Mar 20 19:55:35 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27073 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27073 found at Mon Mar 20 19:55:36 UTC 2023 selfserv_9887 with PID 27073 started at Mon Mar 20 19:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27073 at Mon Mar 20 19:55:36 UTC 2023 kill -USR1 27073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27073 killed at Mon Mar 20 19:55:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27140 found at Mon Mar 20 19:55:36 UTC 2023 selfserv_9887 with PID 27140 started at Mon Mar 20 19:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27140 at Mon Mar 20 19:55:36 UTC 2023 kill -USR1 27140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27140 killed at Mon Mar 20 19:55:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27193 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27193 found at Mon Mar 20 19:55:36 UTC 2023 selfserv_9887 with PID 27193 started at Mon Mar 20 19:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27193 at Mon Mar 20 19:55:37 UTC 2023 kill -USR1 27193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27193 killed at Mon Mar 20 19:55:37 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27246 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27246 found at Mon Mar 20 19:55:37 UTC 2023 selfserv_9887 with PID 27246 started at Mon Mar 20 19:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27246 at Mon Mar 20 19:55:37 UTC 2023 kill -USR1 27246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27246 killed at Mon Mar 20 19:55:37 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27312 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27312 found at Mon Mar 20 19:55:37 UTC 2023 selfserv_9887 with PID 27312 started at Mon Mar 20 19:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27312 at Mon Mar 20 19:55:38 UTC 2023 kill -USR1 27312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27312 killed at Mon Mar 20 19:55:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27364 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27364 found at Mon Mar 20 19:55:38 UTC 2023 selfserv_9887 with PID 27364 started at Mon Mar 20 19:55:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27364 at Mon Mar 20 19:55:38 UTC 2023 kill -USR1 27364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27364 killed at Mon Mar 20 19:55:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27416 found at Mon Mar 20 19:55:38 UTC 2023 selfserv_9887 with PID 27416 started at Mon Mar 20 19:55:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27416 at Mon Mar 20 19:55:39 UTC 2023 kill -USR1 27416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27416 killed at Mon Mar 20 19:55:39 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27482 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27482 found at Mon Mar 20 19:55:39 UTC 2023 selfserv_9887 with PID 27482 started at Mon Mar 20 19:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27482 at Mon Mar 20 19:55:39 UTC 2023 kill -USR1 27482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27482 killed at Mon Mar 20 19:55:39 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27534 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27534 found at Mon Mar 20 19:55:39 UTC 2023 selfserv_9887 with PID 27534 started at Mon Mar 20 19:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27534 at Mon Mar 20 19:55:40 UTC 2023 kill -USR1 27534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27534 killed at Mon Mar 20 19:55:40 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27587 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27587 found at Mon Mar 20 19:55:40 UTC 2023 selfserv_9887 with PID 27587 started at Mon Mar 20 19:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27587 at Mon Mar 20 19:55:40 UTC 2023 kill -USR1 27587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27587 killed at Mon Mar 20 19:55:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27657 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27657 found at Mon Mar 20 19:55:40 UTC 2023 selfserv_9887 with PID 27657 started at Mon Mar 20 19:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27657 at Mon Mar 20 19:55:40 UTC 2023 kill -USR1 27657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27657 killed at Mon Mar 20 19:55:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27709 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27709 found at Mon Mar 20 19:55:41 UTC 2023 selfserv_9887 with PID 27709 started at Mon Mar 20 19:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27709 at Mon Mar 20 19:55:41 UTC 2023 kill -USR1 27709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27709 killed at Mon Mar 20 19:55:41 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27772 found at Mon Mar 20 19:55:41 UTC 2023 selfserv_9887 with PID 27772 started at Mon Mar 20 19:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27772 at Mon Mar 20 19:55:41 UTC 2023 kill -USR1 27772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27772 killed at Mon Mar 20 19:55:41 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27839 found at Mon Mar 20 19:55:41 UTC 2023 selfserv_9887 with PID 27839 started at Mon Mar 20 19:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27839 at Mon Mar 20 19:55:42 UTC 2023 kill -USR1 27839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27839 killed at Mon Mar 20 19:55:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27891 found at Mon Mar 20 19:55:42 UTC 2023 selfserv_9887 with PID 27891 started at Mon Mar 20 19:55:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27891 at Mon Mar 20 19:55:42 UTC 2023 kill -USR1 27891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27891 killed at Mon Mar 20 19:55:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27943 found at Mon Mar 20 19:55:42 UTC 2023 selfserv_9887 with PID 27943 started at Mon Mar 20 19:55:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27943 at Mon Mar 20 19:55:43 UTC 2023 kill -USR1 27943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27943 killed at Mon Mar 20 19:55:43 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28009 found at Mon Mar 20 19:55:43 UTC 2023 selfserv_9887 with PID 28009 started at Mon Mar 20 19:55:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28009 at Mon Mar 20 19:55:43 UTC 2023 kill -USR1 28009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28009 killed at Mon Mar 20 19:55:43 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28061 found at Mon Mar 20 19:55:44 UTC 2023 selfserv_9887 with PID 28061 started at Mon Mar 20 19:55:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28061 at Mon Mar 20 19:55:44 UTC 2023 kill -USR1 28061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28061 killed at Mon Mar 20 19:55:44 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28113 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28113 found at Mon Mar 20 19:55:44 UTC 2023 selfserv_9887 with PID 28113 started at Mon Mar 20 19:55:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28113 at Mon Mar 20 19:55:45 UTC 2023 kill -USR1 28113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28113 killed at Mon Mar 20 19:55:45 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28180 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28180 found at Mon Mar 20 19:55:45 UTC 2023 selfserv_9887 with PID 28180 started at Mon Mar 20 19:55:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28180 at Mon Mar 20 19:55:45 UTC 2023 kill -USR1 28180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28180 killed at Mon Mar 20 19:55:45 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28233 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28233 found at Mon Mar 20 19:55:45 UTC 2023 selfserv_9887 with PID 28233 started at Mon Mar 20 19:55:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28233 at Mon Mar 20 19:55:46 UTC 2023 kill -USR1 28233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28233 killed at Mon Mar 20 19:55:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28285 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28285 found at Mon Mar 20 19:55:46 UTC 2023 selfserv_9887 with PID 28285 started at Mon Mar 20 19:55:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28285 at Mon Mar 20 19:55:46 UTC 2023 kill -USR1 28285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28285 killed at Mon Mar 20 19:55:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28351 found at Mon Mar 20 19:55:47 UTC 2023 selfserv_9887 with PID 28351 started at Mon Mar 20 19:55:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28351 at Mon Mar 20 19:55:47 UTC 2023 kill -USR1 28351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28351 killed at Mon Mar 20 19:55:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28404 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28404 found at Mon Mar 20 19:55:47 UTC 2023 selfserv_9887 with PID 28404 started at Mon Mar 20 19:55:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28404 at Mon Mar 20 19:55:48 UTC 2023 kill -USR1 28404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28404 killed at Mon Mar 20 19:55:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28456 found at Mon Mar 20 19:55:48 UTC 2023 selfserv_9887 with PID 28456 started at Mon Mar 20 19:55:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28456 at Mon Mar 20 19:55:48 UTC 2023 kill -USR1 28456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28456 killed at Mon Mar 20 19:55:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28523 found at Mon Mar 20 19:55:48 UTC 2023 selfserv_9887 with PID 28523 started at Mon Mar 20 19:55:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28523 at Mon Mar 20 19:55:49 UTC 2023 kill -USR1 28523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28523 killed at Mon Mar 20 19:55:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28575 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28575 found at Mon Mar 20 19:55:49 UTC 2023 selfserv_9887 with PID 28575 started at Mon Mar 20 19:55:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28575 at Mon Mar 20 19:55:49 UTC 2023 kill -USR1 28575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28575 killed at Mon Mar 20 19:55:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28627 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28627 found at Mon Mar 20 19:55:50 UTC 2023 selfserv_9887 with PID 28627 started at Mon Mar 20 19:55:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28627 at Mon Mar 20 19:55:50 UTC 2023 kill -USR1 28627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28627 killed at Mon Mar 20 19:55:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28693 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28693 found at Mon Mar 20 19:55:50 UTC 2023 selfserv_9887 with PID 28693 started at Mon Mar 20 19:55:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28693 at Mon Mar 20 19:55:50 UTC 2023 kill -USR1 28693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28693 killed at Mon Mar 20 19:55:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28746 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28746 found at Mon Mar 20 19:55:51 UTC 2023 selfserv_9887 with PID 28746 started at Mon Mar 20 19:55:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28746 at Mon Mar 20 19:55:51 UTC 2023 kill -USR1 28746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28746 killed at Mon Mar 20 19:55:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28798 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28798 found at Mon Mar 20 19:55:51 UTC 2023 selfserv_9887 with PID 28798 started at Mon Mar 20 19:55:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28798 at Mon Mar 20 19:55:51 UTC 2023 kill -USR1 28798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28798 killed at Mon Mar 20 19:55:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28864 found at Mon Mar 20 19:55:52 UTC 2023 selfserv_9887 with PID 28864 started at Mon Mar 20 19:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28864 at Mon Mar 20 19:55:52 UTC 2023 kill -USR1 28864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28864 killed at Mon Mar 20 19:55:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28916 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28916 found at Mon Mar 20 19:55:52 UTC 2023 selfserv_9887 with PID 28916 started at Mon Mar 20 19:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28916 at Mon Mar 20 19:55:52 UTC 2023 kill -USR1 28916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28916 killed at Mon Mar 20 19:55:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28968 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28968 found at Mon Mar 20 19:55:52 UTC 2023 selfserv_9887 with PID 28968 started at Mon Mar 20 19:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28968 at Mon Mar 20 19:55:53 UTC 2023 kill -USR1 28968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28968 killed at Mon Mar 20 19:55:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29034 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29034 found at Mon Mar 20 19:55:53 UTC 2023 selfserv_9887 with PID 29034 started at Mon Mar 20 19:55:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 29034 at Mon Mar 20 19:55:53 UTC 2023 kill -USR1 29034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29034 killed at Mon Mar 20 19:55:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29086 found at Mon Mar 20 19:55:53 UTC 2023 selfserv_9887 with PID 29086 started at Mon Mar 20 19:55:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 29086 at Mon Mar 20 19:55:53 UTC 2023 kill -USR1 29086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29086 killed at Mon Mar 20 19:55:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29138 found at Mon Mar 20 19:55:54 UTC 2023 selfserv_9887 with PID 29138 started at Mon Mar 20 19:55:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 29138 at Mon Mar 20 19:55:54 UTC 2023 kill -USR1 29138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29138 killed at Mon Mar 20 19:55:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29204 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29204 found at Mon Mar 20 19:55:54 UTC 2023 selfserv_9887 with PID 29204 started at Mon Mar 20 19:55:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 29204 at Mon Mar 20 19:55:54 UTC 2023 kill -USR1 29204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29204 killed at Mon Mar 20 19:55:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29256 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29256 found at Mon Mar 20 19:55:54 UTC 2023 selfserv_9887 with PID 29256 started at Mon Mar 20 19:55:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29256 at Mon Mar 20 19:55:55 UTC 2023 kill -USR1 29256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29256 killed at Mon Mar 20 19:55:55 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29308 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29308 found at Mon Mar 20 19:55:55 UTC 2023 selfserv_9887 with PID 29308 started at Mon Mar 20 19:55:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 29308 at Mon Mar 20 19:55:55 UTC 2023 kill -USR1 29308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29308 killed at Mon Mar 20 19:55:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29374 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29374 found at Mon Mar 20 19:55:55 UTC 2023 selfserv_9887 with PID 29374 started at Mon Mar 20 19:55:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29374 at Mon Mar 20 19:55:56 UTC 2023 kill -USR1 29374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29374 killed at Mon Mar 20 19:55:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29427 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29427 found at Mon Mar 20 19:55:56 UTC 2023 selfserv_9887 with PID 29427 started at Mon Mar 20 19:55:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29427 at Mon Mar 20 19:55:57 UTC 2023 kill -USR1 29427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29427 killed at Mon Mar 20 19:55:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:55:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29479 found at Mon Mar 20 19:55:57 UTC 2023 selfserv_9887 with PID 29479 started at Mon Mar 20 19:55:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29479 at Mon Mar 20 19:55:58 UTC 2023 kill -USR1 29479 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29479 killed at Mon Mar 20 19:55:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29545 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29545 found at Mon Mar 20 19:55:58 UTC 2023 selfserv_9887 with PID 29545 started at Mon Mar 20 19:55:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29545 at Mon Mar 20 19:55:58 UTC 2023 kill -USR1 29545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29545 killed at Mon Mar 20 19:55:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29597 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29597 found at Mon Mar 20 19:55:59 UTC 2023 selfserv_9887 with PID 29597 started at Mon Mar 20 19:55:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29597 at Mon Mar 20 19:55:59 UTC 2023 kill -USR1 29597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29597 killed at Mon Mar 20 19:55:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:55:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:55:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29649 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29649 found at Mon Mar 20 19:56:00 UTC 2023 selfserv_9887 with PID 29649 started at Mon Mar 20 19:56:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29649 at Mon Mar 20 19:56:00 UTC 2023 kill -USR1 29649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29649 killed at Mon Mar 20 19:56:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29715 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29715 found at Mon Mar 20 19:56:00 UTC 2023 selfserv_9887 with PID 29715 started at Mon Mar 20 19:56:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29715 at Mon Mar 20 19:56:01 UTC 2023 kill -USR1 29715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29715 killed at Mon Mar 20 19:56:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29767 found at Mon Mar 20 19:56:01 UTC 2023 selfserv_9887 with PID 29767 started at Mon Mar 20 19:56:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29767 at Mon Mar 20 19:56:02 UTC 2023 kill -USR1 29767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29767 killed at Mon Mar 20 19:56:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29819 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29819 found at Mon Mar 20 19:56:02 UTC 2023 selfserv_9887 with PID 29819 started at Mon Mar 20 19:56:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29819 at Mon Mar 20 19:56:02 UTC 2023 kill -USR1 29819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29819 killed at Mon Mar 20 19:56:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29885 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29885 found at Mon Mar 20 19:56:03 UTC 2023 selfserv_9887 with PID 29885 started at Mon Mar 20 19:56:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29885 at Mon Mar 20 19:56:03 UTC 2023 kill -USR1 29885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29885 killed at Mon Mar 20 19:56:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29938 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29938 found at Mon Mar 20 19:56:04 UTC 2023 selfserv_9887 with PID 29938 started at Mon Mar 20 19:56:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29938 at Mon Mar 20 19:56:04 UTC 2023 kill -USR1 29938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29938 killed at Mon Mar 20 19:56:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29992 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29992 found at Mon Mar 20 19:56:04 UTC 2023 selfserv_9887 with PID 29992 started at Mon Mar 20 19:56:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29992 at Mon Mar 20 19:56:05 UTC 2023 kill -USR1 29992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29992 killed at Mon Mar 20 19:56:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30058 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30058 found at Mon Mar 20 19:56:05 UTC 2023 selfserv_9887 with PID 30058 started at Mon Mar 20 19:56:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30058 at Mon Mar 20 19:56:06 UTC 2023 kill -USR1 30058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30058 killed at Mon Mar 20 19:56:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30110 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30110 found at Mon Mar 20 19:56:06 UTC 2023 selfserv_9887 with PID 30110 started at Mon Mar 20 19:56:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30110 at Mon Mar 20 19:56:07 UTC 2023 kill -USR1 30110 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30110 killed at Mon Mar 20 19:56:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30162 found at Mon Mar 20 19:56:07 UTC 2023 selfserv_9887 with PID 30162 started at Mon Mar 20 19:56:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30162 at Mon Mar 20 19:56:07 UTC 2023 kill -USR1 30162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30162 killed at Mon Mar 20 19:56:08 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30229 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30229 found at Mon Mar 20 19:56:08 UTC 2023 selfserv_9887 with PID 30229 started at Mon Mar 20 19:56:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30229 at Mon Mar 20 19:56:08 UTC 2023 kill -USR1 30229 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30229 killed at Mon Mar 20 19:56:08 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30281 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30281 found at Mon Mar 20 19:56:09 UTC 2023 selfserv_9887 with PID 30281 started at Mon Mar 20 19:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30281 at Mon Mar 20 19:56:09 UTC 2023 kill -USR1 30281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30281 killed at Mon Mar 20 19:56:09 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30333 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30333 found at Mon Mar 20 19:56:09 UTC 2023 selfserv_9887 with PID 30333 started at Mon Mar 20 19:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30333 at Mon Mar 20 19:56:10 UTC 2023 kill -USR1 30333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30333 killed at Mon Mar 20 19:56:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30401 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30401 found at Mon Mar 20 19:56:10 UTC 2023 selfserv_9887 with PID 30401 started at Mon Mar 20 19:56:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30401 at Mon Mar 20 19:56:11 UTC 2023 kill -USR1 30401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30401 killed at Mon Mar 20 19:56:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30453 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30453 found at Mon Mar 20 19:56:11 UTC 2023 selfserv_9887 with PID 30453 started at Mon Mar 20 19:56:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30453 at Mon Mar 20 19:56:12 UTC 2023 kill -USR1 30453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30453 killed at Mon Mar 20 19:56:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30506 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30506 found at Mon Mar 20 19:56:12 UTC 2023 selfserv_9887 with PID 30506 started at Mon Mar 20 19:56:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30506 at Mon Mar 20 19:56:12 UTC 2023 kill -USR1 30506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30506 killed at Mon Mar 20 19:56:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30574 found at Mon Mar 20 19:56:13 UTC 2023 selfserv_9887 with PID 30574 started at Mon Mar 20 19:56:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30574 at Mon Mar 20 19:56:13 UTC 2023 kill -USR1 30574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30574 killed at Mon Mar 20 19:56:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30626 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30626 found at Mon Mar 20 19:56:13 UTC 2023 selfserv_9887 with PID 30626 started at Mon Mar 20 19:56:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30626 at Mon Mar 20 19:56:14 UTC 2023 kill -USR1 30626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30626 killed at Mon Mar 20 19:56:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30680 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30680 found at Mon Mar 20 19:56:14 UTC 2023 selfserv_9887 with PID 30680 started at Mon Mar 20 19:56:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30680 at Mon Mar 20 19:56:15 UTC 2023 kill -USR1 30680 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30680 killed at Mon Mar 20 19:56:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30746 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30746 found at Mon Mar 20 19:56:15 UTC 2023 selfserv_9887 with PID 30746 started at Mon Mar 20 19:56:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30746 at Mon Mar 20 19:56:15 UTC 2023 kill -USR1 30746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30746 killed at Mon Mar 20 19:56:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30798 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30798 found at Mon Mar 20 19:56:16 UTC 2023 selfserv_9887 with PID 30798 started at Mon Mar 20 19:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30798 at Mon Mar 20 19:56:16 UTC 2023 kill -USR1 30798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30798 killed at Mon Mar 20 19:56:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30850 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30850 found at Mon Mar 20 19:56:16 UTC 2023 selfserv_9887 with PID 30850 started at Mon Mar 20 19:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30850 at Mon Mar 20 19:56:16 UTC 2023 kill -USR1 30850 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30850 killed at Mon Mar 20 19:56:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30916 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30916 found at Mon Mar 20 19:56:17 UTC 2023 selfserv_9887 with PID 30916 started at Mon Mar 20 19:56:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30916 at Mon Mar 20 19:56:17 UTC 2023 kill -USR1 30916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30916 killed at Mon Mar 20 19:56:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30968 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30968 found at Mon Mar 20 19:56:17 UTC 2023 selfserv_9887 with PID 30968 started at Mon Mar 20 19:56:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30968 at Mon Mar 20 19:56:17 UTC 2023 kill -USR1 30968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30968 killed at Mon Mar 20 19:56:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31020 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31020 found at Mon Mar 20 19:56:18 UTC 2023 selfserv_9887 with PID 31020 started at Mon Mar 20 19:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31020 at Mon Mar 20 19:56:18 UTC 2023 kill -USR1 31020 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31020 killed at Mon Mar 20 19:56:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31086 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31086 found at Mon Mar 20 19:56:18 UTC 2023 selfserv_9887 with PID 31086 started at Mon Mar 20 19:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31086 at Mon Mar 20 19:56:18 UTC 2023 kill -USR1 31086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31086 killed at Mon Mar 20 19:56:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31138 found at Mon Mar 20 19:56:19 UTC 2023 selfserv_9887 with PID 31138 started at Mon Mar 20 19:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31138 at Mon Mar 20 19:56:19 UTC 2023 kill -USR1 31138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31138 killed at Mon Mar 20 19:56:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 19:56:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31190 found at Mon Mar 20 19:56:19 UTC 2023 selfserv_9887 with PID 31190 started at Mon Mar 20 19:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31190 at Mon Mar 20 19:56:19 UTC 2023 kill -USR1 31190 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31190 killed at Mon Mar 20 19:56:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31256 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31256 found at Mon Mar 20 19:56:19 UTC 2023 selfserv_9887 with PID 31256 started at Mon Mar 20 19:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31256 at Mon Mar 20 19:56:20 UTC 2023 kill -USR1 31256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31256 killed at Mon Mar 20 19:56:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31308 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31308 found at Mon Mar 20 19:56:20 UTC 2023 selfserv_9887 with PID 31308 started at Mon Mar 20 19:56:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31308 at Mon Mar 20 19:56:20 UTC 2023 kill -USR1 31308 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31308 killed at Mon Mar 20 19:56:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31360 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31360 found at Mon Mar 20 19:56:20 UTC 2023 selfserv_9887 with PID 31360 started at Mon Mar 20 19:56:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31360 at Mon Mar 20 19:56:21 UTC 2023 kill -USR1 31360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31360 killed at Mon Mar 20 19:56:21 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31426 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31426 found at Mon Mar 20 19:56:21 UTC 2023 selfserv_9887 with PID 31426 started at Mon Mar 20 19:56:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31426 at Mon Mar 20 19:56:21 UTC 2023 kill -USR1 31426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31426 killed at Mon Mar 20 19:56:22 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31478 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31478 found at Mon Mar 20 19:56:22 UTC 2023 selfserv_9887 with PID 31478 started at Mon Mar 20 19:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31478 at Mon Mar 20 19:56:22 UTC 2023 kill -USR1 31478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31478 killed at Mon Mar 20 19:56:22 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31530 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31530 found at Mon Mar 20 19:56:22 UTC 2023 selfserv_9887 with PID 31530 started at Mon Mar 20 19:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31530 at Mon Mar 20 19:56:23 UTC 2023 kill -USR1 31530 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31530 killed at Mon Mar 20 19:56:23 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31596 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31596 found at Mon Mar 20 19:56:23 UTC 2023 selfserv_9887 with PID 31596 started at Mon Mar 20 19:56:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31596 at Mon Mar 20 19:56:23 UTC 2023 kill -USR1 31596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31596 killed at Mon Mar 20 19:56:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31649 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31649 found at Mon Mar 20 19:56:24 UTC 2023 selfserv_9887 with PID 31649 started at Mon Mar 20 19:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31649 at Mon Mar 20 19:56:24 UTC 2023 kill -USR1 31649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31649 killed at Mon Mar 20 19:56:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31701 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31701 found at Mon Mar 20 19:56:24 UTC 2023 selfserv_9887 with PID 31701 started at Mon Mar 20 19:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31701 at Mon Mar 20 19:56:25 UTC 2023 kill -USR1 31701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31701 killed at Mon Mar 20 19:56:25 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9887 starting at Mon Mar 20 19:56:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:25 UTC 2023 selfserv_9887 with PID 31772 started at Mon Mar 20 19:56:25 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:25 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:25 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:26 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:26 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:26 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:27 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:27 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:27 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:28 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:28 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:28 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:29 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:29 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:30 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:30 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:30 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:30 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:31 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:31 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:31 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:32 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:32 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:32 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:33 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:33 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:33 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:34 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:34 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:34 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:35 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:35 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:35 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:36 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:36 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:36 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:36 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:37 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:37 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31772 found at Mon Mar 20 19:56:37 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31772 at Mon Mar 20 19:56:37 UTC 2023 kill -USR1 31772 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31772 killed at Mon Mar 20 19:56:37 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:38 UTC 2023 selfserv_9887 with PID 33039 started at Mon Mar 20 19:56:38 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:38 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:38 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:38 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:38 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:38 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:39 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:39 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:39 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:39 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:39 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:39 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:40 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:40 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:40 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:41 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:42 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:42 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:42 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:42 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:42 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:43 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:44 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:44 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:44 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:44 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:44 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:44 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33039 found at Mon Mar 20 19:56:45 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 33039 at Mon Mar 20 19:56:45 UTC 2023 kill -USR1 33039 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33039 killed at Mon Mar 20 19:56:45 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:45 UTC 2023 selfserv_9887 with PID 34314 started at Mon Mar 20 19:56:45 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:45 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:46 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:46 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:46 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:47 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:47 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:47 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:48 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:48 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:48 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:49 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:49 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:49 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:50 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:50 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:51 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:51 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:51 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:52 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:52 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:52 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:52 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:53 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:53 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:54 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:54 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:55 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:55 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:55 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:55 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:56 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:56 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:56 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:57 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:57 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:57 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:58 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:58 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34314 found at Mon Mar 20 19:56:58 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 34314 at Mon Mar 20 19:56:58 UTC 2023 kill -USR1 34314 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34314 killed at Mon Mar 20 19:56:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:56:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:56:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:58 UTC 2023 selfserv_9887 with PID 35576 started at Mon Mar 20 19:56:58 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:59 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:59 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:59 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:59 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:59 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:56:59 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:00 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:00 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:00 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:00 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:00 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:01 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:01 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:01 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:01 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:02 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:02 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:02 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:02 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:02 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:02 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:03 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:03 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:03 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:03 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:03 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:04 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:05 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:05 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:05 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:05 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:05 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:05 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35576 found at Mon Mar 20 19:57:06 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 35576 at Mon Mar 20 19:57:06 UTC 2023 kill -USR1 35576 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35576 killed at Mon Mar 20 19:57:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:57:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:57:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36837 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36837 found at Mon Mar 20 19:57:06 UTC 2023 selfserv_9887 with PID 36837 started at Mon Mar 20 19:57:06 UTC 2023 trying to kill selfserv_9887 with PID 36837 at Mon Mar 20 19:57:06 UTC 2023 kill -USR1 36837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36837 killed at Mon Mar 20 19:57:06 UTC 2023 selfserv_9887 starting at Mon Mar 20 19:57:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:57:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:06 UTC 2023 selfserv_9887 with PID 36879 started at Mon Mar 20 19:57:06 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:07 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:07 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:08 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:08 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:09 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:09 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:10 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:10 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:11 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:11 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:11 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:12 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:12 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:13 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:14 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:14 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:15 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:15 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:16 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:16 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:17 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:17 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:18 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:18 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:19 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:19 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:20 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:21 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:21 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:21 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:22 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:22 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:23 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:23 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:24 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:24 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:25 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:25 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36879 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36879 found at Mon Mar 20 19:57:26 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36879 at Mon Mar 20 19:57:26 UTC 2023 kill -USR1 36879 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36879 killed at Mon Mar 20 19:57:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:57:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:57:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:26 UTC 2023 selfserv_9887 with PID 38140 started at Mon Mar 20 19:57:26 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:26 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:27 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:27 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:28 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:29 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:29 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:30 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:30 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:31 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:31 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:32 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:32 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:33 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:34 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:34 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:35 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:35 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:36 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:36 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:37 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:37 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:38 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:38 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:39 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:39 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:40 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:41 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:41 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:42 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:42 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:43 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:43 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:44 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:45 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:45 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:46 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:46 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:47 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38140 found at Mon Mar 20 19:57:47 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38140 at Mon Mar 20 19:57:47 UTC 2023 kill -USR1 38140 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38140 killed at Mon Mar 20 19:57:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:57:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:57:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:47 UTC 2023 selfserv_9887 with PID 39416 started at Mon Mar 20 19:57:47 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:48 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:48 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:48 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:48 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:48 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:49 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:49 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:49 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:49 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:49 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:50 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:50 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:50 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:51 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:51 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:51 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:51 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:51 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:52 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:52 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:52 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:52 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:52 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:53 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:53 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:53 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:53 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:54 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:54 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:54 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:55 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:55 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:55 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:55 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:55 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:56 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:56 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:56 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:56 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39416 found at Mon Mar 20 19:57:56 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39416 at Mon Mar 20 19:57:56 UTC 2023 kill -USR1 39416 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39416 killed at Mon Mar 20 19:57:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:57:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:57:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:57:57 UTC 2023 selfserv_9887 with PID 40681 started at Mon Mar 20 19:57:57 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:57:57 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:57:58 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:57:58 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:57:59 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:57:59 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:00 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:00 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:01 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:01 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:02 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:02 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:03 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:03 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:04 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:04 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:05 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:05 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:06 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:06 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:07 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:07 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:08 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:08 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:09 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:09 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:10 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:10 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:11 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:12 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:12 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:13 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:13 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:14 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:14 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:15 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:15 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:16 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:16 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:17 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40681 found at Mon Mar 20 19:58:17 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40681 at Mon Mar 20 19:58:17 UTC 2023 kill -USR1 40681 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40681 killed at Mon Mar 20 19:58:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:58:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:58:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:17 UTC 2023 selfserv_9887 with PID 1284 started at Mon Mar 20 19:58:17 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:18 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:18 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:19 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:19 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:20 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:21 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:21 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:22 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:22 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:23 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:23 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:24 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:25 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:26 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:26 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:27 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:27 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:28 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:28 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:29 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:29 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:30 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:30 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:31 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:31 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:32 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:33 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:34 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:34 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:35 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:35 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:36 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:36 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:37 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:37 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:38 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:38 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:39 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1284 found at Mon Mar 20 19:58:39 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1284 at Mon Mar 20 19:58:39 UTC 2023 kill -USR1 1284 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1284 killed at Mon Mar 20 19:58:39 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:58:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:58:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:39 UTC 2023 selfserv_9887 with PID 2544 started at Mon Mar 20 19:58:39 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:40 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:40 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:40 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:40 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:41 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:41 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:41 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:41 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:42 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:42 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:42 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:42 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:43 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:43 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:44 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:44 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:44 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:44 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:44 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:45 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:45 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:45 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:45 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:46 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:46 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:46 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:47 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:47 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:47 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:47 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:48 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:48 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:48 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:48 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:49 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:49 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:49 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:49 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2544 found at Mon Mar 20 19:58:49 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2544 at Mon Mar 20 19:58:49 UTC 2023 kill -USR1 2544 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2544 killed at Mon Mar 20 19:58:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:58:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:58:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3829 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3829 found at Mon Mar 20 19:58:50 UTC 2023 selfserv_9887 with PID 3829 started at Mon Mar 20 19:58:50 UTC 2023 trying to kill selfserv_9887 with PID 3829 at Mon Mar 20 19:58:50 UTC 2023 kill -USR1 3829 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3829 killed at Mon Mar 20 19:58:50 UTC 2023 selfserv_9887 starting at Mon Mar 20 19:58:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:58:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:50 UTC 2023 selfserv_9887 with PID 3883 started at Mon Mar 20 19:58:50 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:50 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:51 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:51 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:52 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:52 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:53 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:53 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:54 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:54 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:55 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:55 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:56 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:56 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:57 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:58 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:58 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:59 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:58:59 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:00 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:00 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:01 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:01 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:02 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:02 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:02 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:03 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:04 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:04 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:05 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:05 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:06 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:06 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:07 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:07 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:08 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:08 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:09 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:09 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 19:59:10 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3883 at Mon Mar 20 19:59:10 UTC 2023 kill -USR1 3883 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3883 killed at Mon Mar 20 19:59:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:59:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:59:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:10 UTC 2023 selfserv_9887 with PID 5149 started at Mon Mar 20 19:59:10 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:10 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:11 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:11 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:12 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:12 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:13 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:14 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:14 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:15 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:15 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:16 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:16 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:17 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:18 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:18 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:19 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:19 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:20 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:20 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:21 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:21 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:22 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:22 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:23 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:23 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:24 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:25 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:25 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:26 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:26 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:27 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:27 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:28 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:28 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:29 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:29 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:30 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:30 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5149 found at Mon Mar 20 19:59:31 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5149 at Mon Mar 20 19:59:31 UTC 2023 kill -USR1 5149 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5149 killed at Mon Mar 20 19:59:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:59:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:59:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:31 UTC 2023 selfserv_9887 with PID 6425 started at Mon Mar 20 19:59:31 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:31 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:32 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:32 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:32 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:32 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:32 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:33 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:33 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:33 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:33 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:34 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:34 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:34 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:35 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:35 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:35 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:35 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:36 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:36 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:36 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:36 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:36 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:37 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:37 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:37 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:37 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:38 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:38 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:38 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:38 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:39 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:39 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:39 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:39 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:39 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:40 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:40 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:40 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6425 found at Mon Mar 20 19:59:40 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6425 at Mon Mar 20 19:59:40 UTC 2023 kill -USR1 6425 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6425 killed at Mon Mar 20 19:59:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 19:59:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 19:59:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:41 UTC 2023 selfserv_9887 with PID 7727 started at Mon Mar 20 19:59:41 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:41 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:42 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:42 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:43 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:43 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:44 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:44 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:45 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:45 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:46 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:46 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:47 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:47 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:48 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:48 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:49 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:49 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:50 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:50 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:51 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:51 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:52 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:52 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:53 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:53 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:54 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:54 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:55 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:55 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:56 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:56 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:57 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:57 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:58 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:58 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:59 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 19:59:59 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 20:00:00 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 20:00:00 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 20:00:01 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7727 found at Mon Mar 20 20:00:01 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7727 at Mon Mar 20 20:00:01 UTC 2023 kill -USR1 7727 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7727 killed at Mon Mar 20 20:00:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:01 UTC 2023 selfserv_9887 with PID 9092 started at Mon Mar 20 20:00:01 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:02 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:02 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:03 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:04 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:04 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:05 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:05 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:06 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:06 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:07 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:07 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:08 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:09 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:10 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:10 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:11 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:11 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:12 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:12 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:13 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:13 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:14 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:14 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:15 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:15 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:16 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:17 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:18 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:18 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:19 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:19 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:20 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:20 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:21 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:21 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:22 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:22 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:23 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9092 found at Mon Mar 20 20:00:23 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9092 at Mon Mar 20 20:00:23 UTC 2023 kill -USR1 9092 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9092 killed at Mon Mar 20 20:00:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:24 UTC 2023 selfserv_9887 with PID 10353 started at Mon Mar 20 20:00:24 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:24 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:24 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:24 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:25 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:25 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:25 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:25 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:25 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:26 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:26 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:26 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:26 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:27 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:28 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:28 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:28 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:28 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:28 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:29 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:29 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:29 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:29 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:30 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:30 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:30 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:30 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:31 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:31 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:31 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:32 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:32 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:32 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:32 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:32 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:33 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:33 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:33 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:33 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10353 found at Mon Mar 20 20:00:34 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10353 at Mon Mar 20 20:00:34 UTC 2023 kill -USR1 10353 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10353 killed at Mon Mar 20 20:00:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11613 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11613 found at Mon Mar 20 20:00:34 UTC 2023 selfserv_9887 with PID 11613 started at Mon Mar 20 20:00:34 UTC 2023 trying to kill selfserv_9887 with PID 11613 at Mon Mar 20 20:00:34 UTC 2023 kill -USR1 11613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11613 killed at Mon Mar 20 20:00:34 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:00:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 11658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11658 found at Mon Mar 20 20:00:34 UTC 2023 selfserv_9887 with PID 11658 started at Mon Mar 20 20:00:34 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 11658 at Mon Mar 20 20:00:40 UTC 2023 kill -USR1 11658 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11658 killed at Mon Mar 20 20:00:40 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:00:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 12208 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12208 found at Mon Mar 20 20:00:40 UTC 2023 selfserv_9887 with PID 12208 started at Mon Mar 20 20:00:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12208 at Mon Mar 20 20:00:53 UTC 2023 kill -USR1 12208 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12208 killed at Mon Mar 20 20:00:53 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:00:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13033 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13033 found at Mon Mar 20 20:00:53 UTC 2023 selfserv_9887 with PID 13033 started at Mon Mar 20 20:00:53 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13033 at Mon Mar 20 20:00:54 UTC 2023 kill -USR1 13033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13033 killed at Mon Mar 20 20:00:54 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13099 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13099 found at Mon Mar 20 20:00:54 UTC 2023 selfserv_9887 with PID 13099 started at Mon Mar 20 20:00:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13099 at Mon Mar 20 20:00:54 UTC 2023 kill -USR1 13099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13099 killed at Mon Mar 20 20:00:54 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:00:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13151 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13151 found at Mon Mar 20 20:00:55 UTC 2023 selfserv_9887 with PID 13151 started at Mon Mar 20 20:00:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13151 at Mon Mar 20 20:00:55 UTC 2023 kill -USR1 13151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13151 killed at Mon Mar 20 20:00:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13203 found at Mon Mar 20 20:00:55 UTC 2023 selfserv_9887 with PID 13203 started at Mon Mar 20 20:00:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13203 at Mon Mar 20 20:00:56 UTC 2023 kill -USR1 13203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13203 killed at Mon Mar 20 20:00:56 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13255 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13255 found at Mon Mar 20 20:00:56 UTC 2023 selfserv_9887 with PID 13255 started at Mon Mar 20 20:00:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13255 at Mon Mar 20 20:00:56 UTC 2023 kill -USR1 13255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13255 killed at Mon Mar 20 20:00:56 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:00:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13307 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13307 found at Mon Mar 20 20:00:56 UTC 2023 selfserv_9887 with PID 13307 started at Mon Mar 20 20:00:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13307 at Mon Mar 20 20:00:57 UTC 2023 kill -USR1 13307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13307 killed at Mon Mar 20 20:00:57 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13359 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13359 found at Mon Mar 20 20:00:57 UTC 2023 selfserv_9887 with PID 13359 started at Mon Mar 20 20:00:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13359 at Mon Mar 20 20:00:57 UTC 2023 kill -USR1 13359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13359 killed at Mon Mar 20 20:00:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13411 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13411 found at Mon Mar 20 20:00:58 UTC 2023 selfserv_9887 with PID 13411 started at Mon Mar 20 20:00:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13411 at Mon Mar 20 20:00:58 UTC 2023 kill -USR1 13411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13411 killed at Mon Mar 20 20:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:00:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13463 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13463 found at Mon Mar 20 20:00:58 UTC 2023 selfserv_9887 with PID 13463 started at Mon Mar 20 20:00:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13463 at Mon Mar 20 20:00:58 UTC 2023 kill -USR1 13463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13463 killed at Mon Mar 20 20:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13515 found at Mon Mar 20 20:00:59 UTC 2023 selfserv_9887 with PID 13515 started at Mon Mar 20 20:00:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13515 at Mon Mar 20 20:00:59 UTC 2023 kill -USR1 13515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13515 killed at Mon Mar 20 20:00:59 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:00:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13567 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13567 found at Mon Mar 20 20:00:59 UTC 2023 selfserv_9887 with PID 13567 started at Mon Mar 20 20:00:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13567 at Mon Mar 20 20:00:59 UTC 2023 kill -USR1 13567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13567 killed at Mon Mar 20 20:00:59 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:00:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:00:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13619 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13619 found at Mon Mar 20 20:00:59 UTC 2023 selfserv_9887 with PID 13619 started at Mon Mar 20 20:00:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13619 at Mon Mar 20 20:01:00 UTC 2023 kill -USR1 13619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13619 killed at Mon Mar 20 20:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13671 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13671 found at Mon Mar 20 20:01:00 UTC 2023 selfserv_9887 with PID 13671 started at Mon Mar 20 20:01:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13671 at Mon Mar 20 20:01:00 UTC 2023 kill -USR1 13671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13671 killed at Mon Mar 20 20:01:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13723 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13723 found at Mon Mar 20 20:01:00 UTC 2023 selfserv_9887 with PID 13723 started at Mon Mar 20 20:01:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13723 at Mon Mar 20 20:01:01 UTC 2023 kill -USR1 13723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13723 killed at Mon Mar 20 20:01:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13777 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13777 found at Mon Mar 20 20:01:01 UTC 2023 selfserv_9887 with PID 13777 started at Mon Mar 20 20:01:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13777 at Mon Mar 20 20:01:02 UTC 2023 kill -USR1 13777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13777 killed at Mon Mar 20 20:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13842 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13842 found at Mon Mar 20 20:01:02 UTC 2023 selfserv_9887 with PID 13842 started at Mon Mar 20 20:01:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13842 at Mon Mar 20 20:01:03 UTC 2023 kill -USR1 13842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13842 killed at Mon Mar 20 20:01:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13894 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13894 found at Mon Mar 20 20:01:03 UTC 2023 selfserv_9887 with PID 13894 started at Mon Mar 20 20:01:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13894 at Mon Mar 20 20:01:03 UTC 2023 kill -USR1 13894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13894 killed at Mon Mar 20 20:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13946 found at Mon Mar 20 20:01:04 UTC 2023 selfserv_9887 with PID 13946 started at Mon Mar 20 20:01:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13946 at Mon Mar 20 20:01:04 UTC 2023 kill -USR1 13946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13946 killed at Mon Mar 20 20:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13998 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13998 found at Mon Mar 20 20:01:05 UTC 2023 selfserv_9887 with PID 13998 started at Mon Mar 20 20:01:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13998 at Mon Mar 20 20:01:05 UTC 2023 kill -USR1 13998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13998 killed at Mon Mar 20 20:01:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14051 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14051 found at Mon Mar 20 20:01:05 UTC 2023 selfserv_9887 with PID 14051 started at Mon Mar 20 20:01:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14051 at Mon Mar 20 20:01:06 UTC 2023 kill -USR1 14051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14051 killed at Mon Mar 20 20:01:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14103 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14103 found at Mon Mar 20 20:01:06 UTC 2023 selfserv_9887 with PID 14103 started at Mon Mar 20 20:01:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14103 at Mon Mar 20 20:01:07 UTC 2023 kill -USR1 14103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14103 killed at Mon Mar 20 20:01:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14155 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14155 found at Mon Mar 20 20:01:07 UTC 2023 selfserv_9887 with PID 14155 started at Mon Mar 20 20:01:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14155 at Mon Mar 20 20:01:08 UTC 2023 kill -USR1 14155 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14155 killed at Mon Mar 20 20:01:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14207 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14207 found at Mon Mar 20 20:01:08 UTC 2023 selfserv_9887 with PID 14207 started at Mon Mar 20 20:01:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14207 at Mon Mar 20 20:01:08 UTC 2023 kill -USR1 14207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14207 killed at Mon Mar 20 20:01:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14260 found at Mon Mar 20 20:01:09 UTC 2023 selfserv_9887 with PID 14260 started at Mon Mar 20 20:01:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14260 at Mon Mar 20 20:01:09 UTC 2023 kill -USR1 14260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14260 killed at Mon Mar 20 20:01:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14312 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14312 found at Mon Mar 20 20:01:10 UTC 2023 selfserv_9887 with PID 14312 started at Mon Mar 20 20:01:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14312 at Mon Mar 20 20:01:10 UTC 2023 kill -USR1 14312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14312 killed at Mon Mar 20 20:01:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14364 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14364 found at Mon Mar 20 20:01:10 UTC 2023 selfserv_9887 with PID 14364 started at Mon Mar 20 20:01:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14364 at Mon Mar 20 20:01:11 UTC 2023 kill -USR1 14364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14364 killed at Mon Mar 20 20:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14416 found at Mon Mar 20 20:01:11 UTC 2023 selfserv_9887 with PID 14416 started at Mon Mar 20 20:01:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14416 at Mon Mar 20 20:01:11 UTC 2023 kill -USR1 14416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14416 killed at Mon Mar 20 20:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14469 found at Mon Mar 20 20:01:11 UTC 2023 selfserv_9887 with PID 14469 started at Mon Mar 20 20:01:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14469 at Mon Mar 20 20:01:12 UTC 2023 kill -USR1 14469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14469 killed at Mon Mar 20 20:01:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14521 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14521 found at Mon Mar 20 20:01:12 UTC 2023 selfserv_9887 with PID 14521 started at Mon Mar 20 20:01:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14521 at Mon Mar 20 20:01:12 UTC 2023 kill -USR1 14521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14521 killed at Mon Mar 20 20:01:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14573 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14573 found at Mon Mar 20 20:01:12 UTC 2023 selfserv_9887 with PID 14573 started at Mon Mar 20 20:01:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14573 at Mon Mar 20 20:01:13 UTC 2023 kill -USR1 14573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14573 killed at Mon Mar 20 20:01:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14625 found at Mon Mar 20 20:01:13 UTC 2023 selfserv_9887 with PID 14625 started at Mon Mar 20 20:01:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14625 at Mon Mar 20 20:01:13 UTC 2023 kill -USR1 14625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14625 killed at Mon Mar 20 20:01:13 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14677 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14677 found at Mon Mar 20 20:01:13 UTC 2023 selfserv_9887 with PID 14677 started at Mon Mar 20 20:01:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14677 at Mon Mar 20 20:01:13 UTC 2023 kill -USR1 14677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14677 killed at Mon Mar 20 20:01:14 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14729 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14729 found at Mon Mar 20 20:01:14 UTC 2023 selfserv_9887 with PID 14729 started at Mon Mar 20 20:01:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14729 at Mon Mar 20 20:01:14 UTC 2023 kill -USR1 14729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14729 killed at Mon Mar 20 20:01:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14781 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14781 found at Mon Mar 20 20:01:14 UTC 2023 selfserv_9887 with PID 14781 started at Mon Mar 20 20:01:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14781 at Mon Mar 20 20:01:14 UTC 2023 kill -USR1 14781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14781 killed at Mon Mar 20 20:01:14 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14834 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14834 found at Mon Mar 20 20:01:15 UTC 2023 selfserv_9887 with PID 14834 started at Mon Mar 20 20:01:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14834 at Mon Mar 20 20:01:15 UTC 2023 kill -USR1 14834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14834 killed at Mon Mar 20 20:01:15 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14886 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14886 found at Mon Mar 20 20:01:15 UTC 2023 selfserv_9887 with PID 14886 started at Mon Mar 20 20:01:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14886 at Mon Mar 20 20:01:15 UTC 2023 kill -USR1 14886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14886 killed at Mon Mar 20 20:01:15 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14938 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14938 found at Mon Mar 20 20:01:16 UTC 2023 selfserv_9887 with PID 14938 started at Mon Mar 20 20:01:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14938 at Mon Mar 20 20:01:16 UTC 2023 kill -USR1 14938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14938 killed at Mon Mar 20 20:01:16 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14990 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14990 found at Mon Mar 20 20:01:16 UTC 2023 selfserv_9887 with PID 14990 started at Mon Mar 20 20:01:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14990 at Mon Mar 20 20:01:16 UTC 2023 kill -USR1 14990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14990 killed at Mon Mar 20 20:01:16 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15042 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15042 found at Mon Mar 20 20:01:17 UTC 2023 selfserv_9887 with PID 15042 started at Mon Mar 20 20:01:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15042 at Mon Mar 20 20:01:17 UTC 2023 kill -USR1 15042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15042 killed at Mon Mar 20 20:01:17 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15094 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15094 found at Mon Mar 20 20:01:17 UTC 2023 selfserv_9887 with PID 15094 started at Mon Mar 20 20:01:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15094 at Mon Mar 20 20:01:18 UTC 2023 kill -USR1 15094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15094 killed at Mon Mar 20 20:01:18 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15146 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15146 found at Mon Mar 20 20:01:18 UTC 2023 selfserv_9887 with PID 15146 started at Mon Mar 20 20:01:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15146 at Mon Mar 20 20:01:18 UTC 2023 kill -USR1 15146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15146 killed at Mon Mar 20 20:01:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15198 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15198 found at Mon Mar 20 20:01:19 UTC 2023 selfserv_9887 with PID 15198 started at Mon Mar 20 20:01:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15198 at Mon Mar 20 20:01:19 UTC 2023 kill -USR1 15198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15198 killed at Mon Mar 20 20:01:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15250 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15250 found at Mon Mar 20 20:01:19 UTC 2023 selfserv_9887 with PID 15250 started at Mon Mar 20 20:01:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15250 at Mon Mar 20 20:01:19 UTC 2023 kill -USR1 15250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15250 killed at Mon Mar 20 20:01:19 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15302 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15302 found at Mon Mar 20 20:01:20 UTC 2023 selfserv_9887 with PID 15302 started at Mon Mar 20 20:01:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15302 at Mon Mar 20 20:01:20 UTC 2023 kill -USR1 15302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15302 killed at Mon Mar 20 20:01:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15354 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15354 found at Mon Mar 20 20:01:20 UTC 2023 selfserv_9887 with PID 15354 started at Mon Mar 20 20:01:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15354 at Mon Mar 20 20:01:20 UTC 2023 kill -USR1 15354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15354 killed at Mon Mar 20 20:01:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15406 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15406 found at Mon Mar 20 20:01:20 UTC 2023 selfserv_9887 with PID 15406 started at Mon Mar 20 20:01:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15406 at Mon Mar 20 20:01:21 UTC 2023 kill -USR1 15406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15406 killed at Mon Mar 20 20:01:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15458 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15458 found at Mon Mar 20 20:01:21 UTC 2023 selfserv_9887 with PID 15458 started at Mon Mar 20 20:01:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15458 at Mon Mar 20 20:01:22 UTC 2023 kill -USR1 15458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15458 killed at Mon Mar 20 20:01:22 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15511 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15511 found at Mon Mar 20 20:01:22 UTC 2023 selfserv_9887 with PID 15511 started at Mon Mar 20 20:01:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15511 at Mon Mar 20 20:01:23 UTC 2023 kill -USR1 15511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15511 killed at Mon Mar 20 20:01:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15563 found at Mon Mar 20 20:01:23 UTC 2023 selfserv_9887 with PID 15563 started at Mon Mar 20 20:01:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15563 at Mon Mar 20 20:01:23 UTC 2023 kill -USR1 15563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15563 killed at Mon Mar 20 20:01:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15615 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15615 found at Mon Mar 20 20:01:24 UTC 2023 selfserv_9887 with PID 15615 started at Mon Mar 20 20:01:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15615 at Mon Mar 20 20:01:24 UTC 2023 kill -USR1 15615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15615 killed at Mon Mar 20 20:01:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15667 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15667 found at Mon Mar 20 20:01:25 UTC 2023 selfserv_9887 with PID 15667 started at Mon Mar 20 20:01:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15667 at Mon Mar 20 20:01:25 UTC 2023 kill -USR1 15667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15667 killed at Mon Mar 20 20:01:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15719 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15719 found at Mon Mar 20 20:01:25 UTC 2023 selfserv_9887 with PID 15719 started at Mon Mar 20 20:01:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15719 at Mon Mar 20 20:01:26 UTC 2023 kill -USR1 15719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15719 killed at Mon Mar 20 20:01:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15771 found at Mon Mar 20 20:01:26 UTC 2023 selfserv_9887 with PID 15771 started at Mon Mar 20 20:01:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15771 at Mon Mar 20 20:01:27 UTC 2023 kill -USR1 15771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15771 killed at Mon Mar 20 20:01:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15823 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15823 found at Mon Mar 20 20:01:27 UTC 2023 selfserv_9887 with PID 15823 started at Mon Mar 20 20:01:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15823 at Mon Mar 20 20:01:27 UTC 2023 kill -USR1 15823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15823 killed at Mon Mar 20 20:01:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15875 found at Mon Mar 20 20:01:28 UTC 2023 selfserv_9887 with PID 15875 started at Mon Mar 20 20:01:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15875 at Mon Mar 20 20:01:28 UTC 2023 kill -USR1 15875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15875 killed at Mon Mar 20 20:01:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:01:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15927 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15927 found at Mon Mar 20 20:01:28 UTC 2023 selfserv_9887 with PID 15927 started at Mon Mar 20 20:01:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15927 at Mon Mar 20 20:01:28 UTC 2023 kill -USR1 15927 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15927 killed at Mon Mar 20 20:01:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15979 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15979 found at Mon Mar 20 20:01:29 UTC 2023 selfserv_9887 with PID 15979 started at Mon Mar 20 20:01:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15979 at Mon Mar 20 20:01:29 UTC 2023 kill -USR1 15979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15979 killed at Mon Mar 20 20:01:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16032 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16032 found at Mon Mar 20 20:01:29 UTC 2023 selfserv_9887 with PID 16032 started at Mon Mar 20 20:01:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16032 at Mon Mar 20 20:01:30 UTC 2023 kill -USR1 16032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16032 killed at Mon Mar 20 20:01:30 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:01:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16084 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16084 found at Mon Mar 20 20:01:30 UTC 2023 selfserv_9887 with PID 16084 started at Mon Mar 20 20:01:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16084 at Mon Mar 20 20:01:30 UTC 2023 kill -USR1 16084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16084 killed at Mon Mar 20 20:01:30 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:01:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16142 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16142 found at Mon Mar 20 20:01:30 UTC 2023 selfserv_9887 with PID 16142 started at Mon Mar 20 20:01:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16142 at Mon Mar 20 20:01:30 UTC 2023 kill -USR1 16142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16142 killed at Mon Mar 20 20:01:31 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:01:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16200 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16200 found at Mon Mar 20 20:01:31 UTC 2023 selfserv_9887 with PID 16200 started at Mon Mar 20 20:01:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16200 at Mon Mar 20 20:01:31 UTC 2023 kill -USR1 16200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16200 killed at Mon Mar 20 20:01:31 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:01:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16258 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16258 found at Mon Mar 20 20:01:31 UTC 2023 selfserv_9887 with PID 16258 started at Mon Mar 20 20:01:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16258 at Mon Mar 20 20:01:31 UTC 2023 kill -USR1 16258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16258 killed at Mon Mar 20 20:01:31 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:01:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16316 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16316 found at Mon Mar 20 20:01:31 UTC 2023 selfserv_9887 with PID 16316 started at Mon Mar 20 20:01:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16316 at Mon Mar 20 20:01:32 UTC 2023 kill -USR1 16316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16316 killed at Mon Mar 20 20:01:32 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 20:01:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16374 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16374 found at Mon Mar 20 20:01:32 UTC 2023 selfserv_9887 with PID 16374 started at Mon Mar 20 20:01:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16374 at Mon Mar 20 20:01:32 UTC 2023 kill -USR1 16374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16374 killed at Mon Mar 20 20:01:32 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:01:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16433 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16433 found at Mon Mar 20 20:01:32 UTC 2023 selfserv_9887 with PID 16433 started at Mon Mar 20 20:01:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16433 at Mon Mar 20 20:01:32 UTC 2023 kill -USR1 16433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16433 killed at Mon Mar 20 20:01:33 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:01:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16491 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16491 found at Mon Mar 20 20:01:33 UTC 2023 selfserv_9887 with PID 16491 started at Mon Mar 20 20:01:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16491 at Mon Mar 20 20:01:33 UTC 2023 kill -USR1 16491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16491 killed at Mon Mar 20 20:01:33 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:01:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16549 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16549 found at Mon Mar 20 20:01:33 UTC 2023 selfserv_9887 with PID 16549 started at Mon Mar 20 20:01:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16549 at Mon Mar 20 20:01:33 UTC 2023 kill -USR1 16549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16549 killed at Mon Mar 20 20:01:33 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:01:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16607 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16607 found at Mon Mar 20 20:01:34 UTC 2023 selfserv_9887 with PID 16607 started at Mon Mar 20 20:01:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16607 at Mon Mar 20 20:01:34 UTC 2023 kill -USR1 16607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16607 killed at Mon Mar 20 20:01:34 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:01:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16665 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16665 found at Mon Mar 20 20:01:34 UTC 2023 selfserv_9887 with PID 16665 started at Mon Mar 20 20:01:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16665 at Mon Mar 20 20:01:34 UTC 2023 kill -USR1 16665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16665 killed at Mon Mar 20 20:01:34 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 20:01:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16707 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16707 found at Mon Mar 20 20:01:34 UTC 2023 selfserv_9887 with PID 16707 started at Mon Mar 20 20:01:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16707 at Mon Mar 20 20:01:34 UTC 2023 kill -USR1 16707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16707 killed at Mon Mar 20 20:01:34 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 20:01:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16749 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16749 found at Mon Mar 20 20:01:35 UTC 2023 selfserv_9887 with PID 16749 started at Mon Mar 20 20:01:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 16749 at Mon Mar 20 20:01:35 UTC 2023 kill -USR1 16749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16749 killed at Mon Mar 20 20:01:35 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 20:01:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16791 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16791 found at Mon Mar 20 20:01:35 UTC 2023 selfserv_9887 with PID 16791 started at Mon Mar 20 20:01:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 16791 at Mon Mar 20 20:01:35 UTC 2023 kill -USR1 16791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16791 killed at Mon Mar 20 20:01:35 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 20:01:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16833 found at Mon Mar 20 20:01:35 UTC 2023 selfserv_9887 with PID 16833 started at Mon Mar 20 20:01:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 16833 at Mon Mar 20 20:01:35 UTC 2023 kill -USR1 16833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16833 killed at Mon Mar 20 20:01:36 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 20:01:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16875 found at Mon Mar 20 20:01:36 UTC 2023 selfserv_9887 with PID 16875 started at Mon Mar 20 20:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 16875 at Mon Mar 20 20:01:36 UTC 2023 kill -USR1 16875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16875 killed at Mon Mar 20 20:01:36 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 20:01:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16917 found at Mon Mar 20 20:01:36 UTC 2023 selfserv_9887 with PID 16917 started at Mon Mar 20 20:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 16917 at Mon Mar 20 20:01:36 UTC 2023 kill -USR1 16917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16917 killed at Mon Mar 20 20:01:36 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 20:01:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16959 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16959 found at Mon Mar 20 20:01:36 UTC 2023 selfserv_9887 with PID 16959 started at Mon Mar 20 20:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 16959 at Mon Mar 20 20:01:37 UTC 2023 kill -USR1 16959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16959 killed at Mon Mar 20 20:01:37 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 20:01:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:01:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17001 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17001 found at Mon Mar 20 20:01:37 UTC 2023 selfserv_9887 with PID 17001 started at Mon Mar 20 20:01:37 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 20:01:37 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 20:02:41 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 17001 at Mon Mar 20 20:02:41 UTC 2023 kill -USR1 17001 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17001 killed at Mon Mar 20 20:02:41 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:02:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17083 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17083 found at Mon Mar 20 20:02:42 UTC 2023 selfserv_9887 with PID 17083 started at Mon Mar 20 20:02:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17083 at Mon Mar 20 20:02:42 UTC 2023 kill -USR1 17083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17083 killed at Mon Mar 20 20:02:42 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17125 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17125 found at Mon Mar 20 20:02:42 UTC 2023 selfserv_9887 with PID 17125 started at Mon Mar 20 20:02:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17125 at Mon Mar 20 20:02:42 UTC 2023 kill -USR1 17125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17125 killed at Mon Mar 20 20:02:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17164 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17164 found at Mon Mar 20 20:02:43 UTC 2023 selfserv_9887 with PID 17164 started at Mon Mar 20 20:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 17164 at Mon Mar 20 20:02:43 UTC 2023 kill -USR1 17164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17164 killed at Mon Mar 20 20:02:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17203 found at Mon Mar 20 20:02:43 UTC 2023 selfserv_9887 with PID 17203 started at Mon Mar 20 20:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17203 at Mon Mar 20 20:02:43 UTC 2023 kill -USR1 17203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17203 killed at Mon Mar 20 20:02:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17244 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17244 found at Mon Mar 20 20:02:43 UTC 2023 selfserv_9887 with PID 17244 started at Mon Mar 20 20:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 17244 at Mon Mar 20 20:02:43 UTC 2023 kill -USR1 17244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17244 killed at Mon Mar 20 20:02:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17283 found at Mon Mar 20 20:02:44 UTC 2023 selfserv_9887 with PID 17283 started at Mon Mar 20 20:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17283 at Mon Mar 20 20:02:44 UTC 2023 kill -USR1 17283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17283 killed at Mon Mar 20 20:02:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17322 found at Mon Mar 20 20:02:44 UTC 2023 selfserv_9887 with PID 17322 started at Mon Mar 20 20:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17322 at Mon Mar 20 20:02:44 UTC 2023 kill -USR1 17322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17322 killed at Mon Mar 20 20:02:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17361 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17361 found at Mon Mar 20 20:02:44 UTC 2023 selfserv_9887 with PID 17361 started at Mon Mar 20 20:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17361 at Mon Mar 20 20:02:44 UTC 2023 kill -USR1 17361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17361 killed at Mon Mar 20 20:02:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17400 found at Mon Mar 20 20:02:45 UTC 2023 selfserv_9887 with PID 17400 started at Mon Mar 20 20:02:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17400 at Mon Mar 20 20:02:45 UTC 2023 kill -USR1 17400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17400 killed at Mon Mar 20 20:02:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17439 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17439 found at Mon Mar 20 20:02:45 UTC 2023 selfserv_9887 with PID 17439 started at Mon Mar 20 20:02:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17439 at Mon Mar 20 20:02:45 UTC 2023 kill -USR1 17439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17439 killed at Mon Mar 20 20:02:45 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17478 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17478 found at Mon Mar 20 20:02:45 UTC 2023 selfserv_9887 with PID 17478 started at Mon Mar 20 20:02:45 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17478 at Mon Mar 20 20:02:46 UTC 2023 kill -USR1 17478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17478 killed at Mon Mar 20 20:02:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17525 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17525 found at Mon Mar 20 20:02:46 UTC 2023 selfserv_9887 with PID 17525 started at Mon Mar 20 20:02:46 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17525 at Mon Mar 20 20:02:46 UTC 2023 kill -USR1 17525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17525 killed at Mon Mar 20 20:02:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17565 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17565 found at Mon Mar 20 20:02:46 UTC 2023 selfserv_9887 with PID 17565 started at Mon Mar 20 20:02:46 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17565 at Mon Mar 20 20:02:46 UTC 2023 kill -USR1 17565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17565 killed at Mon Mar 20 20:02:46 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17605 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17605 found at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 with PID 17605 started at Mon Mar 20 20:02:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17605 at Mon Mar 20 20:02:47 UTC 2023 kill -USR1 17605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17605 killed at Mon Mar 20 20:02:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17645 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17645 found at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 with PID 17645 started at Mon Mar 20 20:02:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17645 at Mon Mar 20 20:02:47 UTC 2023 kill -USR1 17645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17645 killed at Mon Mar 20 20:02:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17685 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17685 found at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 with PID 17685 started at Mon Mar 20 20:02:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17685 at Mon Mar 20 20:02:47 UTC 2023 kill -USR1 17685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17685 killed at Mon Mar 20 20:02:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17725 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17725 found at Mon Mar 20 20:02:47 UTC 2023 selfserv_9887 with PID 17725 started at Mon Mar 20 20:02:47 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17725 at Mon Mar 20 20:02:48 UTC 2023 kill -USR1 17725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17725 killed at Mon Mar 20 20:02:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17765 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17765 found at Mon Mar 20 20:02:48 UTC 2023 selfserv_9887 with PID 17765 started at Mon Mar 20 20:02:48 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17765 at Mon Mar 20 20:02:48 UTC 2023 kill -USR1 17765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17765 killed at Mon Mar 20 20:02:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:02:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17805 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17805 found at Mon Mar 20 20:02:48 UTC 2023 selfserv_9887 with PID 17805 started at Mon Mar 20 20:02:48 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17805 at Mon Mar 20 20:02:48 UTC 2023 kill -USR1 17805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17805 killed at Mon Mar 20 20:02:48 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:02:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 17845 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17845 found at Mon Mar 20 20:02:49 UTC 2023 selfserv_9887 with PID 17845 started at Mon Mar 20 20:02:49 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 17845 at Mon Mar 20 20:02:54 UTC 2023 kill -USR1 17845 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17845 killed at Mon Mar 20 20:02:54 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:02:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:02:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 18395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18395 found at Mon Mar 20 20:02:54 UTC 2023 selfserv_9887 with PID 18395 started at Mon Mar 20 20:02:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18395 at Mon Mar 20 20:03:04 UTC 2023 kill -USR1 18395 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18395 killed at Mon Mar 20 20:03:04 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19208 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19208 found at Mon Mar 20 20:03:04 UTC 2023 selfserv_9887 with PID 19208 started at Mon Mar 20 20:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19208 at Mon Mar 20 20:03:04 UTC 2023 kill -USR1 19208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19208 killed at Mon Mar 20 20:03:04 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19261 found at Mon Mar 20 20:03:05 UTC 2023 selfserv_9887 with PID 19261 started at Mon Mar 20 20:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19261 at Mon Mar 20 20:03:05 UTC 2023 kill -USR1 19261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19261 killed at Mon Mar 20 20:03:05 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19314 found at Mon Mar 20 20:03:05 UTC 2023 selfserv_9887 with PID 19314 started at Mon Mar 20 20:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19314 at Mon Mar 20 20:03:05 UTC 2023 kill -USR1 19314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19314 killed at Mon Mar 20 20:03:05 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19366 found at Mon Mar 20 20:03:05 UTC 2023 selfserv_9887 with PID 19366 started at Mon Mar 20 20:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19366 at Mon Mar 20 20:03:06 UTC 2023 kill -USR1 19366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19366 killed at Mon Mar 20 20:03:06 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19418 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19418 found at Mon Mar 20 20:03:06 UTC 2023 selfserv_9887 with PID 19418 started at Mon Mar 20 20:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19418 at Mon Mar 20 20:03:06 UTC 2023 kill -USR1 19418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19418 killed at Mon Mar 20 20:03:06 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19472 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19472 found at Mon Mar 20 20:03:06 UTC 2023 selfserv_9887 with PID 19472 started at Mon Mar 20 20:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19472 at Mon Mar 20 20:03:07 UTC 2023 kill -USR1 19472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19472 killed at Mon Mar 20 20:03:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19524 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19524 found at Mon Mar 20 20:03:07 UTC 2023 selfserv_9887 with PID 19524 started at Mon Mar 20 20:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19524 at Mon Mar 20 20:03:07 UTC 2023 kill -USR1 19524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19524 killed at Mon Mar 20 20:03:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19577 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19577 found at Mon Mar 20 20:03:07 UTC 2023 selfserv_9887 with PID 19577 started at Mon Mar 20 20:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19577 at Mon Mar 20 20:03:07 UTC 2023 kill -USR1 19577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19577 killed at Mon Mar 20 20:03:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19629 found at Mon Mar 20 20:03:08 UTC 2023 selfserv_9887 with PID 19629 started at Mon Mar 20 20:03:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19629 at Mon Mar 20 20:03:08 UTC 2023 kill -USR1 19629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19629 killed at Mon Mar 20 20:03:08 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19681 found at Mon Mar 20 20:03:08 UTC 2023 selfserv_9887 with PID 19681 started at Mon Mar 20 20:03:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19681 at Mon Mar 20 20:03:08 UTC 2023 kill -USR1 19681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19681 killed at Mon Mar 20 20:03:08 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19733 found at Mon Mar 20 20:03:09 UTC 2023 selfserv_9887 with PID 19733 started at Mon Mar 20 20:03:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19733 at Mon Mar 20 20:03:09 UTC 2023 kill -USR1 19733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19733 killed at Mon Mar 20 20:03:09 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19787 found at Mon Mar 20 20:03:09 UTC 2023 selfserv_9887 with PID 19787 started at Mon Mar 20 20:03:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19787 at Mon Mar 20 20:03:09 UTC 2023 kill -USR1 19787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19787 killed at Mon Mar 20 20:03:09 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19839 found at Mon Mar 20 20:03:09 UTC 2023 selfserv_9887 with PID 19839 started at Mon Mar 20 20:03:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19839 at Mon Mar 20 20:03:10 UTC 2023 kill -USR1 19839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19839 killed at Mon Mar 20 20:03:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19891 found at Mon Mar 20 20:03:10 UTC 2023 selfserv_9887 with PID 19891 started at Mon Mar 20 20:03:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19891 at Mon Mar 20 20:03:10 UTC 2023 kill -USR1 19891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19891 killed at Mon Mar 20 20:03:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19943 found at Mon Mar 20 20:03:10 UTC 2023 selfserv_9887 with PID 19943 started at Mon Mar 20 20:03:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19943 at Mon Mar 20 20:03:10 UTC 2023 kill -USR1 19943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19943 killed at Mon Mar 20 20:03:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19995 found at Mon Mar 20 20:03:11 UTC 2023 selfserv_9887 with PID 19995 started at Mon Mar 20 20:03:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19995 at Mon Mar 20 20:03:11 UTC 2023 kill -USR1 19995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19995 killed at Mon Mar 20 20:03:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20047 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20047 found at Mon Mar 20 20:03:11 UTC 2023 selfserv_9887 with PID 20047 started at Mon Mar 20 20:03:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20047 at Mon Mar 20 20:03:11 UTC 2023 kill -USR1 20047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20047 killed at Mon Mar 20 20:03:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20099 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20099 found at Mon Mar 20 20:03:12 UTC 2023 selfserv_9887 with PID 20099 started at Mon Mar 20 20:03:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20099 at Mon Mar 20 20:03:12 UTC 2023 kill -USR1 20099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20099 killed at Mon Mar 20 20:03:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20151 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20151 found at Mon Mar 20 20:03:12 UTC 2023 selfserv_9887 with PID 20151 started at Mon Mar 20 20:03:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20151 at Mon Mar 20 20:03:12 UTC 2023 kill -USR1 20151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20151 killed at Mon Mar 20 20:03:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20203 found at Mon Mar 20 20:03:12 UTC 2023 selfserv_9887 with PID 20203 started at Mon Mar 20 20:03:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20203 at Mon Mar 20 20:03:13 UTC 2023 kill -USR1 20203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20203 killed at Mon Mar 20 20:03:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20256 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20256 found at Mon Mar 20 20:03:13 UTC 2023 selfserv_9887 with PID 20256 started at Mon Mar 20 20:03:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20256 at Mon Mar 20 20:03:13 UTC 2023 kill -USR1 20256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20256 killed at Mon Mar 20 20:03:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20308 found at Mon Mar 20 20:03:13 UTC 2023 selfserv_9887 with PID 20308 started at Mon Mar 20 20:03:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20308 at Mon Mar 20 20:03:14 UTC 2023 kill -USR1 20308 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20308 killed at Mon Mar 20 20:03:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20360 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20360 found at Mon Mar 20 20:03:14 UTC 2023 selfserv_9887 with PID 20360 started at Mon Mar 20 20:03:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20360 at Mon Mar 20 20:03:14 UTC 2023 kill -USR1 20360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20360 killed at Mon Mar 20 20:03:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20412 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20412 found at Mon Mar 20 20:03:14 UTC 2023 selfserv_9887 with PID 20412 started at Mon Mar 20 20:03:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20412 at Mon Mar 20 20:03:15 UTC 2023 kill -USR1 20412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20412 killed at Mon Mar 20 20:03:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20465 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20465 found at Mon Mar 20 20:03:15 UTC 2023 selfserv_9887 with PID 20465 started at Mon Mar 20 20:03:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20465 at Mon Mar 20 20:03:15 UTC 2023 kill -USR1 20465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20465 killed at Mon Mar 20 20:03:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20517 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20517 found at Mon Mar 20 20:03:15 UTC 2023 selfserv_9887 with PID 20517 started at Mon Mar 20 20:03:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20517 at Mon Mar 20 20:03:16 UTC 2023 kill -USR1 20517 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20517 killed at Mon Mar 20 20:03:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20569 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20569 found at Mon Mar 20 20:03:16 UTC 2023 selfserv_9887 with PID 20569 started at Mon Mar 20 20:03:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20569 at Mon Mar 20 20:03:16 UTC 2023 kill -USR1 20569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20569 killed at Mon Mar 20 20:03:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20621 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20621 found at Mon Mar 20 20:03:16 UTC 2023 selfserv_9887 with PID 20621 started at Mon Mar 20 20:03:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20621 at Mon Mar 20 20:03:16 UTC 2023 kill -USR1 20621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20621 killed at Mon Mar 20 20:03:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20673 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20673 found at Mon Mar 20 20:03:17 UTC 2023 selfserv_9887 with PID 20673 started at Mon Mar 20 20:03:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20673 at Mon Mar 20 20:03:17 UTC 2023 kill -USR1 20673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20673 killed at Mon Mar 20 20:03:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20725 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20725 found at Mon Mar 20 20:03:17 UTC 2023 selfserv_9887 with PID 20725 started at Mon Mar 20 20:03:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20725 at Mon Mar 20 20:03:17 UTC 2023 kill -USR1 20725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20725 killed at Mon Mar 20 20:03:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20777 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20777 found at Mon Mar 20 20:03:18 UTC 2023 selfserv_9887 with PID 20777 started at Mon Mar 20 20:03:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20777 at Mon Mar 20 20:03:18 UTC 2023 kill -USR1 20777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20777 killed at Mon Mar 20 20:03:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20829 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20829 found at Mon Mar 20 20:03:18 UTC 2023 selfserv_9887 with PID 20829 started at Mon Mar 20 20:03:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20829 at Mon Mar 20 20:03:18 UTC 2023 kill -USR1 20829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20829 killed at Mon Mar 20 20:03:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20881 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20881 found at Mon Mar 20 20:03:19 UTC 2023 selfserv_9887 with PID 20881 started at Mon Mar 20 20:03:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20881 at Mon Mar 20 20:03:19 UTC 2023 kill -USR1 20881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20881 killed at Mon Mar 20 20:03:19 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20933 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20933 found at Mon Mar 20 20:03:19 UTC 2023 selfserv_9887 with PID 20933 started at Mon Mar 20 20:03:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20933 at Mon Mar 20 20:03:19 UTC 2023 kill -USR1 20933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20933 killed at Mon Mar 20 20:03:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20985 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20985 found at Mon Mar 20 20:03:19 UTC 2023 selfserv_9887 with PID 20985 started at Mon Mar 20 20:03:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20985 at Mon Mar 20 20:03:20 UTC 2023 kill -USR1 20985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20985 killed at Mon Mar 20 20:03:20 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21037 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21037 found at Mon Mar 20 20:03:20 UTC 2023 selfserv_9887 with PID 21037 started at Mon Mar 20 20:03:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21037 at Mon Mar 20 20:03:20 UTC 2023 kill -USR1 21037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21037 killed at Mon Mar 20 20:03:20 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21089 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21089 found at Mon Mar 20 20:03:20 UTC 2023 selfserv_9887 with PID 21089 started at Mon Mar 20 20:03:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21089 at Mon Mar 20 20:03:20 UTC 2023 kill -USR1 21089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21089 killed at Mon Mar 20 20:03:21 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21141 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21141 found at Mon Mar 20 20:03:21 UTC 2023 selfserv_9887 with PID 21141 started at Mon Mar 20 20:03:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21141 at Mon Mar 20 20:03:21 UTC 2023 kill -USR1 21141 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21141 killed at Mon Mar 20 20:03:21 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21193 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21193 found at Mon Mar 20 20:03:21 UTC 2023 selfserv_9887 with PID 21193 started at Mon Mar 20 20:03:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21193 at Mon Mar 20 20:03:21 UTC 2023 kill -USR1 21193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21193 killed at Mon Mar 20 20:03:21 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21245 found at Mon Mar 20 20:03:22 UTC 2023 selfserv_9887 with PID 21245 started at Mon Mar 20 20:03:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21245 at Mon Mar 20 20:03:22 UTC 2023 kill -USR1 21245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21245 killed at Mon Mar 20 20:03:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21297 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21297 found at Mon Mar 20 20:03:22 UTC 2023 selfserv_9887 with PID 21297 started at Mon Mar 20 20:03:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21297 at Mon Mar 20 20:03:22 UTC 2023 kill -USR1 21297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21297 killed at Mon Mar 20 20:03:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21349 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21349 found at Mon Mar 20 20:03:23 UTC 2023 selfserv_9887 with PID 21349 started at Mon Mar 20 20:03:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21349 at Mon Mar 20 20:03:23 UTC 2023 kill -USR1 21349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21349 killed at Mon Mar 20 20:03:23 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21401 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21401 found at Mon Mar 20 20:03:23 UTC 2023 selfserv_9887 with PID 21401 started at Mon Mar 20 20:03:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21401 at Mon Mar 20 20:03:23 UTC 2023 kill -USR1 21401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21401 killed at Mon Mar 20 20:03:23 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21453 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21453 found at Mon Mar 20 20:03:23 UTC 2023 selfserv_9887 with PID 21453 started at Mon Mar 20 20:03:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21453 at Mon Mar 20 20:03:24 UTC 2023 kill -USR1 21453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21453 killed at Mon Mar 20 20:03:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21505 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21505 found at Mon Mar 20 20:03:24 UTC 2023 selfserv_9887 with PID 21505 started at Mon Mar 20 20:03:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21505 at Mon Mar 20 20:03:24 UTC 2023 kill -USR1 21505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21505 killed at Mon Mar 20 20:03:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21557 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21557 found at Mon Mar 20 20:03:24 UTC 2023 selfserv_9887 with PID 21557 started at Mon Mar 20 20:03:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21557 at Mon Mar 20 20:03:25 UTC 2023 kill -USR1 21557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21557 killed at Mon Mar 20 20:03:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21610 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21610 found at Mon Mar 20 20:03:25 UTC 2023 selfserv_9887 with PID 21610 started at Mon Mar 20 20:03:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21610 at Mon Mar 20 20:03:25 UTC 2023 kill -USR1 21610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21610 killed at Mon Mar 20 20:03:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21663 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21663 found at Mon Mar 20 20:03:25 UTC 2023 selfserv_9887 with PID 21663 started at Mon Mar 20 20:03:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21663 at Mon Mar 20 20:03:25 UTC 2023 kill -USR1 21663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21663 killed at Mon Mar 20 20:03:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21715 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21715 found at Mon Mar 20 20:03:26 UTC 2023 selfserv_9887 with PID 21715 started at Mon Mar 20 20:03:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21715 at Mon Mar 20 20:03:26 UTC 2023 kill -USR1 21715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21715 killed at Mon Mar 20 20:03:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21767 found at Mon Mar 20 20:03:26 UTC 2023 selfserv_9887 with PID 21767 started at Mon Mar 20 20:03:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21767 at Mon Mar 20 20:03:26 UTC 2023 kill -USR1 21767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21767 killed at Mon Mar 20 20:03:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21820 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21820 found at Mon Mar 20 20:03:27 UTC 2023 selfserv_9887 with PID 21820 started at Mon Mar 20 20:03:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21820 at Mon Mar 20 20:03:27 UTC 2023 kill -USR1 21820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21820 killed at Mon Mar 20 20:03:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21872 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21872 found at Mon Mar 20 20:03:27 UTC 2023 selfserv_9887 with PID 21872 started at Mon Mar 20 20:03:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21872 at Mon Mar 20 20:03:27 UTC 2023 kill -USR1 21872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21872 killed at Mon Mar 20 20:03:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21924 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21924 found at Mon Mar 20 20:03:28 UTC 2023 selfserv_9887 with PID 21924 started at Mon Mar 20 20:03:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21924 at Mon Mar 20 20:03:28 UTC 2023 kill -USR1 21924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21924 killed at Mon Mar 20 20:03:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21976 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21976 found at Mon Mar 20 20:03:28 UTC 2023 selfserv_9887 with PID 21976 started at Mon Mar 20 20:03:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21976 at Mon Mar 20 20:03:28 UTC 2023 kill -USR1 21976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21976 killed at Mon Mar 20 20:03:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22028 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22028 found at Mon Mar 20 20:03:29 UTC 2023 selfserv_9887 with PID 22028 started at Mon Mar 20 20:03:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22028 at Mon Mar 20 20:03:29 UTC 2023 kill -USR1 22028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22028 killed at Mon Mar 20 20:03:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22082 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22082 found at Mon Mar 20 20:03:29 UTC 2023 selfserv_9887 with PID 22082 started at Mon Mar 20 20:03:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22082 at Mon Mar 20 20:03:29 UTC 2023 kill -USR1 22082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22082 killed at Mon Mar 20 20:03:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22134 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22134 found at Mon Mar 20 20:03:30 UTC 2023 selfserv_9887 with PID 22134 started at Mon Mar 20 20:03:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22134 at Mon Mar 20 20:03:30 UTC 2023 kill -USR1 22134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22134 killed at Mon Mar 20 20:03:30 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22186 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22186 found at Mon Mar 20 20:03:30 UTC 2023 selfserv_9887 with PID 22186 started at Mon Mar 20 20:03:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22186 at Mon Mar 20 20:03:30 UTC 2023 kill -USR1 22186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22186 killed at Mon Mar 20 20:03:30 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:03:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22268 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22268 found at Mon Mar 20 20:03:31 UTC 2023 selfserv_9887 with PID 22268 started at Mon Mar 20 20:03:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22268 at Mon Mar 20 20:03:31 UTC 2023 kill -USR1 22268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22268 killed at Mon Mar 20 20:03:31 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22312 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22312 found at Mon Mar 20 20:03:31 UTC 2023 selfserv_9887 with PID 22312 started at Mon Mar 20 20:03:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22312 at Mon Mar 20 20:03:31 UTC 2023 kill -USR1 22312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22312 killed at Mon Mar 20 20:03:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22351 found at Mon Mar 20 20:03:31 UTC 2023 selfserv_9887 with PID 22351 started at Mon Mar 20 20:03:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22351 at Mon Mar 20 20:03:31 UTC 2023 kill -USR1 22351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22351 killed at Mon Mar 20 20:03:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22390 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22390 found at Mon Mar 20 20:03:32 UTC 2023 selfserv_9887 with PID 22390 started at Mon Mar 20 20:03:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22390 at Mon Mar 20 20:03:32 UTC 2023 kill -USR1 22390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22390 killed at Mon Mar 20 20:03:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22430 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22430 found at Mon Mar 20 20:03:32 UTC 2023 selfserv_9887 with PID 22430 started at Mon Mar 20 20:03:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22430 at Mon Mar 20 20:03:32 UTC 2023 kill -USR1 22430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22430 killed at Mon Mar 20 20:03:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22469 found at Mon Mar 20 20:03:32 UTC 2023 selfserv_9887 with PID 22469 started at Mon Mar 20 20:03:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22469 at Mon Mar 20 20:03:32 UTC 2023 kill -USR1 22469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22469 killed at Mon Mar 20 20:03:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22508 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22508 found at Mon Mar 20 20:03:33 UTC 2023 selfserv_9887 with PID 22508 started at Mon Mar 20 20:03:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22508 at Mon Mar 20 20:03:33 UTC 2023 kill -USR1 22508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22508 killed at Mon Mar 20 20:03:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22547 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22547 found at Mon Mar 20 20:03:33 UTC 2023 selfserv_9887 with PID 22547 started at Mon Mar 20 20:03:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22547 at Mon Mar 20 20:03:33 UTC 2023 kill -USR1 22547 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22547 killed at Mon Mar 20 20:03:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22586 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22586 found at Mon Mar 20 20:03:33 UTC 2023 selfserv_9887 with PID 22586 started at Mon Mar 20 20:03:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22586 at Mon Mar 20 20:03:33 UTC 2023 kill -USR1 22586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22586 killed at Mon Mar 20 20:03:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22625 found at Mon Mar 20 20:03:34 UTC 2023 selfserv_9887 with PID 22625 started at Mon Mar 20 20:03:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22625 at Mon Mar 20 20:03:34 UTC 2023 kill -USR1 22625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22625 killed at Mon Mar 20 20:03:34 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22664 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22664 found at Mon Mar 20 20:03:34 UTC 2023 selfserv_9887 with PID 22664 started at Mon Mar 20 20:03:34 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22664 at Mon Mar 20 20:03:34 UTC 2023 kill -USR1 22664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22664 killed at Mon Mar 20 20:03:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22704 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22704 found at Mon Mar 20 20:03:34 UTC 2023 selfserv_9887 with PID 22704 started at Mon Mar 20 20:03:34 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22704 at Mon Mar 20 20:03:35 UTC 2023 kill -USR1 22704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22704 killed at Mon Mar 20 20:03:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22744 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22744 found at Mon Mar 20 20:03:35 UTC 2023 selfserv_9887 with PID 22744 started at Mon Mar 20 20:03:35 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22744 at Mon Mar 20 20:03:35 UTC 2023 kill -USR1 22744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22744 killed at Mon Mar 20 20:03:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22784 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22784 found at Mon Mar 20 20:03:35 UTC 2023 selfserv_9887 with PID 22784 started at Mon Mar 20 20:03:35 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22784 at Mon Mar 20 20:03:35 UTC 2023 kill -USR1 22784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22784 killed at Mon Mar 20 20:03:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22824 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22824 found at Mon Mar 20 20:03:36 UTC 2023 selfserv_9887 with PID 22824 started at Mon Mar 20 20:03:36 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22824 at Mon Mar 20 20:03:36 UTC 2023 kill -USR1 22824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22824 killed at Mon Mar 20 20:03:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22864 found at Mon Mar 20 20:03:36 UTC 2023 selfserv_9887 with PID 22864 started at Mon Mar 20 20:03:36 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22864 at Mon Mar 20 20:03:36 UTC 2023 kill -USR1 22864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22864 killed at Mon Mar 20 20:03:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22904 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22904 found at Mon Mar 20 20:03:36 UTC 2023 selfserv_9887 with PID 22904 started at Mon Mar 20 20:03:36 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22904 at Mon Mar 20 20:03:36 UTC 2023 kill -USR1 22904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22904 killed at Mon Mar 20 20:03:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22944 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22944 found at Mon Mar 20 20:03:37 UTC 2023 selfserv_9887 with PID 22944 started at Mon Mar 20 20:03:37 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22944 at Mon Mar 20 20:03:37 UTC 2023 kill -USR1 22944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22944 killed at Mon Mar 20 20:03:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:03:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22984 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22984 found at Mon Mar 20 20:03:37 UTC 2023 selfserv_9887 with PID 22984 started at Mon Mar 20 20:03:37 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22984 at Mon Mar 20 20:03:37 UTC 2023 kill -USR1 22984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22984 killed at Mon Mar 20 20:03:37 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:03:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 23069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23069 found at Mon Mar 20 20:03:38 UTC 2023 selfserv_9887 with PID 23069 started at Mon Mar 20 20:03:38 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 23069 at Mon Mar 20 20:03:44 UTC 2023 kill -USR1 23069 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23069 killed at Mon Mar 20 20:03:44 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:03:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 23637 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23637 found at Mon Mar 20 20:03:44 UTC 2023 selfserv_9887 with PID 23637 started at Mon Mar 20 20:03:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23637 at Mon Mar 20 20:03:57 UTC 2023 kill -USR1 23637 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23637 killed at Mon Mar 20 20:03:57 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:03:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24437 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24437 found at Mon Mar 20 20:03:57 UTC 2023 selfserv_9887 with PID 24437 started at Mon Mar 20 20:03:57 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24437 at Mon Mar 20 20:03:58 UTC 2023 kill -USR1 24437 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24437 killed at Mon Mar 20 20:03:58 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24503 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24503 found at Mon Mar 20 20:03:58 UTC 2023 selfserv_9887 with PID 24503 started at Mon Mar 20 20:03:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24503 at Mon Mar 20 20:03:58 UTC 2023 kill -USR1 24503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24503 killed at Mon Mar 20 20:03:58 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:03:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24555 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24555 found at Mon Mar 20 20:03:59 UTC 2023 selfserv_9887 with PID 24555 started at Mon Mar 20 20:03:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24555 at Mon Mar 20 20:03:59 UTC 2023 kill -USR1 24555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24555 killed at Mon Mar 20 20:03:59 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:03:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:03:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24608 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24608 found at Mon Mar 20 20:03:59 UTC 2023 selfserv_9887 with PID 24608 started at Mon Mar 20 20:03:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24608 at Mon Mar 20 20:04:00 UTC 2023 kill -USR1 24608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24608 killed at Mon Mar 20 20:04:00 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24661 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24661 found at Mon Mar 20 20:04:00 UTC 2023 selfserv_9887 with PID 24661 started at Mon Mar 20 20:04:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24661 at Mon Mar 20 20:04:00 UTC 2023 kill -USR1 24661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24661 killed at Mon Mar 20 20:04:00 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24713 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24713 found at Mon Mar 20 20:04:01 UTC 2023 selfserv_9887 with PID 24713 started at Mon Mar 20 20:04:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24713 at Mon Mar 20 20:04:01 UTC 2023 kill -USR1 24713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24713 killed at Mon Mar 20 20:04:01 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24765 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24765 found at Mon Mar 20 20:04:01 UTC 2023 selfserv_9887 with PID 24765 started at Mon Mar 20 20:04:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24765 at Mon Mar 20 20:04:01 UTC 2023 kill -USR1 24765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24765 killed at Mon Mar 20 20:04:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24817 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24817 found at Mon Mar 20 20:04:02 UTC 2023 selfserv_9887 with PID 24817 started at Mon Mar 20 20:04:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24817 at Mon Mar 20 20:04:02 UTC 2023 kill -USR1 24817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24817 killed at Mon Mar 20 20:04:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24870 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24870 found at Mon Mar 20 20:04:02 UTC 2023 selfserv_9887 with PID 24870 started at Mon Mar 20 20:04:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24870 at Mon Mar 20 20:04:02 UTC 2023 kill -USR1 24870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24870 killed at Mon Mar 20 20:04:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24922 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24922 found at Mon Mar 20 20:04:03 UTC 2023 selfserv_9887 with PID 24922 started at Mon Mar 20 20:04:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24922 at Mon Mar 20 20:04:03 UTC 2023 kill -USR1 24922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24922 killed at Mon Mar 20 20:04:03 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24974 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24974 found at Mon Mar 20 20:04:03 UTC 2023 selfserv_9887 with PID 24974 started at Mon Mar 20 20:04:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24974 at Mon Mar 20 20:04:03 UTC 2023 kill -USR1 24974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24974 killed at Mon Mar 20 20:04:04 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25026 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25026 found at Mon Mar 20 20:04:04 UTC 2023 selfserv_9887 with PID 25026 started at Mon Mar 20 20:04:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25026 at Mon Mar 20 20:04:04 UTC 2023 kill -USR1 25026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25026 killed at Mon Mar 20 20:04:04 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25078 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25078 found at Mon Mar 20 20:04:04 UTC 2023 selfserv_9887 with PID 25078 started at Mon Mar 20 20:04:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25078 at Mon Mar 20 20:04:04 UTC 2023 kill -USR1 25078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25078 killed at Mon Mar 20 20:04:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25130 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25130 found at Mon Mar 20 20:04:05 UTC 2023 selfserv_9887 with PID 25130 started at Mon Mar 20 20:04:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25130 at Mon Mar 20 20:04:05 UTC 2023 kill -USR1 25130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25130 killed at Mon Mar 20 20:04:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25182 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25182 found at Mon Mar 20 20:04:05 UTC 2023 selfserv_9887 with PID 25182 started at Mon Mar 20 20:04:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25182 at Mon Mar 20 20:04:06 UTC 2023 kill -USR1 25182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25182 killed at Mon Mar 20 20:04:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25234 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25234 found at Mon Mar 20 20:04:06 UTC 2023 selfserv_9887 with PID 25234 started at Mon Mar 20 20:04:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25234 at Mon Mar 20 20:04:07 UTC 2023 kill -USR1 25234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25234 killed at Mon Mar 20 20:04:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25286 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25286 found at Mon Mar 20 20:04:07 UTC 2023 selfserv_9887 with PID 25286 started at Mon Mar 20 20:04:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25286 at Mon Mar 20 20:04:08 UTC 2023 kill -USR1 25286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25286 killed at Mon Mar 20 20:04:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25338 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25338 found at Mon Mar 20 20:04:08 UTC 2023 selfserv_9887 with PID 25338 started at Mon Mar 20 20:04:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25338 at Mon Mar 20 20:04:08 UTC 2023 kill -USR1 25338 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25338 killed at Mon Mar 20 20:04:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25390 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25390 found at Mon Mar 20 20:04:09 UTC 2023 selfserv_9887 with PID 25390 started at Mon Mar 20 20:04:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25390 at Mon Mar 20 20:04:09 UTC 2023 kill -USR1 25390 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25390 killed at Mon Mar 20 20:04:09 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25442 found at Mon Mar 20 20:04:10 UTC 2023 selfserv_9887 with PID 25442 started at Mon Mar 20 20:04:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25442 at Mon Mar 20 20:04:10 UTC 2023 kill -USR1 25442 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25442 killed at Mon Mar 20 20:04:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25494 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25494 found at Mon Mar 20 20:04:10 UTC 2023 selfserv_9887 with PID 25494 started at Mon Mar 20 20:04:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25494 at Mon Mar 20 20:04:11 UTC 2023 kill -USR1 25494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25494 killed at Mon Mar 20 20:04:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25546 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25546 found at Mon Mar 20 20:04:11 UTC 2023 selfserv_9887 with PID 25546 started at Mon Mar 20 20:04:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25546 at Mon Mar 20 20:04:12 UTC 2023 kill -USR1 25546 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25546 killed at Mon Mar 20 20:04:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25598 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25598 found at Mon Mar 20 20:04:12 UTC 2023 selfserv_9887 with PID 25598 started at Mon Mar 20 20:04:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25598 at Mon Mar 20 20:04:13 UTC 2023 kill -USR1 25598 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25598 killed at Mon Mar 20 20:04:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25650 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25650 found at Mon Mar 20 20:04:13 UTC 2023 selfserv_9887 with PID 25650 started at Mon Mar 20 20:04:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25650 at Mon Mar 20 20:04:13 UTC 2023 kill -USR1 25650 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25650 killed at Mon Mar 20 20:04:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25702 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25702 found at Mon Mar 20 20:04:14 UTC 2023 selfserv_9887 with PID 25702 started at Mon Mar 20 20:04:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25702 at Mon Mar 20 20:04:14 UTC 2023 kill -USR1 25702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25702 killed at Mon Mar 20 20:04:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25754 found at Mon Mar 20 20:04:15 UTC 2023 selfserv_9887 with PID 25754 started at Mon Mar 20 20:04:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25754 at Mon Mar 20 20:04:15 UTC 2023 kill -USR1 25754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25754 killed at Mon Mar 20 20:04:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25807 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25807 found at Mon Mar 20 20:04:15 UTC 2023 selfserv_9887 with PID 25807 started at Mon Mar 20 20:04:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25807 at Mon Mar 20 20:04:15 UTC 2023 kill -USR1 25807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25807 killed at Mon Mar 20 20:04:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25860 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25860 found at Mon Mar 20 20:04:16 UTC 2023 selfserv_9887 with PID 25860 started at Mon Mar 20 20:04:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25860 at Mon Mar 20 20:04:16 UTC 2023 kill -USR1 25860 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25860 killed at Mon Mar 20 20:04:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25913 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25913 found at Mon Mar 20 20:04:16 UTC 2023 selfserv_9887 with PID 25913 started at Mon Mar 20 20:04:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25913 at Mon Mar 20 20:04:16 UTC 2023 kill -USR1 25913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25913 killed at Mon Mar 20 20:04:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25965 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25965 found at Mon Mar 20 20:04:17 UTC 2023 selfserv_9887 with PID 25965 started at Mon Mar 20 20:04:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25965 at Mon Mar 20 20:04:17 UTC 2023 kill -USR1 25965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25965 killed at Mon Mar 20 20:04:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26017 found at Mon Mar 20 20:04:17 UTC 2023 selfserv_9887 with PID 26017 started at Mon Mar 20 20:04:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26017 at Mon Mar 20 20:04:18 UTC 2023 kill -USR1 26017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26017 killed at Mon Mar 20 20:04:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26069 found at Mon Mar 20 20:04:18 UTC 2023 selfserv_9887 with PID 26069 started at Mon Mar 20 20:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26069 at Mon Mar 20 20:04:18 UTC 2023 kill -USR1 26069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26069 killed at Mon Mar 20 20:04:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26121 found at Mon Mar 20 20:04:18 UTC 2023 selfserv_9887 with PID 26121 started at Mon Mar 20 20:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26121 at Mon Mar 20 20:04:18 UTC 2023 kill -USR1 26121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26121 killed at Mon Mar 20 20:04:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26174 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26174 found at Mon Mar 20 20:04:19 UTC 2023 selfserv_9887 with PID 26174 started at Mon Mar 20 20:04:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26174 at Mon Mar 20 20:04:19 UTC 2023 kill -USR1 26174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26174 killed at Mon Mar 20 20:04:19 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26226 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26226 found at Mon Mar 20 20:04:19 UTC 2023 selfserv_9887 with PID 26226 started at Mon Mar 20 20:04:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26226 at Mon Mar 20 20:04:19 UTC 2023 kill -USR1 26226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26226 killed at Mon Mar 20 20:04:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26278 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26278 found at Mon Mar 20 20:04:20 UTC 2023 selfserv_9887 with PID 26278 started at Mon Mar 20 20:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26278 at Mon Mar 20 20:04:20 UTC 2023 kill -USR1 26278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26278 killed at Mon Mar 20 20:04:20 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26330 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26330 found at Mon Mar 20 20:04:20 UTC 2023 selfserv_9887 with PID 26330 started at Mon Mar 20 20:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26330 at Mon Mar 20 20:04:20 UTC 2023 kill -USR1 26330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26330 killed at Mon Mar 20 20:04:20 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26382 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26382 found at Mon Mar 20 20:04:20 UTC 2023 selfserv_9887 with PID 26382 started at Mon Mar 20 20:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26382 at Mon Mar 20 20:04:21 UTC 2023 kill -USR1 26382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26382 killed at Mon Mar 20 20:04:21 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26434 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26434 found at Mon Mar 20 20:04:21 UTC 2023 selfserv_9887 with PID 26434 started at Mon Mar 20 20:04:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26434 at Mon Mar 20 20:04:22 UTC 2023 kill -USR1 26434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26434 killed at Mon Mar 20 20:04:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26486 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26486 found at Mon Mar 20 20:04:22 UTC 2023 selfserv_9887 with PID 26486 started at Mon Mar 20 20:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26486 at Mon Mar 20 20:04:22 UTC 2023 kill -USR1 26486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26486 killed at Mon Mar 20 20:04:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26538 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26538 found at Mon Mar 20 20:04:22 UTC 2023 selfserv_9887 with PID 26538 started at Mon Mar 20 20:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26538 at Mon Mar 20 20:04:23 UTC 2023 kill -USR1 26538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26538 killed at Mon Mar 20 20:04:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26591 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26591 found at Mon Mar 20 20:04:23 UTC 2023 selfserv_9887 with PID 26591 started at Mon Mar 20 20:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26591 at Mon Mar 20 20:04:23 UTC 2023 kill -USR1 26591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26591 killed at Mon Mar 20 20:04:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26643 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26643 found at Mon Mar 20 20:04:24 UTC 2023 selfserv_9887 with PID 26643 started at Mon Mar 20 20:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26643 at Mon Mar 20 20:04:24 UTC 2023 kill -USR1 26643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26643 killed at Mon Mar 20 20:04:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26695 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26695 found at Mon Mar 20 20:04:24 UTC 2023 selfserv_9887 with PID 26695 started at Mon Mar 20 20:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26695 at Mon Mar 20 20:04:24 UTC 2023 kill -USR1 26695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26695 killed at Mon Mar 20 20:04:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26747 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26747 found at Mon Mar 20 20:04:24 UTC 2023 selfserv_9887 with PID 26747 started at Mon Mar 20 20:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26747 at Mon Mar 20 20:04:25 UTC 2023 kill -USR1 26747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26747 killed at Mon Mar 20 20:04:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26799 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26799 found at Mon Mar 20 20:04:25 UTC 2023 selfserv_9887 with PID 26799 started at Mon Mar 20 20:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26799 at Mon Mar 20 20:04:26 UTC 2023 kill -USR1 26799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26799 killed at Mon Mar 20 20:04:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26851 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26851 found at Mon Mar 20 20:04:26 UTC 2023 selfserv_9887 with PID 26851 started at Mon Mar 20 20:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26851 at Mon Mar 20 20:04:26 UTC 2023 kill -USR1 26851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26851 killed at Mon Mar 20 20:04:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26903 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26903 found at Mon Mar 20 20:04:27 UTC 2023 selfserv_9887 with PID 26903 started at Mon Mar 20 20:04:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26903 at Mon Mar 20 20:04:27 UTC 2023 kill -USR1 26903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26903 killed at Mon Mar 20 20:04:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26955 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26955 found at Mon Mar 20 20:04:27 UTC 2023 selfserv_9887 with PID 26955 started at Mon Mar 20 20:04:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26955 at Mon Mar 20 20:04:28 UTC 2023 kill -USR1 26955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26955 killed at Mon Mar 20 20:04:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27007 found at Mon Mar 20 20:04:28 UTC 2023 selfserv_9887 with PID 27007 started at Mon Mar 20 20:04:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27007 at Mon Mar 20 20:04:29 UTC 2023 kill -USR1 27007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27007 killed at Mon Mar 20 20:04:29 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27059 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27059 found at Mon Mar 20 20:04:29 UTC 2023 selfserv_9887 with PID 27059 started at Mon Mar 20 20:04:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27059 at Mon Mar 20 20:04:30 UTC 2023 kill -USR1 27059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27059 killed at Mon Mar 20 20:04:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27111 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27111 found at Mon Mar 20 20:04:30 UTC 2023 selfserv_9887 with PID 27111 started at Mon Mar 20 20:04:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27111 at Mon Mar 20 20:04:31 UTC 2023 kill -USR1 27111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27111 killed at Mon Mar 20 20:04:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27164 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27164 found at Mon Mar 20 20:04:31 UTC 2023 selfserv_9887 with PID 27164 started at Mon Mar 20 20:04:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27164 at Mon Mar 20 20:04:31 UTC 2023 kill -USR1 27164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27164 killed at Mon Mar 20 20:04:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27218 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27218 found at Mon Mar 20 20:04:32 UTC 2023 selfserv_9887 with PID 27218 started at Mon Mar 20 20:04:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27218 at Mon Mar 20 20:04:32 UTC 2023 kill -USR1 27218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27218 killed at Mon Mar 20 20:04:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27270 found at Mon Mar 20 20:04:32 UTC 2023 selfserv_9887 with PID 27270 started at Mon Mar 20 20:04:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27270 at Mon Mar 20 20:04:32 UTC 2023 kill -USR1 27270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27270 killed at Mon Mar 20 20:04:33 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:04:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27322 found at Mon Mar 20 20:04:33 UTC 2023 selfserv_9887 with PID 27322 started at Mon Mar 20 20:04:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27322 at Mon Mar 20 20:04:33 UTC 2023 kill -USR1 27322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27322 killed at Mon Mar 20 20:04:33 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27374 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27374 found at Mon Mar 20 20:04:33 UTC 2023 selfserv_9887 with PID 27374 started at Mon Mar 20 20:04:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27374 at Mon Mar 20 20:04:34 UTC 2023 kill -USR1 27374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27374 killed at Mon Mar 20 20:04:34 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27426 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27426 found at Mon Mar 20 20:04:34 UTC 2023 selfserv_9887 with PID 27426 started at Mon Mar 20 20:04:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27426 at Mon Mar 20 20:04:34 UTC 2023 kill -USR1 27426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27426 killed at Mon Mar 20 20:04:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:04:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27478 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27478 found at Mon Mar 20 20:04:35 UTC 2023 selfserv_9887 with PID 27478 started at Mon Mar 20 20:04:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27478 at Mon Mar 20 20:04:35 UTC 2023 kill -USR1 27478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27478 killed at Mon Mar 20 20:04:35 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:04:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27536 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27536 found at Mon Mar 20 20:04:35 UTC 2023 selfserv_9887 with PID 27536 started at Mon Mar 20 20:04:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27536 at Mon Mar 20 20:04:35 UTC 2023 kill -USR1 27536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27536 killed at Mon Mar 20 20:04:35 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:04:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27595 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27595 found at Mon Mar 20 20:04:35 UTC 2023 selfserv_9887 with PID 27595 started at Mon Mar 20 20:04:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27595 at Mon Mar 20 20:04:36 UTC 2023 kill -USR1 27595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27595 killed at Mon Mar 20 20:04:36 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:04:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27653 found at Mon Mar 20 20:04:36 UTC 2023 selfserv_9887 with PID 27653 started at Mon Mar 20 20:04:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27653 at Mon Mar 20 20:04:36 UTC 2023 kill -USR1 27653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27653 killed at Mon Mar 20 20:04:36 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:04:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27711 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27711 found at Mon Mar 20 20:04:36 UTC 2023 selfserv_9887 with PID 27711 started at Mon Mar 20 20:04:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27711 at Mon Mar 20 20:04:36 UTC 2023 kill -USR1 27711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27711 killed at Mon Mar 20 20:04:36 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 20:04:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27769 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27769 found at Mon Mar 20 20:04:37 UTC 2023 selfserv_9887 with PID 27769 started at Mon Mar 20 20:04:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27769 at Mon Mar 20 20:04:37 UTC 2023 kill -USR1 27769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27769 killed at Mon Mar 20 20:04:37 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:04:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27828 found at Mon Mar 20 20:04:37 UTC 2023 selfserv_9887 with PID 27828 started at Mon Mar 20 20:04:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27828 at Mon Mar 20 20:04:37 UTC 2023 kill -USR1 27828 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27828 killed at Mon Mar 20 20:04:37 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:04:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27886 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27886 found at Mon Mar 20 20:04:37 UTC 2023 selfserv_9887 with PID 27886 started at Mon Mar 20 20:04:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27886 at Mon Mar 20 20:04:38 UTC 2023 kill -USR1 27886 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27886 killed at Mon Mar 20 20:04:38 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:04:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27944 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27944 found at Mon Mar 20 20:04:38 UTC 2023 selfserv_9887 with PID 27944 started at Mon Mar 20 20:04:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27944 at Mon Mar 20 20:04:38 UTC 2023 kill -USR1 27944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27944 killed at Mon Mar 20 20:04:38 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:04:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28002 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28002 found at Mon Mar 20 20:04:38 UTC 2023 selfserv_9887 with PID 28002 started at Mon Mar 20 20:04:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28002 at Mon Mar 20 20:04:38 UTC 2023 kill -USR1 28002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28002 killed at Mon Mar 20 20:04:38 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:04:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28060 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28060 found at Mon Mar 20 20:04:39 UTC 2023 selfserv_9887 with PID 28060 started at Mon Mar 20 20:04:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28060 at Mon Mar 20 20:04:39 UTC 2023 kill -USR1 28060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28060 killed at Mon Mar 20 20:04:39 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 20:04:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28102 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28102 found at Mon Mar 20 20:04:39 UTC 2023 selfserv_9887 with PID 28102 started at Mon Mar 20 20:04:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28102 at Mon Mar 20 20:04:39 UTC 2023 kill -USR1 28102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28102 killed at Mon Mar 20 20:04:39 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 20:04:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28145 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28145 found at Mon Mar 20 20:04:39 UTC 2023 selfserv_9887 with PID 28145 started at Mon Mar 20 20:04:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 28145 at Mon Mar 20 20:04:39 UTC 2023 kill -USR1 28145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28145 killed at Mon Mar 20 20:04:40 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 20:04:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28187 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28187 found at Mon Mar 20 20:04:40 UTC 2023 selfserv_9887 with PID 28187 started at Mon Mar 20 20:04:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 28187 at Mon Mar 20 20:04:40 UTC 2023 kill -USR1 28187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28187 killed at Mon Mar 20 20:04:40 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 20:04:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28230 found at Mon Mar 20 20:04:40 UTC 2023 selfserv_9887 with PID 28230 started at Mon Mar 20 20:04:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 28230 at Mon Mar 20 20:04:40 UTC 2023 kill -USR1 28230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28230 killed at Mon Mar 20 20:04:40 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 20:04:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28272 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28272 found at Mon Mar 20 20:04:40 UTC 2023 selfserv_9887 with PID 28272 started at Mon Mar 20 20:04:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 28272 at Mon Mar 20 20:04:41 UTC 2023 kill -USR1 28272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28272 killed at Mon Mar 20 20:04:41 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 20:04:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28318 found at Mon Mar 20 20:04:41 UTC 2023 selfserv_9887 with PID 28318 started at Mon Mar 20 20:04:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 28318 at Mon Mar 20 20:04:41 UTC 2023 kill -USR1 28318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28318 killed at Mon Mar 20 20:04:41 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 20:04:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28360 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28360 found at Mon Mar 20 20:04:41 UTC 2023 selfserv_9887 with PID 28360 started at Mon Mar 20 20:04:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 28360 at Mon Mar 20 20:04:41 UTC 2023 kill -USR1 28360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28360 killed at Mon Mar 20 20:04:41 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 20:04:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:04:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28414 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28414 found at Mon Mar 20 20:04:42 UTC 2023 selfserv_9887 with PID 28414 started at Mon Mar 20 20:04:42 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 20:04:42 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 20:05:46 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 28414 at Mon Mar 20 20:05:46 UTC 2023 kill -USR1 28414 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28414 killed at Mon Mar 20 20:05:46 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:05:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28481 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28481 found at Mon Mar 20 20:05:46 UTC 2023 selfserv_9887 with PID 28481 started at Mon Mar 20 20:05:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28481 at Mon Mar 20 20:05:47 UTC 2023 kill -USR1 28481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28481 killed at Mon Mar 20 20:05:47 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28523 found at Mon Mar 20 20:05:47 UTC 2023 selfserv_9887 with PID 28523 started at Mon Mar 20 20:05:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28523 at Mon Mar 20 20:05:47 UTC 2023 kill -USR1 28523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28523 killed at Mon Mar 20 20:05:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28562 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28562 found at Mon Mar 20 20:05:47 UTC 2023 selfserv_9887 with PID 28562 started at Mon Mar 20 20:05:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28562 at Mon Mar 20 20:05:47 UTC 2023 kill -USR1 28562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28562 killed at Mon Mar 20 20:05:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28601 found at Mon Mar 20 20:05:48 UTC 2023 selfserv_9887 with PID 28601 started at Mon Mar 20 20:05:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28601 at Mon Mar 20 20:05:48 UTC 2023 kill -USR1 28601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28601 killed at Mon Mar 20 20:05:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28640 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28640 found at Mon Mar 20 20:05:48 UTC 2023 selfserv_9887 with PID 28640 started at Mon Mar 20 20:05:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 28640 at Mon Mar 20 20:05:48 UTC 2023 kill -USR1 28640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28640 killed at Mon Mar 20 20:05:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28679 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28679 found at Mon Mar 20 20:05:48 UTC 2023 selfserv_9887 with PID 28679 started at Mon Mar 20 20:05:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28679 at Mon Mar 20 20:05:49 UTC 2023 kill -USR1 28679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28679 killed at Mon Mar 20 20:05:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28719 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28719 found at Mon Mar 20 20:05:49 UTC 2023 selfserv_9887 with PID 28719 started at Mon Mar 20 20:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28719 at Mon Mar 20 20:05:49 UTC 2023 kill -USR1 28719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28719 killed at Mon Mar 20 20:05:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28758 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28758 found at Mon Mar 20 20:05:49 UTC 2023 selfserv_9887 with PID 28758 started at Mon Mar 20 20:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28758 at Mon Mar 20 20:05:49 UTC 2023 kill -USR1 28758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28758 killed at Mon Mar 20 20:05:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28797 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28797 found at Mon Mar 20 20:05:50 UTC 2023 selfserv_9887 with PID 28797 started at Mon Mar 20 20:05:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28797 at Mon Mar 20 20:05:50 UTC 2023 kill -USR1 28797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28797 killed at Mon Mar 20 20:05:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28836 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28836 found at Mon Mar 20 20:05:50 UTC 2023 selfserv_9887 with PID 28836 started at Mon Mar 20 20:05:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28836 at Mon Mar 20 20:05:50 UTC 2023 kill -USR1 28836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28836 killed at Mon Mar 20 20:05:50 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28875 found at Mon Mar 20 20:05:50 UTC 2023 selfserv_9887 with PID 28875 started at Mon Mar 20 20:05:50 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28875 at Mon Mar 20 20:05:50 UTC 2023 kill -USR1 28875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28875 killed at Mon Mar 20 20:05:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28915 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28915 found at Mon Mar 20 20:05:51 UTC 2023 selfserv_9887 with PID 28915 started at Mon Mar 20 20:05:51 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28915 at Mon Mar 20 20:05:51 UTC 2023 kill -USR1 28915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28915 killed at Mon Mar 20 20:05:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28955 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28955 found at Mon Mar 20 20:05:51 UTC 2023 selfserv_9887 with PID 28955 started at Mon Mar 20 20:05:51 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28955 at Mon Mar 20 20:05:51 UTC 2023 kill -USR1 28955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28955 killed at Mon Mar 20 20:05:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28995 found at Mon Mar 20 20:05:51 UTC 2023 selfserv_9887 with PID 28995 started at Mon Mar 20 20:05:51 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28995 at Mon Mar 20 20:05:51 UTC 2023 kill -USR1 28995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28995 killed at Mon Mar 20 20:05:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29035 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29035 found at Mon Mar 20 20:05:52 UTC 2023 selfserv_9887 with PID 29035 started at Mon Mar 20 20:05:52 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29035 at Mon Mar 20 20:05:52 UTC 2023 kill -USR1 29035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29035 killed at Mon Mar 20 20:05:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29075 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29075 found at Mon Mar 20 20:05:52 UTC 2023 selfserv_9887 with PID 29075 started at Mon Mar 20 20:05:52 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29075 at Mon Mar 20 20:05:52 UTC 2023 kill -USR1 29075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29075 killed at Mon Mar 20 20:05:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29115 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29115 found at Mon Mar 20 20:05:52 UTC 2023 selfserv_9887 with PID 29115 started at Mon Mar 20 20:05:52 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29115 at Mon Mar 20 20:05:52 UTC 2023 kill -USR1 29115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29115 killed at Mon Mar 20 20:05:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29155 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29155 found at Mon Mar 20 20:05:53 UTC 2023 selfserv_9887 with PID 29155 started at Mon Mar 20 20:05:53 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29155 at Mon Mar 20 20:05:53 UTC 2023 kill -USR1 29155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29155 killed at Mon Mar 20 20:05:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:05:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29195 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29195 found at Mon Mar 20 20:05:53 UTC 2023 selfserv_9887 with PID 29195 started at Mon Mar 20 20:05:53 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29195 at Mon Mar 20 20:05:53 UTC 2023 kill -USR1 29195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29195 killed at Mon Mar 20 20:05:53 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:05:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 29235 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29235 found at Mon Mar 20 20:05:53 UTC 2023 selfserv_9887 with PID 29235 started at Mon Mar 20 20:05:53 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 29235 at Mon Mar 20 20:05:59 UTC 2023 kill -USR1 29235 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29235 killed at Mon Mar 20 20:05:59 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:05:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:05:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 29785 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29785 found at Mon Mar 20 20:06:00 UTC 2023 selfserv_9887 with PID 29785 started at Mon Mar 20 20:06:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29785 at Mon Mar 20 20:06:09 UTC 2023 kill -USR1 29785 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29785 killed at Mon Mar 20 20:06:09 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30604 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30604 found at Mon Mar 20 20:06:10 UTC 2023 selfserv_9887 with PID 30604 started at Mon Mar 20 20:06:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30604 at Mon Mar 20 20:06:10 UTC 2023 kill -USR1 30604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30604 killed at Mon Mar 20 20:06:10 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30658 found at Mon Mar 20 20:06:10 UTC 2023 selfserv_9887 with PID 30658 started at Mon Mar 20 20:06:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30658 at Mon Mar 20 20:06:10 UTC 2023 kill -USR1 30658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30658 killed at Mon Mar 20 20:06:10 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30710 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30710 found at Mon Mar 20 20:06:10 UTC 2023 selfserv_9887 with PID 30710 started at Mon Mar 20 20:06:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30710 at Mon Mar 20 20:06:11 UTC 2023 kill -USR1 30710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30710 killed at Mon Mar 20 20:06:11 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30762 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30762 found at Mon Mar 20 20:06:11 UTC 2023 selfserv_9887 with PID 30762 started at Mon Mar 20 20:06:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30762 at Mon Mar 20 20:06:11 UTC 2023 kill -USR1 30762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30762 killed at Mon Mar 20 20:06:11 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30814 found at Mon Mar 20 20:06:11 UTC 2023 selfserv_9887 with PID 30814 started at Mon Mar 20 20:06:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30814 at Mon Mar 20 20:06:11 UTC 2023 kill -USR1 30814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30814 killed at Mon Mar 20 20:06:12 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30866 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30866 found at Mon Mar 20 20:06:12 UTC 2023 selfserv_9887 with PID 30866 started at Mon Mar 20 20:06:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30866 at Mon Mar 20 20:06:12 UTC 2023 kill -USR1 30866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30866 killed at Mon Mar 20 20:06:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30918 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30918 found at Mon Mar 20 20:06:12 UTC 2023 selfserv_9887 with PID 30918 started at Mon Mar 20 20:06:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30918 at Mon Mar 20 20:06:12 UTC 2023 kill -USR1 30918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30918 killed at Mon Mar 20 20:06:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30970 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30970 found at Mon Mar 20 20:06:13 UTC 2023 selfserv_9887 with PID 30970 started at Mon Mar 20 20:06:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30970 at Mon Mar 20 20:06:13 UTC 2023 kill -USR1 30970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30970 killed at Mon Mar 20 20:06:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31022 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31022 found at Mon Mar 20 20:06:13 UTC 2023 selfserv_9887 with PID 31022 started at Mon Mar 20 20:06:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31022 at Mon Mar 20 20:06:13 UTC 2023 kill -USR1 31022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31022 killed at Mon Mar 20 20:06:13 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31074 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31074 found at Mon Mar 20 20:06:14 UTC 2023 selfserv_9887 with PID 31074 started at Mon Mar 20 20:06:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31074 at Mon Mar 20 20:06:14 UTC 2023 kill -USR1 31074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31074 killed at Mon Mar 20 20:06:14 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31126 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31126 found at Mon Mar 20 20:06:14 UTC 2023 selfserv_9887 with PID 31126 started at Mon Mar 20 20:06:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31126 at Mon Mar 20 20:06:14 UTC 2023 kill -USR1 31126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31126 killed at Mon Mar 20 20:06:14 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31178 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31178 found at Mon Mar 20 20:06:14 UTC 2023 selfserv_9887 with PID 31178 started at Mon Mar 20 20:06:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31178 at Mon Mar 20 20:06:15 UTC 2023 kill -USR1 31178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31178 killed at Mon Mar 20 20:06:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31230 found at Mon Mar 20 20:06:15 UTC 2023 selfserv_9887 with PID 31230 started at Mon Mar 20 20:06:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31230 at Mon Mar 20 20:06:15 UTC 2023 kill -USR1 31230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31230 killed at Mon Mar 20 20:06:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31282 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31282 found at Mon Mar 20 20:06:15 UTC 2023 selfserv_9887 with PID 31282 started at Mon Mar 20 20:06:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31282 at Mon Mar 20 20:06:16 UTC 2023 kill -USR1 31282 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31282 killed at Mon Mar 20 20:06:16 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31334 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31334 found at Mon Mar 20 20:06:16 UTC 2023 selfserv_9887 with PID 31334 started at Mon Mar 20 20:06:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31334 at Mon Mar 20 20:06:16 UTC 2023 kill -USR1 31334 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31334 killed at Mon Mar 20 20:06:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31386 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31386 found at Mon Mar 20 20:06:16 UTC 2023 selfserv_9887 with PID 31386 started at Mon Mar 20 20:06:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31386 at Mon Mar 20 20:06:16 UTC 2023 kill -USR1 31386 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31386 killed at Mon Mar 20 20:06:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31438 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31438 found at Mon Mar 20 20:06:17 UTC 2023 selfserv_9887 with PID 31438 started at Mon Mar 20 20:06:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31438 at Mon Mar 20 20:06:17 UTC 2023 kill -USR1 31438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31438 killed at Mon Mar 20 20:06:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31490 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31490 found at Mon Mar 20 20:06:17 UTC 2023 selfserv_9887 with PID 31490 started at Mon Mar 20 20:06:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31490 at Mon Mar 20 20:06:17 UTC 2023 kill -USR1 31490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31490 killed at Mon Mar 20 20:06:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31542 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31542 found at Mon Mar 20 20:06:18 UTC 2023 selfserv_9887 with PID 31542 started at Mon Mar 20 20:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31542 at Mon Mar 20 20:06:18 UTC 2023 kill -USR1 31542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31542 killed at Mon Mar 20 20:06:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31594 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31594 found at Mon Mar 20 20:06:18 UTC 2023 selfserv_9887 with PID 31594 started at Mon Mar 20 20:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31594 at Mon Mar 20 20:06:18 UTC 2023 kill -USR1 31594 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31594 killed at Mon Mar 20 20:06:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31647 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31647 found at Mon Mar 20 20:06:18 UTC 2023 selfserv_9887 with PID 31647 started at Mon Mar 20 20:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31647 at Mon Mar 20 20:06:19 UTC 2023 kill -USR1 31647 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31647 killed at Mon Mar 20 20:06:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31699 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31699 found at Mon Mar 20 20:06:19 UTC 2023 selfserv_9887 with PID 31699 started at Mon Mar 20 20:06:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31699 at Mon Mar 20 20:06:19 UTC 2023 kill -USR1 31699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31699 killed at Mon Mar 20 20:06:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31751 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31751 found at Mon Mar 20 20:06:19 UTC 2023 selfserv_9887 with PID 31751 started at Mon Mar 20 20:06:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31751 at Mon Mar 20 20:06:20 UTC 2023 kill -USR1 31751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31751 killed at Mon Mar 20 20:06:20 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31803 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31803 found at Mon Mar 20 20:06:20 UTC 2023 selfserv_9887 with PID 31803 started at Mon Mar 20 20:06:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31803 at Mon Mar 20 20:06:20 UTC 2023 kill -USR1 31803 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31803 killed at Mon Mar 20 20:06:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31855 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31855 found at Mon Mar 20 20:06:20 UTC 2023 selfserv_9887 with PID 31855 started at Mon Mar 20 20:06:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31855 at Mon Mar 20 20:06:21 UTC 2023 kill -USR1 31855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31855 killed at Mon Mar 20 20:06:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31907 found at Mon Mar 20 20:06:21 UTC 2023 selfserv_9887 with PID 31907 started at Mon Mar 20 20:06:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31907 at Mon Mar 20 20:06:21 UTC 2023 kill -USR1 31907 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31907 killed at Mon Mar 20 20:06:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31960 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31960 found at Mon Mar 20 20:06:21 UTC 2023 selfserv_9887 with PID 31960 started at Mon Mar 20 20:06:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31960 at Mon Mar 20 20:06:22 UTC 2023 kill -USR1 31960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31960 killed at Mon Mar 20 20:06:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32012 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32012 found at Mon Mar 20 20:06:22 UTC 2023 selfserv_9887 with PID 32012 started at Mon Mar 20 20:06:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32012 at Mon Mar 20 20:06:22 UTC 2023 kill -USR1 32012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32012 killed at Mon Mar 20 20:06:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32064 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32064 found at Mon Mar 20 20:06:22 UTC 2023 selfserv_9887 with PID 32064 started at Mon Mar 20 20:06:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32064 at Mon Mar 20 20:06:23 UTC 2023 kill -USR1 32064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32064 killed at Mon Mar 20 20:06:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32116 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32116 found at Mon Mar 20 20:06:23 UTC 2023 selfserv_9887 with PID 32116 started at Mon Mar 20 20:06:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32116 at Mon Mar 20 20:06:23 UTC 2023 kill -USR1 32116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32116 killed at Mon Mar 20 20:06:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32168 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32168 found at Mon Mar 20 20:06:24 UTC 2023 selfserv_9887 with PID 32168 started at Mon Mar 20 20:06:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32168 at Mon Mar 20 20:06:24 UTC 2023 kill -USR1 32168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32168 killed at Mon Mar 20 20:06:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32220 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32220 found at Mon Mar 20 20:06:24 UTC 2023 selfserv_9887 with PID 32220 started at Mon Mar 20 20:06:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32220 at Mon Mar 20 20:06:24 UTC 2023 kill -USR1 32220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32220 killed at Mon Mar 20 20:06:24 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32272 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32272 found at Mon Mar 20 20:06:24 UTC 2023 selfserv_9887 with PID 32272 started at Mon Mar 20 20:06:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32272 at Mon Mar 20 20:06:25 UTC 2023 kill -USR1 32272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32272 killed at Mon Mar 20 20:06:25 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32324 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32324 found at Mon Mar 20 20:06:25 UTC 2023 selfserv_9887 with PID 32324 started at Mon Mar 20 20:06:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32324 at Mon Mar 20 20:06:25 UTC 2023 kill -USR1 32324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32324 killed at Mon Mar 20 20:06:25 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32376 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32376 found at Mon Mar 20 20:06:25 UTC 2023 selfserv_9887 with PID 32376 started at Mon Mar 20 20:06:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32376 at Mon Mar 20 20:06:25 UTC 2023 kill -USR1 32376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32376 killed at Mon Mar 20 20:06:25 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32428 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32428 found at Mon Mar 20 20:06:26 UTC 2023 selfserv_9887 with PID 32428 started at Mon Mar 20 20:06:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32428 at Mon Mar 20 20:06:26 UTC 2023 kill -USR1 32428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32428 killed at Mon Mar 20 20:06:26 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32480 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32480 found at Mon Mar 20 20:06:26 UTC 2023 selfserv_9887 with PID 32480 started at Mon Mar 20 20:06:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32480 at Mon Mar 20 20:06:26 UTC 2023 kill -USR1 32480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32480 killed at Mon Mar 20 20:06:26 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32533 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32533 found at Mon Mar 20 20:06:27 UTC 2023 selfserv_9887 with PID 32533 started at Mon Mar 20 20:06:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32533 at Mon Mar 20 20:06:27 UTC 2023 kill -USR1 32533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32533 killed at Mon Mar 20 20:06:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32585 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32585 found at Mon Mar 20 20:06:27 UTC 2023 selfserv_9887 with PID 32585 started at Mon Mar 20 20:06:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32585 at Mon Mar 20 20:06:27 UTC 2023 kill -USR1 32585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32585 killed at Mon Mar 20 20:06:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32637 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32637 found at Mon Mar 20 20:06:27 UTC 2023 selfserv_9887 with PID 32637 started at Mon Mar 20 20:06:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32637 at Mon Mar 20 20:06:28 UTC 2023 kill -USR1 32637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32637 killed at Mon Mar 20 20:06:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32689 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32689 found at Mon Mar 20 20:06:28 UTC 2023 selfserv_9887 with PID 32689 started at Mon Mar 20 20:06:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32689 at Mon Mar 20 20:06:28 UTC 2023 kill -USR1 32689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32689 killed at Mon Mar 20 20:06:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32741 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32741 found at Mon Mar 20 20:06:28 UTC 2023 selfserv_9887 with PID 32741 started at Mon Mar 20 20:06:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32741 at Mon Mar 20 20:06:29 UTC 2023 kill -USR1 32741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32741 killed at Mon Mar 20 20:06:29 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32794 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32794 found at Mon Mar 20 20:06:29 UTC 2023 selfserv_9887 with PID 32794 started at Mon Mar 20 20:06:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32794 at Mon Mar 20 20:06:29 UTC 2023 kill -USR1 32794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32794 killed at Mon Mar 20 20:06:29 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32846 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32846 found at Mon Mar 20 20:06:29 UTC 2023 selfserv_9887 with PID 32846 started at Mon Mar 20 20:06:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32846 at Mon Mar 20 20:06:29 UTC 2023 kill -USR1 32846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32846 killed at Mon Mar 20 20:06:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32898 found at Mon Mar 20 20:06:30 UTC 2023 selfserv_9887 with PID 32898 started at Mon Mar 20 20:06:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32898 at Mon Mar 20 20:06:30 UTC 2023 kill -USR1 32898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32898 killed at Mon Mar 20 20:06:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32950 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32950 found at Mon Mar 20 20:06:30 UTC 2023 selfserv_9887 with PID 32950 started at Mon Mar 20 20:06:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32950 at Mon Mar 20 20:06:30 UTC 2023 kill -USR1 32950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32950 killed at Mon Mar 20 20:06:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33009 found at Mon Mar 20 20:06:31 UTC 2023 selfserv_9887 with PID 33009 started at Mon Mar 20 20:06:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33009 at Mon Mar 20 20:06:31 UTC 2023 kill -USR1 33009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33009 killed at Mon Mar 20 20:06:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33061 found at Mon Mar 20 20:06:31 UTC 2023 selfserv_9887 with PID 33061 started at Mon Mar 20 20:06:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33061 at Mon Mar 20 20:06:31 UTC 2023 kill -USR1 33061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33061 killed at Mon Mar 20 20:06:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33113 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33113 found at Mon Mar 20 20:06:31 UTC 2023 selfserv_9887 with PID 33113 started at Mon Mar 20 20:06:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33113 at Mon Mar 20 20:06:32 UTC 2023 kill -USR1 33113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33113 killed at Mon Mar 20 20:06:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33166 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33166 found at Mon Mar 20 20:06:32 UTC 2023 selfserv_9887 with PID 33166 started at Mon Mar 20 20:06:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33166 at Mon Mar 20 20:06:32 UTC 2023 kill -USR1 33166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33166 killed at Mon Mar 20 20:06:32 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33218 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33218 found at Mon Mar 20 20:06:32 UTC 2023 selfserv_9887 with PID 33218 started at Mon Mar 20 20:06:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33218 at Mon Mar 20 20:06:33 UTC 2023 kill -USR1 33218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33218 killed at Mon Mar 20 20:06:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33272 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33272 found at Mon Mar 20 20:06:33 UTC 2023 selfserv_9887 with PID 33272 started at Mon Mar 20 20:06:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33272 at Mon Mar 20 20:06:33 UTC 2023 kill -USR1 33272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33272 killed at Mon Mar 20 20:06:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33324 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33324 found at Mon Mar 20 20:06:33 UTC 2023 selfserv_9887 with PID 33324 started at Mon Mar 20 20:06:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33324 at Mon Mar 20 20:06:34 UTC 2023 kill -USR1 33324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33324 killed at Mon Mar 20 20:06:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33377 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33377 found at Mon Mar 20 20:06:34 UTC 2023 selfserv_9887 with PID 33377 started at Mon Mar 20 20:06:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33377 at Mon Mar 20 20:06:34 UTC 2023 kill -USR1 33377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33377 killed at Mon Mar 20 20:06:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:06:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33429 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33429 found at Mon Mar 20 20:06:34 UTC 2023 selfserv_9887 with PID 33429 started at Mon Mar 20 20:06:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33429 at Mon Mar 20 20:06:35 UTC 2023 kill -USR1 33429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33429 killed at Mon Mar 20 20:06:35 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33481 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33481 found at Mon Mar 20 20:06:35 UTC 2023 selfserv_9887 with PID 33481 started at Mon Mar 20 20:06:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33481 at Mon Mar 20 20:06:35 UTC 2023 kill -USR1 33481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33481 killed at Mon Mar 20 20:06:35 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33533 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33533 found at Mon Mar 20 20:06:36 UTC 2023 selfserv_9887 with PID 33533 started at Mon Mar 20 20:06:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33533 at Mon Mar 20 20:06:36 UTC 2023 kill -USR1 33533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33533 killed at Mon Mar 20 20:06:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:06:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33585 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33585 found at Mon Mar 20 20:06:36 UTC 2023 selfserv_9887 with PID 33585 started at Mon Mar 20 20:06:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33585 at Mon Mar 20 20:06:36 UTC 2023 kill -USR1 33585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33585 killed at Mon Mar 20 20:06:36 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:06:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33667 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33667 found at Mon Mar 20 20:06:37 UTC 2023 selfserv_9887 with PID 33667 started at Mon Mar 20 20:06:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33667 at Mon Mar 20 20:06:37 UTC 2023 kill -USR1 33667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33667 killed at Mon Mar 20 20:06:37 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33709 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33709 found at Mon Mar 20 20:06:37 UTC 2023 selfserv_9887 with PID 33709 started at Mon Mar 20 20:06:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33709 at Mon Mar 20 20:06:37 UTC 2023 kill -USR1 33709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33709 killed at Mon Mar 20 20:06:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33748 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33748 found at Mon Mar 20 20:06:37 UTC 2023 selfserv_9887 with PID 33748 started at Mon Mar 20 20:06:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 33748 at Mon Mar 20 20:06:37 UTC 2023 kill -USR1 33748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33748 killed at Mon Mar 20 20:06:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33787 found at Mon Mar 20 20:06:38 UTC 2023 selfserv_9887 with PID 33787 started at Mon Mar 20 20:06:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33787 at Mon Mar 20 20:06:38 UTC 2023 kill -USR1 33787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33787 killed at Mon Mar 20 20:06:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33826 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33826 found at Mon Mar 20 20:06:38 UTC 2023 selfserv_9887 with PID 33826 started at Mon Mar 20 20:06:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 33826 at Mon Mar 20 20:06:38 UTC 2023 kill -USR1 33826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33826 killed at Mon Mar 20 20:06:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33865 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33865 found at Mon Mar 20 20:06:38 UTC 2023 selfserv_9887 with PID 33865 started at Mon Mar 20 20:06:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33865 at Mon Mar 20 20:06:38 UTC 2023 kill -USR1 33865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33865 killed at Mon Mar 20 20:06:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33904 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33904 found at Mon Mar 20 20:06:39 UTC 2023 selfserv_9887 with PID 33904 started at Mon Mar 20 20:06:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33904 at Mon Mar 20 20:06:39 UTC 2023 kill -USR1 33904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33904 killed at Mon Mar 20 20:06:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33943 found at Mon Mar 20 20:06:39 UTC 2023 selfserv_9887 with PID 33943 started at Mon Mar 20 20:06:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33943 at Mon Mar 20 20:06:39 UTC 2023 kill -USR1 33943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33943 killed at Mon Mar 20 20:06:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33982 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33982 found at Mon Mar 20 20:06:39 UTC 2023 selfserv_9887 with PID 33982 started at Mon Mar 20 20:06:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33982 at Mon Mar 20 20:06:39 UTC 2023 kill -USR1 33982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33982 killed at Mon Mar 20 20:06:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34021 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34021 found at Mon Mar 20 20:06:40 UTC 2023 selfserv_9887 with PID 34021 started at Mon Mar 20 20:06:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34021 at Mon Mar 20 20:06:40 UTC 2023 kill -USR1 34021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34021 killed at Mon Mar 20 20:06:40 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34060 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34060 found at Mon Mar 20 20:06:40 UTC 2023 selfserv_9887 with PID 34060 started at Mon Mar 20 20:06:40 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34060 at Mon Mar 20 20:06:40 UTC 2023 kill -USR1 34060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34060 killed at Mon Mar 20 20:06:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34100 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34100 found at Mon Mar 20 20:06:40 UTC 2023 selfserv_9887 with PID 34100 started at Mon Mar 20 20:06:40 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34100 at Mon Mar 20 20:06:41 UTC 2023 kill -USR1 34100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34100 killed at Mon Mar 20 20:06:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34144 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34144 found at Mon Mar 20 20:06:41 UTC 2023 selfserv_9887 with PID 34144 started at Mon Mar 20 20:06:41 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34144 at Mon Mar 20 20:06:41 UTC 2023 kill -USR1 34144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34144 killed at Mon Mar 20 20:06:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34184 found at Mon Mar 20 20:06:41 UTC 2023 selfserv_9887 with PID 34184 started at Mon Mar 20 20:06:41 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34184 at Mon Mar 20 20:06:41 UTC 2023 kill -USR1 34184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34184 killed at Mon Mar 20 20:06:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34224 found at Mon Mar 20 20:06:42 UTC 2023 selfserv_9887 with PID 34224 started at Mon Mar 20 20:06:42 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34224 at Mon Mar 20 20:06:42 UTC 2023 kill -USR1 34224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34224 killed at Mon Mar 20 20:06:42 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34275 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34275 found at Mon Mar 20 20:06:42 UTC 2023 selfserv_9887 with PID 34275 started at Mon Mar 20 20:06:42 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34275 at Mon Mar 20 20:06:42 UTC 2023 kill -USR1 34275 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34275 killed at Mon Mar 20 20:06:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34315 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34315 found at Mon Mar 20 20:06:42 UTC 2023 selfserv_9887 with PID 34315 started at Mon Mar 20 20:06:42 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34315 at Mon Mar 20 20:06:42 UTC 2023 kill -USR1 34315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34315 killed at Mon Mar 20 20:06:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34355 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34355 found at Mon Mar 20 20:06:43 UTC 2023 selfserv_9887 with PID 34355 started at Mon Mar 20 20:06:43 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34355 at Mon Mar 20 20:06:43 UTC 2023 kill -USR1 34355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34355 killed at Mon Mar 20 20:06:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:06:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34395 found at Mon Mar 20 20:06:43 UTC 2023 selfserv_9887 with PID 34395 started at Mon Mar 20 20:06:43 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34395 at Mon Mar 20 20:06:43 UTC 2023 kill -USR1 34395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34395 killed at Mon Mar 20 20:06:43 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 20:06:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 34518 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34518 found at Mon Mar 20 20:06:44 UTC 2023 selfserv_9887 with PID 34518 started at Mon Mar 20 20:06:44 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 34518 at Mon Mar 20 20:06:50 UTC 2023 kill -USR1 34518 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34518 killed at Mon Mar 20 20:06:50 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:06:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:06:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 35068 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35068 found at Mon Mar 20 20:06:50 UTC 2023 selfserv_9887 with PID 35068 started at Mon Mar 20 20:06:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35068 at Mon Mar 20 20:07:04 UTC 2023 kill -USR1 35068 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35068 killed at Mon Mar 20 20:07:04 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 20:07:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35867 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35867 found at Mon Mar 20 20:07:04 UTC 2023 selfserv_9887 with PID 35867 started at Mon Mar 20 20:07:04 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35867 at Mon Mar 20 20:07:04 UTC 2023 kill -USR1 35867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35867 killed at Mon Mar 20 20:07:04 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:07:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35946 found at Mon Mar 20 20:07:04 UTC 2023 selfserv_9887 with PID 35946 started at Mon Mar 20 20:07:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35946 at Mon Mar 20 20:07:05 UTC 2023 kill -USR1 35946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35946 killed at Mon Mar 20 20:07:05 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:07:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35999 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35999 found at Mon Mar 20 20:07:05 UTC 2023 selfserv_9887 with PID 35999 started at Mon Mar 20 20:07:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35999 at Mon Mar 20 20:07:29 UTC 2023 kill -USR1 35999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35999 killed at Mon Mar 20 20:07:29 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:07:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36051 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36051 found at Mon Mar 20 20:07:29 UTC 2023 selfserv_9887 with PID 36051 started at Mon Mar 20 20:07:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36051 at Mon Mar 20 20:07:30 UTC 2023 kill -USR1 36051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36051 killed at Mon Mar 20 20:07:30 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:07:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36115 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36115 found at Mon Mar 20 20:07:30 UTC 2023 selfserv_9887 with PID 36115 started at Mon Mar 20 20:07:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36115 at Mon Mar 20 20:07:30 UTC 2023 kill -USR1 36115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36115 killed at Mon Mar 20 20:07:30 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:07:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36167 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36167 found at Mon Mar 20 20:07:30 UTC 2023 selfserv_9887 with PID 36167 started at Mon Mar 20 20:07:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36167 at Mon Mar 20 20:07:54 UTC 2023 kill -USR1 36167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36167 killed at Mon Mar 20 20:07:54 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:07:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36234 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36234 found at Mon Mar 20 20:07:54 UTC 2023 selfserv_9887 with PID 36234 started at Mon Mar 20 20:07:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36234 at Mon Mar 20 20:07:54 UTC 2023 kill -USR1 36234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36234 killed at Mon Mar 20 20:07:54 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:07:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36298 found at Mon Mar 20 20:07:54 UTC 2023 selfserv_9887 with PID 36298 started at Mon Mar 20 20:07:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36298 at Mon Mar 20 20:07:55 UTC 2023 kill -USR1 36298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36298 killed at Mon Mar 20 20:07:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:07:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:07:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36350 found at Mon Mar 20 20:07:55 UTC 2023 selfserv_9887 with PID 36350 started at Mon Mar 20 20:07:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36350 at Mon Mar 20 20:08:19 UTC 2023 kill -USR1 36350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36350 killed at Mon Mar 20 20:08:19 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:08:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:08:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36402 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36402 found at Mon Mar 20 20:08:20 UTC 2023 selfserv_9887 with PID 36402 started at Mon Mar 20 20:08:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36402 at Mon Mar 20 20:08:20 UTC 2023 kill -USR1 36402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36402 killed at Mon Mar 20 20:08:20 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:08:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:08:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36466 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36466 found at Mon Mar 20 20:08:20 UTC 2023 selfserv_9887 with PID 36466 started at Mon Mar 20 20:08:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36466 at Mon Mar 20 20:08:21 UTC 2023 kill -USR1 36466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36466 killed at Mon Mar 20 20:08:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:08:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:08:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36518 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36518 found at Mon Mar 20 20:08:21 UTC 2023 selfserv_9887 with PID 36518 started at Mon Mar 20 20:08:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36518 at Mon Mar 20 20:08:45 UTC 2023 kill -USR1 36518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36518 killed at Mon Mar 20 20:08:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:08:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:08:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36585 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36585 found at Mon Mar 20 20:08:46 UTC 2023 selfserv_9887 with PID 36585 started at Mon Mar 20 20:08:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36585 at Mon Mar 20 20:08:46 UTC 2023 kill -USR1 36585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36585 killed at Mon Mar 20 20:08:46 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:08:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:08:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36650 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36650 found at Mon Mar 20 20:08:46 UTC 2023 selfserv_9887 with PID 36650 started at Mon Mar 20 20:08:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36650 at Mon Mar 20 20:08:47 UTC 2023 kill -USR1 36650 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36650 killed at Mon Mar 20 20:08:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:08:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:08:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36702 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36702 found at Mon Mar 20 20:08:47 UTC 2023 selfserv_9887 with PID 36702 started at Mon Mar 20 20:08:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36702 at Mon Mar 20 20:09:10 UTC 2023 kill -USR1 36702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36702 killed at Mon Mar 20 20:09:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:09:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36754 found at Mon Mar 20 20:09:10 UTC 2023 selfserv_9887 with PID 36754 started at Mon Mar 20 20:09:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36754 at Mon Mar 20 20:09:11 UTC 2023 kill -USR1 36754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36754 killed at Mon Mar 20 20:09:11 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:09:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36810 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36810 found at Mon Mar 20 20:09:11 UTC 2023 selfserv_9887 with PID 36810 started at Mon Mar 20 20:09:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36810 at Mon Mar 20 20:09:11 UTC 2023 kill -USR1 36810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36810 killed at Mon Mar 20 20:09:11 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:09:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36866 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36866 found at Mon Mar 20 20:09:11 UTC 2023 selfserv_9887 with PID 36866 started at Mon Mar 20 20:09:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36866 at Mon Mar 20 20:09:12 UTC 2023 kill -USR1 36866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36866 killed at Mon Mar 20 20:09:12 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:09:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36922 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36922 found at Mon Mar 20 20:09:12 UTC 2023 selfserv_9887 with PID 36922 started at Mon Mar 20 20:09:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36922 at Mon Mar 20 20:09:12 UTC 2023 kill -USR1 36922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36922 killed at Mon Mar 20 20:09:12 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:09:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36982 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36982 found at Mon Mar 20 20:09:12 UTC 2023 selfserv_9887 with PID 36982 started at Mon Mar 20 20:09:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36982 at Mon Mar 20 20:09:37 UTC 2023 kill -USR1 36982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36982 killed at Mon Mar 20 20:09:37 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:09:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37034 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37034 found at Mon Mar 20 20:09:37 UTC 2023 selfserv_9887 with PID 37034 started at Mon Mar 20 20:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37034 at Mon Mar 20 20:09:37 UTC 2023 kill -USR1 37034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37034 killed at Mon Mar 20 20:09:37 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:09:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37094 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37094 found at Mon Mar 20 20:09:37 UTC 2023 selfserv_9887 with PID 37094 started at Mon Mar 20 20:09:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37094 at Mon Mar 20 20:10:01 UTC 2023 kill -USR1 37094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37094 killed at Mon Mar 20 20:10:01 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:10:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37161 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37161 found at Mon Mar 20 20:10:01 UTC 2023 selfserv_9887 with PID 37161 started at Mon Mar 20 20:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37161 at Mon Mar 20 20:10:01 UTC 2023 kill -USR1 37161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37161 killed at Mon Mar 20 20:10:01 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:10:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37221 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37221 found at Mon Mar 20 20:10:01 UTC 2023 selfserv_9887 with PID 37221 started at Mon Mar 20 20:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37221 at Mon Mar 20 20:10:26 UTC 2023 kill -USR1 37221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37221 killed at Mon Mar 20 20:10:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:10:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37273 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37273 found at Mon Mar 20 20:10:26 UTC 2023 selfserv_9887 with PID 37273 started at Mon Mar 20 20:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37273 at Mon Mar 20 20:10:26 UTC 2023 kill -USR1 37273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37273 killed at Mon Mar 20 20:10:26 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:10:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37333 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37333 found at Mon Mar 20 20:10:27 UTC 2023 selfserv_9887 with PID 37333 started at Mon Mar 20 20:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37333 at Mon Mar 20 20:10:51 UTC 2023 kill -USR1 37333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37333 killed at Mon Mar 20 20:10:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:10:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:10:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37400 found at Mon Mar 20 20:10:51 UTC 2023 selfserv_9887 with PID 37400 started at Mon Mar 20 20:10:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37400 at Mon Mar 20 20:10:52 UTC 2023 kill -USR1 37400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37400 killed at Mon Mar 20 20:10:52 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:10:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:10:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37460 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37460 found at Mon Mar 20 20:10:52 UTC 2023 selfserv_9887 with PID 37460 started at Mon Mar 20 20:10:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37460 at Mon Mar 20 20:11:15 UTC 2023 kill -USR1 37460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37460 killed at Mon Mar 20 20:11:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:11:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37512 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37512 found at Mon Mar 20 20:11:15 UTC 2023 selfserv_9887 with PID 37512 started at Mon Mar 20 20:11:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37512 at Mon Mar 20 20:11:16 UTC 2023 kill -USR1 37512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37512 killed at Mon Mar 20 20:11:16 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:11:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37564 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37564 found at Mon Mar 20 20:11:16 UTC 2023 selfserv_9887 with PID 37564 started at Mon Mar 20 20:11:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37564 at Mon Mar 20 20:11:16 UTC 2023 kill -USR1 37564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37564 killed at Mon Mar 20 20:11:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:11:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37616 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37616 found at Mon Mar 20 20:11:17 UTC 2023 selfserv_9887 with PID 37616 started at Mon Mar 20 20:11:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37616 at Mon Mar 20 20:11:17 UTC 2023 kill -USR1 37616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37616 killed at Mon Mar 20 20:11:17 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:11:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37675 found at Mon Mar 20 20:11:17 UTC 2023 selfserv_9887 with PID 37675 started at Mon Mar 20 20:11:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37675 at Mon Mar 20 20:11:17 UTC 2023 kill -USR1 37675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37675 killed at Mon Mar 20 20:11:17 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:11:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37733 found at Mon Mar 20 20:11:18 UTC 2023 selfserv_9887 with PID 37733 started at Mon Mar 20 20:11:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37733 at Mon Mar 20 20:11:18 UTC 2023 kill -USR1 37733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37733 killed at Mon Mar 20 20:11:18 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:11:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37791 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37791 found at Mon Mar 20 20:11:18 UTC 2023 selfserv_9887 with PID 37791 started at Mon Mar 20 20:11:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37791 at Mon Mar 20 20:11:18 UTC 2023 kill -USR1 37791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37791 killed at Mon Mar 20 20:11:18 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:11:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37849 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37849 found at Mon Mar 20 20:11:18 UTC 2023 selfserv_9887 with PID 37849 started at Mon Mar 20 20:11:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37849 at Mon Mar 20 20:11:19 UTC 2023 kill -USR1 37849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37849 killed at Mon Mar 20 20:11:19 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 20:11:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37907 found at Mon Mar 20 20:11:19 UTC 2023 selfserv_9887 with PID 37907 started at Mon Mar 20 20:11:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37907 at Mon Mar 20 20:11:19 UTC 2023 kill -USR1 37907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37907 killed at Mon Mar 20 20:11:19 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:11:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37966 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37966 found at Mon Mar 20 20:11:19 UTC 2023 selfserv_9887 with PID 37966 started at Mon Mar 20 20:11:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37966 at Mon Mar 20 20:11:19 UTC 2023 kill -USR1 37966 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37966 killed at Mon Mar 20 20:11:19 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:11:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38025 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38025 found at Mon Mar 20 20:11:20 UTC 2023 selfserv_9887 with PID 38025 started at Mon Mar 20 20:11:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38025 at Mon Mar 20 20:11:20 UTC 2023 kill -USR1 38025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38025 killed at Mon Mar 20 20:11:20 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:11:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38083 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38083 found at Mon Mar 20 20:11:20 UTC 2023 selfserv_9887 with PID 38083 started at Mon Mar 20 20:11:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38083 at Mon Mar 20 20:11:20 UTC 2023 kill -USR1 38083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38083 killed at Mon Mar 20 20:11:20 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:11:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38141 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38141 found at Mon Mar 20 20:11:20 UTC 2023 selfserv_9887 with PID 38141 started at Mon Mar 20 20:11:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38141 at Mon Mar 20 20:11:20 UTC 2023 kill -USR1 38141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38141 killed at Mon Mar 20 20:11:21 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:11:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38199 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38199 found at Mon Mar 20 20:11:21 UTC 2023 selfserv_9887 with PID 38199 started at Mon Mar 20 20:11:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38199 at Mon Mar 20 20:11:21 UTC 2023 kill -USR1 38199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38199 killed at Mon Mar 20 20:11:21 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 20:11:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38241 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38241 found at Mon Mar 20 20:11:21 UTC 2023 selfserv_9887 with PID 38241 started at Mon Mar 20 20:11:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38241 at Mon Mar 20 20:11:21 UTC 2023 kill -USR1 38241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38241 killed at Mon Mar 20 20:11:21 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 20:11:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38283 found at Mon Mar 20 20:11:21 UTC 2023 selfserv_9887 with PID 38283 started at Mon Mar 20 20:11:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 38283 at Mon Mar 20 20:11:22 UTC 2023 kill -USR1 38283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38283 killed at Mon Mar 20 20:11:22 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 20:11:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38325 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38325 found at Mon Mar 20 20:11:22 UTC 2023 selfserv_9887 with PID 38325 started at Mon Mar 20 20:11:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 38325 at Mon Mar 20 20:11:22 UTC 2023 kill -USR1 38325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38325 killed at Mon Mar 20 20:11:22 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 20:11:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38367 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38367 found at Mon Mar 20 20:11:22 UTC 2023 selfserv_9887 with PID 38367 started at Mon Mar 20 20:11:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 38367 at Mon Mar 20 20:11:22 UTC 2023 kill -USR1 38367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38367 killed at Mon Mar 20 20:11:22 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 20:11:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38409 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38409 found at Mon Mar 20 20:11:23 UTC 2023 selfserv_9887 with PID 38409 started at Mon Mar 20 20:11:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 38409 at Mon Mar 20 20:11:23 UTC 2023 kill -USR1 38409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38409 killed at Mon Mar 20 20:11:23 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 20:11:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38451 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38451 found at Mon Mar 20 20:11:23 UTC 2023 selfserv_9887 with PID 38451 started at Mon Mar 20 20:11:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 38451 at Mon Mar 20 20:11:23 UTC 2023 kill -USR1 38451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38451 killed at Mon Mar 20 20:11:23 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 20:11:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38493 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38493 found at Mon Mar 20 20:11:23 UTC 2023 selfserv_9887 with PID 38493 started at Mon Mar 20 20:11:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 38493 at Mon Mar 20 20:11:23 UTC 2023 kill -USR1 38493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38493 killed at Mon Mar 20 20:11:23 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 20:11:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:11:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38535 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38535 found at Mon Mar 20 20:11:24 UTC 2023 selfserv_9887 with PID 38535 started at Mon Mar 20 20:11:24 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 20:11:24 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 20:12:29 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 38535 at Mon Mar 20 20:12:29 UTC 2023 kill -USR1 38535 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38535 killed at Mon Mar 20 20:12:29 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:12:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38601 found at Mon Mar 20 20:12:29 UTC 2023 selfserv_9887 with PID 38601 started at Mon Mar 20 20:12:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38601 at Mon Mar 20 20:12:29 UTC 2023 kill -USR1 38601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38601 killed at Mon Mar 20 20:12:29 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38643 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38643 found at Mon Mar 20 20:12:30 UTC 2023 selfserv_9887 with PID 38643 started at Mon Mar 20 20:12:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38643 at Mon Mar 20 20:12:30 UTC 2023 kill -USR1 38643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38643 killed at Mon Mar 20 20:12:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38682 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38682 found at Mon Mar 20 20:12:30 UTC 2023 selfserv_9887 with PID 38682 started at Mon Mar 20 20:12:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38682 at Mon Mar 20 20:12:30 UTC 2023 kill -USR1 38682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38682 killed at Mon Mar 20 20:12:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38721 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38721 found at Mon Mar 20 20:12:30 UTC 2023 selfserv_9887 with PID 38721 started at Mon Mar 20 20:12:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38721 at Mon Mar 20 20:12:30 UTC 2023 kill -USR1 38721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38721 killed at Mon Mar 20 20:12:31 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38760 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38760 found at Mon Mar 20 20:12:31 UTC 2023 selfserv_9887 with PID 38760 started at Mon Mar 20 20:12:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38760 at Mon Mar 20 20:12:31 UTC 2023 kill -USR1 38760 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38760 killed at Mon Mar 20 20:12:31 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38799 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38799 found at Mon Mar 20 20:12:31 UTC 2023 selfserv_9887 with PID 38799 started at Mon Mar 20 20:12:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38799 at Mon Mar 20 20:12:31 UTC 2023 kill -USR1 38799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38799 killed at Mon Mar 20 20:12:31 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38838 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38838 found at Mon Mar 20 20:12:31 UTC 2023 selfserv_9887 with PID 38838 started at Mon Mar 20 20:12:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38838 at Mon Mar 20 20:12:32 UTC 2023 kill -USR1 38838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38838 killed at Mon Mar 20 20:12:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38877 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38877 found at Mon Mar 20 20:12:32 UTC 2023 selfserv_9887 with PID 38877 started at Mon Mar 20 20:12:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38877 at Mon Mar 20 20:12:32 UTC 2023 kill -USR1 38877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38877 killed at Mon Mar 20 20:12:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38917 found at Mon Mar 20 20:12:32 UTC 2023 selfserv_9887 with PID 38917 started at Mon Mar 20 20:12:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38917 at Mon Mar 20 20:12:32 UTC 2023 kill -USR1 38917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38917 killed at Mon Mar 20 20:12:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38956 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38956 found at Mon Mar 20 20:12:32 UTC 2023 selfserv_9887 with PID 38956 started at Mon Mar 20 20:12:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38956 at Mon Mar 20 20:12:33 UTC 2023 kill -USR1 38956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38956 killed at Mon Mar 20 20:12:33 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38995 found at Mon Mar 20 20:12:33 UTC 2023 selfserv_9887 with PID 38995 started at Mon Mar 20 20:12:33 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38995 at Mon Mar 20 20:12:33 UTC 2023 kill -USR1 38995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38995 killed at Mon Mar 20 20:12:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39035 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39035 found at Mon Mar 20 20:12:33 UTC 2023 selfserv_9887 with PID 39035 started at Mon Mar 20 20:12:33 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39035 at Mon Mar 20 20:12:33 UTC 2023 kill -USR1 39035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39035 killed at Mon Mar 20 20:12:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39075 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39075 found at Mon Mar 20 20:12:34 UTC 2023 selfserv_9887 with PID 39075 started at Mon Mar 20 20:12:34 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39075 at Mon Mar 20 20:12:34 UTC 2023 kill -USR1 39075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39075 killed at Mon Mar 20 20:12:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39115 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39115 found at Mon Mar 20 20:12:34 UTC 2023 selfserv_9887 with PID 39115 started at Mon Mar 20 20:12:34 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39115 at Mon Mar 20 20:12:34 UTC 2023 kill -USR1 39115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39115 killed at Mon Mar 20 20:12:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39155 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39155 found at Mon Mar 20 20:12:34 UTC 2023 selfserv_9887 with PID 39155 started at Mon Mar 20 20:12:34 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39155 at Mon Mar 20 20:12:34 UTC 2023 kill -USR1 39155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39155 killed at Mon Mar 20 20:12:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39195 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39195 found at Mon Mar 20 20:12:35 UTC 2023 selfserv_9887 with PID 39195 started at Mon Mar 20 20:12:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39195 at Mon Mar 20 20:12:35 UTC 2023 kill -USR1 39195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39195 killed at Mon Mar 20 20:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39235 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39235 found at Mon Mar 20 20:12:35 UTC 2023 selfserv_9887 with PID 39235 started at Mon Mar 20 20:12:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39235 at Mon Mar 20 20:12:35 UTC 2023 kill -USR1 39235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39235 killed at Mon Mar 20 20:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39277 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39277 found at Mon Mar 20 20:12:35 UTC 2023 selfserv_9887 with PID 39277 started at Mon Mar 20 20:12:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39277 at Mon Mar 20 20:12:35 UTC 2023 kill -USR1 39277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39277 killed at Mon Mar 20 20:12:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:12:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39317 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39317 found at Mon Mar 20 20:12:36 UTC 2023 selfserv_9887 with PID 39317 started at Mon Mar 20 20:12:36 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39317 at Mon Mar 20 20:12:36 UTC 2023 kill -USR1 39317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39317 killed at Mon Mar 20 20:12:36 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 20:12:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 39357 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39357 found at Mon Mar 20 20:12:36 UTC 2023 selfserv_9887 with PID 39357 started at Mon Mar 20 20:12:36 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 39357 at Mon Mar 20 20:12:42 UTC 2023 kill -USR1 39357 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39357 killed at Mon Mar 20 20:12:42 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:12:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 39923 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39923 found at Mon Mar 20 20:12:42 UTC 2023 selfserv_9887 with PID 39923 started at Mon Mar 20 20:12:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39923 at Mon Mar 20 20:12:52 UTC 2023 kill -USR1 39923 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39923 killed at Mon Mar 20 20:12:52 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:12:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40750 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40750 found at Mon Mar 20 20:12:52 UTC 2023 selfserv_9887 with PID 40750 started at Mon Mar 20 20:12:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40750 at Mon Mar 20 20:12:52 UTC 2023 kill -USR1 40750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40750 killed at Mon Mar 20 20:12:53 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:12:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:12:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40802 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40802 found at Mon Mar 20 20:12:53 UTC 2023 selfserv_9887 with PID 40802 started at Mon Mar 20 20:12:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40802 at Mon Mar 20 20:13:18 UTC 2023 kill -USR1 40802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40802 killed at Mon Mar 20 20:13:18 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:13:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:13:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40854 found at Mon Mar 20 20:13:18 UTC 2023 selfserv_9887 with PID 40854 started at Mon Mar 20 20:13:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40854 at Mon Mar 20 20:13:18 UTC 2023 kill -USR1 40854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40854 killed at Mon Mar 20 20:13:18 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:13:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:13:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40918 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40918 found at Mon Mar 20 20:13:19 UTC 2023 selfserv_9887 with PID 40918 started at Mon Mar 20 20:13:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40918 at Mon Mar 20 20:13:19 UTC 2023 kill -USR1 40918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40918 killed at Mon Mar 20 20:13:19 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:13:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:13:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 311 found at Mon Mar 20 20:13:19 UTC 2023 selfserv_9887 with PID 311 started at Mon Mar 20 20:13:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 311 at Mon Mar 20 20:13:42 UTC 2023 kill -USR1 311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 311 killed at Mon Mar 20 20:13:42 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:13:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:13:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 378 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 378 found at Mon Mar 20 20:13:42 UTC 2023 selfserv_9887 with PID 378 started at Mon Mar 20 20:13:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 378 at Mon Mar 20 20:13:43 UTC 2023 kill -USR1 378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 378 killed at Mon Mar 20 20:13:43 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:13:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:13:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 442 found at Mon Mar 20 20:13:43 UTC 2023 selfserv_9887 with PID 442 started at Mon Mar 20 20:13:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 442 at Mon Mar 20 20:13:43 UTC 2023 kill -USR1 442 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 442 killed at Mon Mar 20 20:13:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:13:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:13:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 494 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 494 found at Mon Mar 20 20:13:43 UTC 2023 selfserv_9887 with PID 494 started at Mon Mar 20 20:13:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 494 at Mon Mar 20 20:14:09 UTC 2023 kill -USR1 494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 494 killed at Mon Mar 20 20:14:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:14:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 546 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 546 found at Mon Mar 20 20:14:09 UTC 2023 selfserv_9887 with PID 546 started at Mon Mar 20 20:14:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 546 at Mon Mar 20 20:14:09 UTC 2023 kill -USR1 546 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 546 killed at Mon Mar 20 20:14:09 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:14:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 610 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 610 found at Mon Mar 20 20:14:09 UTC 2023 selfserv_9887 with PID 610 started at Mon Mar 20 20:14:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 610 at Mon Mar 20 20:14:09 UTC 2023 kill -USR1 610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 610 killed at Mon Mar 20 20:14:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:14:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 662 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 662 found at Mon Mar 20 20:14:10 UTC 2023 selfserv_9887 with PID 662 started at Mon Mar 20 20:14:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 662 at Mon Mar 20 20:14:35 UTC 2023 kill -USR1 662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 662 killed at Mon Mar 20 20:14:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:14:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 714 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 714 found at Mon Mar 20 20:14:35 UTC 2023 selfserv_9887 with PID 714 started at Mon Mar 20 20:14:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 714 at Mon Mar 20 20:14:35 UTC 2023 kill -USR1 714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 714 killed at Mon Mar 20 20:14:35 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:14:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 778 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 778 found at Mon Mar 20 20:14:36 UTC 2023 selfserv_9887 with PID 778 started at Mon Mar 20 20:14:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 778 at Mon Mar 20 20:14:36 UTC 2023 kill -USR1 778 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 778 killed at Mon Mar 20 20:14:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:14:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 831 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 831 found at Mon Mar 20 20:14:36 UTC 2023 selfserv_9887 with PID 831 started at Mon Mar 20 20:14:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 831 at Mon Mar 20 20:14:59 UTC 2023 kill -USR1 831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 831 killed at Mon Mar 20 20:14:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:14:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:14:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 898 found at Mon Mar 20 20:15:00 UTC 2023 selfserv_9887 with PID 898 started at Mon Mar 20 20:15:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 898 at Mon Mar 20 20:15:00 UTC 2023 kill -USR1 898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 898 killed at Mon Mar 20 20:15:00 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:15:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 956 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 956 found at Mon Mar 20 20:15:00 UTC 2023 selfserv_9887 with PID 956 started at Mon Mar 20 20:15:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 956 at Mon Mar 20 20:15:00 UTC 2023 kill -USR1 956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 956 killed at Mon Mar 20 20:15:00 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:15:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1012 found at Mon Mar 20 20:15:01 UTC 2023 selfserv_9887 with PID 1012 started at Mon Mar 20 20:15:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1012 at Mon Mar 20 20:15:01 UTC 2023 kill -USR1 1012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1012 killed at Mon Mar 20 20:15:01 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:15:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1068 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1068 found at Mon Mar 20 20:15:01 UTC 2023 selfserv_9887 with PID 1068 started at Mon Mar 20 20:15:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1068 at Mon Mar 20 20:15:01 UTC 2023 kill -USR1 1068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1068 killed at Mon Mar 20 20:15:01 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:15:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1128 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1128 found at Mon Mar 20 20:15:01 UTC 2023 selfserv_9887 with PID 1128 started at Mon Mar 20 20:15:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1128 at Mon Mar 20 20:15:27 UTC 2023 kill -USR1 1128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1128 killed at Mon Mar 20 20:15:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:15:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1181 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1181 found at Mon Mar 20 20:15:27 UTC 2023 selfserv_9887 with PID 1181 started at Mon Mar 20 20:15:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1181 at Mon Mar 20 20:15:27 UTC 2023 kill -USR1 1181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1181 killed at Mon Mar 20 20:15:27 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:15:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1241 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1241 found at Mon Mar 20 20:15:27 UTC 2023 selfserv_9887 with PID 1241 started at Mon Mar 20 20:15:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1241 at Mon Mar 20 20:15:50 UTC 2023 kill -USR1 1241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1241 killed at Mon Mar 20 20:15:50 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:15:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1332 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1332 found at Mon Mar 20 20:15:51 UTC 2023 selfserv_9887 with PID 1332 started at Mon Mar 20 20:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1332 at Mon Mar 20 20:15:51 UTC 2023 kill -USR1 1332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1332 killed at Mon Mar 20 20:15:51 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:15:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1392 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1392 found at Mon Mar 20 20:15:51 UTC 2023 selfserv_9887 with PID 1392 started at Mon Mar 20 20:15:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1392 at Mon Mar 20 20:16:16 UTC 2023 kill -USR1 1392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1392 killed at Mon Mar 20 20:16:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:16:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:16:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1542 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1542 found at Mon Mar 20 20:16:17 UTC 2023 selfserv_9887 with PID 1542 started at Mon Mar 20 20:16:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1542 at Mon Mar 20 20:16:17 UTC 2023 kill -USR1 1542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1542 killed at Mon Mar 20 20:16:17 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:16:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:16:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1602 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1602 found at Mon Mar 20 20:16:17 UTC 2023 selfserv_9887 with PID 1602 started at Mon Mar 20 20:16:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1602 at Mon Mar 20 20:16:42 UTC 2023 kill -USR1 1602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1602 killed at Mon Mar 20 20:16:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:16:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:16:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1669 found at Mon Mar 20 20:16:42 UTC 2023 selfserv_9887 with PID 1669 started at Mon Mar 20 20:16:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1669 at Mon Mar 20 20:16:43 UTC 2023 kill -USR1 1669 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1669 killed at Mon Mar 20 20:16:43 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:16:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:16:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1729 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1729 found at Mon Mar 20 20:16:43 UTC 2023 selfserv_9887 with PID 1729 started at Mon Mar 20 20:16:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1729 at Mon Mar 20 20:17:06 UTC 2023 kill -USR1 1729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1729 killed at Mon Mar 20 20:17:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:17:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1781 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1781 found at Mon Mar 20 20:17:06 UTC 2023 selfserv_9887 with PID 1781 started at Mon Mar 20 20:17:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1781 at Mon Mar 20 20:17:07 UTC 2023 kill -USR1 1781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1781 killed at Mon Mar 20 20:17:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:17:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1833 found at Mon Mar 20 20:17:07 UTC 2023 selfserv_9887 with PID 1833 started at Mon Mar 20 20:17:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1833 at Mon Mar 20 20:17:07 UTC 2023 kill -USR1 1833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1833 killed at Mon Mar 20 20:17:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:17:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1885 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1885 found at Mon Mar 20 20:17:07 UTC 2023 selfserv_9887 with PID 1885 started at Mon Mar 20 20:17:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1885 at Mon Mar 20 20:17:08 UTC 2023 kill -USR1 1885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1885 killed at Mon Mar 20 20:17:08 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:17:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1967 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1967 found at Mon Mar 20 20:17:08 UTC 2023 selfserv_9887 with PID 1967 started at Mon Mar 20 20:17:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1967 at Mon Mar 20 20:17:08 UTC 2023 kill -USR1 1967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1967 killed at Mon Mar 20 20:17:08 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2009 found at Mon Mar 20 20:17:08 UTC 2023 selfserv_9887 with PID 2009 started at Mon Mar 20 20:17:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2009 at Mon Mar 20 20:17:08 UTC 2023 kill -USR1 2009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2009 killed at Mon Mar 20 20:17:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2049 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2049 found at Mon Mar 20 20:17:09 UTC 2023 selfserv_9887 with PID 2049 started at Mon Mar 20 20:17:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2049 at Mon Mar 20 20:17:09 UTC 2023 kill -USR1 2049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2049 killed at Mon Mar 20 20:17:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2088 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2088 found at Mon Mar 20 20:17:09 UTC 2023 selfserv_9887 with PID 2088 started at Mon Mar 20 20:17:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2088 at Mon Mar 20 20:17:09 UTC 2023 kill -USR1 2088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2088 killed at Mon Mar 20 20:17:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2127 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2127 found at Mon Mar 20 20:17:09 UTC 2023 selfserv_9887 with PID 2127 started at Mon Mar 20 20:17:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2127 at Mon Mar 20 20:17:09 UTC 2023 kill -USR1 2127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2127 killed at Mon Mar 20 20:17:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2166 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2166 found at Mon Mar 20 20:17:10 UTC 2023 selfserv_9887 with PID 2166 started at Mon Mar 20 20:17:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2166 at Mon Mar 20 20:17:10 UTC 2023 kill -USR1 2166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2166 killed at Mon Mar 20 20:17:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2205 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2205 found at Mon Mar 20 20:17:10 UTC 2023 selfserv_9887 with PID 2205 started at Mon Mar 20 20:17:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2205 at Mon Mar 20 20:17:10 UTC 2023 kill -USR1 2205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2205 killed at Mon Mar 20 20:17:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2244 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2244 found at Mon Mar 20 20:17:10 UTC 2023 selfserv_9887 with PID 2244 started at Mon Mar 20 20:17:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2244 at Mon Mar 20 20:17:10 UTC 2023 kill -USR1 2244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2244 killed at Mon Mar 20 20:17:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2283 found at Mon Mar 20 20:17:11 UTC 2023 selfserv_9887 with PID 2283 started at Mon Mar 20 20:17:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2283 at Mon Mar 20 20:17:11 UTC 2023 kill -USR1 2283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2283 killed at Mon Mar 20 20:17:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2322 found at Mon Mar 20 20:17:11 UTC 2023 selfserv_9887 with PID 2322 started at Mon Mar 20 20:17:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2322 at Mon Mar 20 20:17:11 UTC 2023 kill -USR1 2322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2322 killed at Mon Mar 20 20:17:11 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2361 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2361 found at Mon Mar 20 20:17:11 UTC 2023 selfserv_9887 with PID 2361 started at Mon Mar 20 20:17:11 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2361 at Mon Mar 20 20:17:12 UTC 2023 kill -USR1 2361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2361 killed at Mon Mar 20 20:17:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2401 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2401 found at Mon Mar 20 20:17:12 UTC 2023 selfserv_9887 with PID 2401 started at Mon Mar 20 20:17:12 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2401 at Mon Mar 20 20:17:12 UTC 2023 kill -USR1 2401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2401 killed at Mon Mar 20 20:17:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2442 found at Mon Mar 20 20:17:12 UTC 2023 selfserv_9887 with PID 2442 started at Mon Mar 20 20:17:12 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2442 at Mon Mar 20 20:17:12 UTC 2023 kill -USR1 2442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2442 killed at Mon Mar 20 20:17:12 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2482 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2482 found at Mon Mar 20 20:17:13 UTC 2023 selfserv_9887 with PID 2482 started at Mon Mar 20 20:17:13 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2482 at Mon Mar 20 20:17:13 UTC 2023 kill -USR1 2482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2482 killed at Mon Mar 20 20:17:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2522 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2522 found at Mon Mar 20 20:17:13 UTC 2023 selfserv_9887 with PID 2522 started at Mon Mar 20 20:17:13 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2522 at Mon Mar 20 20:17:13 UTC 2023 kill -USR1 2522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2522 killed at Mon Mar 20 20:17:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2562 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2562 found at Mon Mar 20 20:17:13 UTC 2023 selfserv_9887 with PID 2562 started at Mon Mar 20 20:17:13 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2562 at Mon Mar 20 20:17:13 UTC 2023 kill -USR1 2562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2562 killed at Mon Mar 20 20:17:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2602 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2602 found at Mon Mar 20 20:17:14 UTC 2023 selfserv_9887 with PID 2602 started at Mon Mar 20 20:17:14 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2602 at Mon Mar 20 20:17:14 UTC 2023 kill -USR1 2602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2602 killed at Mon Mar 20 20:17:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2642 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2642 found at Mon Mar 20 20:17:14 UTC 2023 selfserv_9887 with PID 2642 started at Mon Mar 20 20:17:14 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2642 at Mon Mar 20 20:17:14 UTC 2023 kill -USR1 2642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2642 killed at Mon Mar 20 20:17:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:17:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:17:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2682 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2682 found at Mon Mar 20 20:17:14 UTC 2023 selfserv_9887 with PID 2682 started at Mon Mar 20 20:17:14 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2682 at Mon Mar 20 20:17:14 UTC 2023 kill -USR1 2682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2682 killed at Mon Mar 20 20:17:15 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 20 20:17:15 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 20 20:17:15 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 20 20:17:15 UTC 2023 Running tests for pkits TIMESTAMP pkits BEGIN: Mon Mar 20 20:17:15 UTC 2023 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Mar 20 20:17:15 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 20 20:17:15 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201716 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20230320201732Z nextupdate=20240320201732Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Mar 20 20:17:32 2023 Next Update: Wed Mar 20 20:17:32 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20230320201733Z addcert 2 20230320201733Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Mar 20 20:17:33 2023 Next Update: Wed Mar 20 20:17:32 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:33 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320201733Z nextupdate=20240320201733Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 20:17:33 2023 Next Update: Wed Mar 20 20:17:33 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320201734Z addcert 2 20230320201734Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 20:17:34 2023 Next Update: Wed Mar 20 20:17:33 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:34 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320201735Z addcert 4 20230320201735Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 20:17:35 2023 Next Update: Wed Mar 20 20:17:33 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:34 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Mon Mar 20 20:17:35 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320201735Z nextupdate=20240320201735Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 20:17:35 2023 Next Update: Wed Mar 20 20:17:35 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320201736Z addcert 2 20230320201736Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 20:17:36 2023 Next Update: Wed Mar 20 20:17:35 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:36 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320201737Z addcert 3 20230320201737Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 20:17:37 2023 Next Update: Wed Mar 20 20:17:35 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:36 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Mar 20 20:17:37 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320201737Z nextupdate=20240320201737Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 20:17:37 2023 Next Update: Wed Mar 20 20:17:37 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320201738Z addcert 2 20230320201738Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 20:17:38 2023 Next Update: Wed Mar 20 20:17:37 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:38 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320201739Z addcert 3 20230320201739Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 20:17:39 2023 Next Update: Wed Mar 20 20:17:37 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 20:17:38 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Mar 20 20:17:39 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201717 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201718 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 320201719 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 320201720 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 320201721 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 320201722 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 320201723 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 320201724 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 320201725 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 320201726 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 320201727 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 320201728 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 320201729 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 320201730 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 320201731 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 320201732 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Mon Mar 20 20:18:03 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 20:18:03 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 5000 >/dev/null 2>/dev/null httpserv with PID 5000 found at Mon Mar 20 20:18:03 UTC 2023 httpserv with PID 5000 started at Mon Mar 20 20:18:03 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201717 (0x1315e3f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:17:48 2023 Not After : Mon Mar 20 20:17:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:0d:44:11:48:e6:75:1b:9b:56:56:d9:8d:ab:d4:32: 5c:bc:bb:28:03:91:e3:5d:8b:94:f0:f3:a7:f5:0e:5b: 33:21:8e:d6:bd:98:72:db:93:05:bc:c9:dd:43:9e:80: 79:83:2b:55:d7:c7:f3:29:e5:9a:7c:47:0f:b6:7b:69: df:b0:c8:e5:8d:5a:91:76:ba:61:07:41:f1:15:da:d0: ab:e0:71:94:6b:49:b6:74:bb:1f:9f:39:f6:10:70:df: 44:e9:af:42:6b:8a:85:4d:07:63:3d:fe:be:34:82:87: 0d:da:0d:a4:bc:56:c3:76:f2:15:55:3f:bc:ae:f4:b2: 9d:48:32:8b:57:f6:7a:16:05:65:a4:ce:5f:d1:d1:f4: b3:24:f8:94:cf:46:3b:2e:87:1a:8b:d4:c5:ea:fc:6f: 2d:d8:e6:26:26:e5:b9:25:e7:ed:3f:e3:50:31:7f:63: 66:29:e2:72:23:fa:84:e8:94:2b:f9:65:03:3f:d9:e5: 72:35:c3:cb:37:2a:f9:d4:50:c7:87:9a:a4:29:c5:ed: 39:3a:a3:5e:24:9f:6d:82:90:d9:ac:76:4f:e2:74:96: d5:71:1c:86:d7:b9:33:d8:38:14:18:30:a8:7b:c2:8a: 51:c1:3a:9e:10:4e:b5:1b:f6:a1:c1:05:d7:17:e5:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:f1:7e:4b:dd:02:81:92:d9:d9:70:b2:fe:6f:07:19: 3a:a2:d0:d2:ed:03:14:ca:de:ec:54:56:c0:25:56:da: 22:97:e9:a0:79:b5:7a:a2:d5:0a:27:04:b7:6a:f8:c0: 38:4c:06:e8:11:d3:b7:22:74:01:cd:6b:75:08:f0:15: ab:45:3c:c6:62:ad:5b:1b:e0:1f:e5:a5:ca:fb:ae:b7: 23:f9:d2:50:52:8c:90:e6:e1:12:40:36:9e:a5:ab:66: 71:95:7d:9c:b9:7a:d5:a7:12:30:35:c3:5c:17:a1:d8: b7:3c:20:68:ca:dc:ab:cc:ef:47:a4:87:35:04:ec:d1: b5:01:c7:d8:7b:f9:6b:d6:5c:02:9c:73:b0:7c:37:b6: a2:e5:23:28:b8:e0:bb:a0:1d:2f:ce:0f:fc:8d:70:21: 22:ea:44:0f:a8:61:c2:a0:e3:a7:87:a9:cb:5f:cb:33: c9:b5:41:bd:a4:36:25:a2:60:af:bd:7c:12:82:06:17: 9c:55:9c:72:38:6a:88:fe:45:49:4c:57:a2:e3:67:76: 93:c8:cc:0c:15:eb:59:55:36:df:71:e1:33:5c:32:0c: 45:dc:a1:a7:89:3e:19:2f:ba:db:f3:4f:d3:01:b4:bb: 2c:d7:ba:ad:f0:89:81:e1:eb:55:b2:ca:f2:c7:b5:4f Fingerprint (SHA-256): 07:4C:DF:C9:DD:D2:24:C8:52:C0:82:CF:9F:2A:D9:A0:9C:B2:34:BE:4F:3E:FA:F4:B5:CA:8E:6F:BC:C3:79:BA Fingerprint (SHA1): C8:F0:0F:5D:37:E3:D9:EB:FA:7B:AD:27:7E:B9:8D:51:C3:52:40:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9897 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201716 (0x1315e3f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Mar 20 20:17:16 2023 Not After : Mon Mar 20 20:17:16 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:d7:47:fb:07:27:ae:c6:df:45:9f:71:f9:c6:80:d1: 65:ec:9d:b7:ce:87:bc:10:67:72:dd:a8:df:fc:40:71: 89:03:a8:a9:32:13:48:4a:b5:36:45:ac:05:94:a8:4b: de:26:59:bf:9e:bd:8e:52:d6:9e:3f:85:b8:5f:1f:84: 96:5b:14:db:d5:2d:f6:53:9e:06:2b:c8:1a:dd:b3:bc: 2e:52:57:ba:a5:4b:16:77:35:3e:2a:1a:66:75:3f:df: a4:70:43:11:c9:d0:66:ad:0e:6b:27:f7:65:5e:4b:bc: a4:da:5e:a8:f3:0a:d7:92:9a:90:da:c5:eb:a5:a0:f0: 21:92:5b:bf:38:29:90:46:03:92:c7:de:64:cd:e3:c5: 38:65:bd:c1:f6:15:9c:ee:d5:63:e2:cb:8c:b1:69:37: 98:83:4d:30:4b:69:37:9a:32:39:74:87:39:04:86:1c: 73:73:db:1b:75:fc:aa:5e:a9:61:c2:24:83:a2:1b:a4: d2:b5:b1:1e:fd:ea:8c:7b:2d:f9:d2:96:bd:4e:19:96: 45:d1:0c:46:6c:32:a0:8c:8a:dc:a9:39:0f:92:6b:60: 67:87:f7:ca:f8:83:33:fe:b3:16:26:f4:3a:dc:c0:28: a8:ac:5d:e7:9a:85:83:8d:0c:bb:58:7e:f1:56:f5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:c5:a1:b1:af:0a:6c:b1:73:ec:3d:ae:c6:d7:a2:6d: 08:92:06:a2:05:d4:60:67:60:94:58:b2:57:00:85:fd: 90:6b:6e:aa:2e:23:d4:e2:41:da:1f:9a:b5:dc:64:4f: 69:db:0f:25:5e:bd:ac:01:16:35:0d:3f:de:63:55:a6: 5a:52:11:9f:ff:28:1e:c4:a6:c2:7d:13:69:ac:86:88: 73:8b:7c:f6:b7:60:d8:34:ed:3b:e9:09:85:5d:ff:a2: 7b:3d:42:3c:77:00:4c:b6:32:58:ea:30:3e:48:58:78: d6:cf:67:78:6b:72:0b:fa:be:37:bb:80:a9:d8:be:13: 67:ca:15:12:03:b4:56:16:18:d0:60:31:83:48:2f:0e: bb:98:17:a9:c9:64:66:b8:70:9d:e6:75:10:0e:a1:d4: 04:b4:ec:ab:81:c5:4c:a3:57:d8:86:3e:a8:72:58:7c: ff:cb:cb:5d:59:79:dd:82:78:f2:c1:bc:ec:e3:a3:40: a6:39:86:79:0c:3d:ef:c8:1e:db:83:d6:8d:d3:25:70: 62:10:27:a5:e7:73:04:5c:a9:df:2c:a7:3f:6c:62:82: 2b:3c:ac:5e:a1:80:c1:1f:6c:48:07:58:13:24:9d:b1: 43:0c:d1:b9:8a:cd:58:87:9e:8f:02:59:bc:a4:08:da Fingerprint (SHA-256): 8F:68:4D:30:14:60:E9:91:F9:F0:D0:BD:6B:95:10:0A:5C:C6:27:2C:70:C2:B1:DD:EB:24:7D:6F:E2:34:B1:C6 Fingerprint (SHA1): B2:91:8A:C7:82:C4:BD:06:76:E9:FD:00:AF:E8:48:55:03:FC:6F:3D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 5000 at Mon Mar 20 20:18:04 UTC 2023 kill -USR1 5000 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 5000 killed at Mon Mar 20 20:18:04 UTC 2023 httpserv starting at Mon Mar 20 20:18:04 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 20:18:04 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 5201 >/dev/null 2>/dev/null httpserv with PID 5201 found at Mon Mar 20 20:18:04 UTC 2023 httpserv with PID 5201 started at Mon Mar 20 20:18:04 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9897 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201716 (0x1315e3f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Mar 20 20:17:16 2023 Not After : Mon Mar 20 20:17:16 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:d7:47:fb:07:27:ae:c6:df:45:9f:71:f9:c6:80:d1: 65:ec:9d:b7:ce:87:bc:10:67:72:dd:a8:df:fc:40:71: 89:03:a8:a9:32:13:48:4a:b5:36:45:ac:05:94:a8:4b: de:26:59:bf:9e:bd:8e:52:d6:9e:3f:85:b8:5f:1f:84: 96:5b:14:db:d5:2d:f6:53:9e:06:2b:c8:1a:dd:b3:bc: 2e:52:57:ba:a5:4b:16:77:35:3e:2a:1a:66:75:3f:df: a4:70:43:11:c9:d0:66:ad:0e:6b:27:f7:65:5e:4b:bc: a4:da:5e:a8:f3:0a:d7:92:9a:90:da:c5:eb:a5:a0:f0: 21:92:5b:bf:38:29:90:46:03:92:c7:de:64:cd:e3:c5: 38:65:bd:c1:f6:15:9c:ee:d5:63:e2:cb:8c:b1:69:37: 98:83:4d:30:4b:69:37:9a:32:39:74:87:39:04:86:1c: 73:73:db:1b:75:fc:aa:5e:a9:61:c2:24:83:a2:1b:a4: d2:b5:b1:1e:fd:ea:8c:7b:2d:f9:d2:96:bd:4e:19:96: 45:d1:0c:46:6c:32:a0:8c:8a:dc:a9:39:0f:92:6b:60: 67:87:f7:ca:f8:83:33:fe:b3:16:26:f4:3a:dc:c0:28: a8:ac:5d:e7:9a:85:83:8d:0c:bb:58:7e:f1:56:f5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:c5:a1:b1:af:0a:6c:b1:73:ec:3d:ae:c6:d7:a2:6d: 08:92:06:a2:05:d4:60:67:60:94:58:b2:57:00:85:fd: 90:6b:6e:aa:2e:23:d4:e2:41:da:1f:9a:b5:dc:64:4f: 69:db:0f:25:5e:bd:ac:01:16:35:0d:3f:de:63:55:a6: 5a:52:11:9f:ff:28:1e:c4:a6:c2:7d:13:69:ac:86:88: 73:8b:7c:f6:b7:60:d8:34:ed:3b:e9:09:85:5d:ff:a2: 7b:3d:42:3c:77:00:4c:b6:32:58:ea:30:3e:48:58:78: d6:cf:67:78:6b:72:0b:fa:be:37:bb:80:a9:d8:be:13: 67:ca:15:12:03:b4:56:16:18:d0:60:31:83:48:2f:0e: bb:98:17:a9:c9:64:66:b8:70:9d:e6:75:10:0e:a1:d4: 04:b4:ec:ab:81:c5:4c:a3:57:d8:86:3e:a8:72:58:7c: ff:cb:cb:5d:59:79:dd:82:78:f2:c1:bc:ec:e3:a3:40: a6:39:86:79:0c:3d:ef:c8:1e:db:83:d6:8d:d3:25:70: 62:10:27:a5:e7:73:04:5c:a9:df:2c:a7:3f:6c:62:82: 2b:3c:ac:5e:a1:80:c1:1f:6c:48:07:58:13:24:9d:b1: 43:0c:d1:b9:8a:cd:58:87:9e:8f:02:59:bc:a4:08:da Fingerprint (SHA-256): 8F:68:4D:30:14:60:E9:91:F9:F0:D0:BD:6B:95:10:0A:5C:C6:27:2C:70:C2:B1:DD:EB:24:7D:6F:E2:34:B1:C6 Fingerprint (SHA1): B2:91:8A:C7:82:C4:BD:06:76:E9:FD:00:AF:E8:48:55:03:FC:6F:3D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 5201 at Mon Mar 20 20:18:05 UTC 2023 kill -USR1 5201 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 5201 killed at Mon Mar 20 20:18:05 UTC 2023 httpserv starting at Mon Mar 20 20:18:05 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 20:18:05 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 5422 >/dev/null 2>/dev/null httpserv with PID 5422 found at Mon Mar 20 20:18:05 UTC 2023 httpserv with PID 5422 started at Mon Mar 20 20:18:05 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201733 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201734 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320201735 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320201736 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 320201737 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201734 (0x1315e406) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:68:f6:f5:9b:6c:c0:f9:5a:c1:f0:2e:42:d2:fc:05: 1a:bd:4d:a2:2e:9e:41:c1:0e:10:4d:d2:23:d5:d1:58: 96:a3:e4:36:d6:a7:3b:69:46:4b:26:4d:16:33:03:35: 82:af:6c:71:88:a2:9e:6e:c4:14:cb:34:6e:cb:e0:e6: 3e:6d:9b:a5:d1:98:d6:25:f4:9f:71:41:cb:cc:63:5e: 1b:e4:d5:7e:94:5d:69:98:74:7b:4f:00:d4:be:00:1c: 32:09:a8:a5:8f:eb:96:05:f3:3d:e0:f9:36:6a:1f:7a: 35:f6:e8:00:fc:90:dc:26:fc:4b:a4:f0:9b:6e:09:58: 42:cc:b4:11:a7:ac:ed:18:06:f4:ac:58:85:1f:1f:75: 7a:d0:60:ce:d5:da:11:92:74:67:41:0d:8e:f1:63:9f: 20:1b:f2:c1:34:54:ee:5c:0b:94:ad:c5:66:84:f1:44: 1a:6c:3f:b1:f0:4e:91:16:44:ec:46:dd:3b:5e:f9:52: 49:6f:08:2f:6a:3d:95:fc:a1:5f:3a:6b:10:b9:af:6b: 44:f4:25:ee:97:23:7b:31:f7:ff:ee:4e:eb:b3:73:e4: c0:92:0f:70:fa:36:66:6c:b5:48:a3:51:e0:b5:32:5f: 1e:2c:a3:da:2f:22:62:67:4b:47:2c:13:7b:ec:94:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:cd:89:fa:30:2b:c0:2c:26:c0:73:a7:dd:8f:71:46: 72:d2:ac:f4:27:4b:18:96:65:25:37:db:63:ef:8e:a1: a2:69:39:12:20:ea:f8:2e:46:3c:76:66:91:6c:b7:61: 09:b0:51:96:6f:8d:de:e4:93:8c:70:4e:70:7a:5b:b9: 52:06:86:57:95:d8:24:4c:00:fb:6a:8b:03:86:fd:8c: c1:d0:d2:e1:f4:cb:7e:1c:fd:03:04:d7:a9:e4:8a:a7: fb:ac:3f:7f:d1:58:d1:d2:9a:d6:21:d9:07:f8:c2:8d: ac:51:3b:c7:95:f4:d8:38:99:2c:c6:49:e4:b7:26:79: 09:a3:ea:3e:73:9c:70:de:4f:d7:78:0c:39:78:79:91: 66:64:0b:26:f3:11:ae:af:51:32:0e:87:d4:ac:ba:93: 33:49:b8:3d:c9:aa:90:b6:88:aa:22:9b:36:8b:67:69: 36:27:27:aa:d6:41:fd:8c:2f:44:99:d9:1b:c1:dc:84: e0:e0:b5:04:dc:ef:f9:eb:3a:42:e4:ed:fc:47:76:07: db:83:26:86:ca:81:25:9b:6e:aa:1e:12:4a:87:f8:86: cf:05:fd:c8:07:30:43:bb:9c:a8:8d:67:7d:c7:1f:df: b7:5e:bd:5e:ed:37:20:76:63:d3:30:e1:6a:33:81:ef Fingerprint (SHA-256): 35:30:AF:67:04:F8:3F:F1:63:85:D4:CC:B1:3C:B3:AD:0F:28:BE:E3:66:98:50:CC:01:E6:24:E2:35:21:32:97 Fingerprint (SHA1): 31:B5:08:3F:BC:20:CB:26:DD:22:62:8B:FD:F0:CC:54:87:08:7B:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201733 (0x1315e405) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:61:33:b8:e8:15:87:d8:11:72:51:c8:18:60:ac:d4: 14:dc:d6:2b:a7:80:05:68:9c:34:4e:bc:7f:c8:d2:7f: 63:24:bd:e1:c4:88:59:9d:2c:70:38:1f:40:1b:80:bc: bc:03:8e:9d:e2:cd:f8:53:09:ac:0e:75:d7:74:e7:47: e9:71:62:34:f7:9c:d7:9d:39:09:fd:03:35:ee:32:27: 92:07:7f:3a:3c:d5:5d:c8:dc:93:09:95:65:01:18:78: 66:d2:ad:5c:68:f4:b2:38:a0:aa:0c:67:70:9b:95:1c: b7:a5:ef:8a:6f:7f:fc:31:ed:b8:70:7a:66:ee:42:bb: 0c:84:54:91:a7:11:95:e0:53:61:44:25:fe:0d:66:1c: d8:7b:fc:49:8e:e1:21:59:3f:17:d2:09:58:37:8f:db: 47:fe:27:a6:49:bb:12:85:95:d4:3b:7b:ca:a8:68:b0: f1:95:9f:03:05:75:90:f8:fb:4b:4c:8d:2a:e8:ed:d7: 66:69:f4:70:46:e1:40:c4:5b:07:ff:12:46:c4:bc:79: bf:d4:de:6d:5b:5f:bd:0c:bd:1e:1d:b7:d4:e5:78:f0: 6b:cd:11:67:62:14:6a:1c:bd:64:37:70:c2:98:76:6b: 07:db:1b:3a:a5:55:28:64:81:eb:df:56:c5:0e:29:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:06:f6:79:e2:9b:01:45:f0:2a:d9:39:d3:62:1d:c8: cb:4e:b6:71:e7:3c:71:1d:fc:20:71:82:56:69:cd:84: 1e:ab:5f:c7:72:12:ca:98:9d:f4:ff:cc:e1:e6:e8:76: e4:81:37:78:d5:ec:a8:bc:85:bd:5e:58:b4:0f:65:a8: 40:9b:9d:21:42:ca:64:6c:d4:e5:00:ea:0b:13:3e:df: 0a:40:5b:5b:f6:9d:e0:92:2c:a3:7a:92:f3:63:fe:90: 42:8c:69:91:5d:00:b1:2f:d0:02:43:8c:52:23:06:7d: 2e:7b:f5:22:bb:63:12:bb:7b:be:94:29:85:09:da:7c: f7:80:4f:ad:b9:8c:bb:6b:74:c0:6f:0d:ae:c1:15:fb: 55:16:44:39:0a:11:a4:5e:da:c8:ce:24:32:56:4e:6c: e2:c8:97:57:d2:c0:1c:a6:57:a4:27:a3:74:0c:f4:c8: c8:cf:d4:37:06:d6:30:8d:45:a9:95:07:8e:df:2b:0e: 2e:2c:fd:a5:81:82:c9:21:67:aa:36:30:ed:c9:f9:b0: 97:fa:6f:55:b5:66:23:f2:51:e4:60:db:10:1b:94:c7: a2:75:d6:f8:5f:c2:67:b4:47:52:36:f4:23:1b:8e:14: 7a:22:8a:70:c7:66:e5:47:52:94:7c:a8:77:ae:20:b4 Fingerprint (SHA-256): C6:44:0D:9E:F4:7D:39:9F:EA:0B:12:2B:DF:FF:05:64:F0:45:9B:05:BA:27:28:CD:A2:D2:9E:7C:99:AE:FE:65 Fingerprint (SHA1): BE:D2:20:6C:49:BA:BA:02:CC:0E:2F:B3:49:91:A6:5A:44:09:E2:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201733 (0x1315e405) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:61:33:b8:e8:15:87:d8:11:72:51:c8:18:60:ac:d4: 14:dc:d6:2b:a7:80:05:68:9c:34:4e:bc:7f:c8:d2:7f: 63:24:bd:e1:c4:88:59:9d:2c:70:38:1f:40:1b:80:bc: bc:03:8e:9d:e2:cd:f8:53:09:ac:0e:75:d7:74:e7:47: e9:71:62:34:f7:9c:d7:9d:39:09:fd:03:35:ee:32:27: 92:07:7f:3a:3c:d5:5d:c8:dc:93:09:95:65:01:18:78: 66:d2:ad:5c:68:f4:b2:38:a0:aa:0c:67:70:9b:95:1c: b7:a5:ef:8a:6f:7f:fc:31:ed:b8:70:7a:66:ee:42:bb: 0c:84:54:91:a7:11:95:e0:53:61:44:25:fe:0d:66:1c: d8:7b:fc:49:8e:e1:21:59:3f:17:d2:09:58:37:8f:db: 47:fe:27:a6:49:bb:12:85:95:d4:3b:7b:ca:a8:68:b0: f1:95:9f:03:05:75:90:f8:fb:4b:4c:8d:2a:e8:ed:d7: 66:69:f4:70:46:e1:40:c4:5b:07:ff:12:46:c4:bc:79: bf:d4:de:6d:5b:5f:bd:0c:bd:1e:1d:b7:d4:e5:78:f0: 6b:cd:11:67:62:14:6a:1c:bd:64:37:70:c2:98:76:6b: 07:db:1b:3a:a5:55:28:64:81:eb:df:56:c5:0e:29:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:06:f6:79:e2:9b:01:45:f0:2a:d9:39:d3:62:1d:c8: cb:4e:b6:71:e7:3c:71:1d:fc:20:71:82:56:69:cd:84: 1e:ab:5f:c7:72:12:ca:98:9d:f4:ff:cc:e1:e6:e8:76: e4:81:37:78:d5:ec:a8:bc:85:bd:5e:58:b4:0f:65:a8: 40:9b:9d:21:42:ca:64:6c:d4:e5:00:ea:0b:13:3e:df: 0a:40:5b:5b:f6:9d:e0:92:2c:a3:7a:92:f3:63:fe:90: 42:8c:69:91:5d:00:b1:2f:d0:02:43:8c:52:23:06:7d: 2e:7b:f5:22:bb:63:12:bb:7b:be:94:29:85:09:da:7c: f7:80:4f:ad:b9:8c:bb:6b:74:c0:6f:0d:ae:c1:15:fb: 55:16:44:39:0a:11:a4:5e:da:c8:ce:24:32:56:4e:6c: e2:c8:97:57:d2:c0:1c:a6:57:a4:27:a3:74:0c:f4:c8: c8:cf:d4:37:06:d6:30:8d:45:a9:95:07:8e:df:2b:0e: 2e:2c:fd:a5:81:82:c9:21:67:aa:36:30:ed:c9:f9:b0: 97:fa:6f:55:b5:66:23:f2:51:e4:60:db:10:1b:94:c7: a2:75:d6:f8:5f:c2:67:b4:47:52:36:f4:23:1b:8e:14: 7a:22:8a:70:c7:66:e5:47:52:94:7c:a8:77:ae:20:b4 Fingerprint (SHA-256): C6:44:0D:9E:F4:7D:39:9F:EA:0B:12:2B:DF:FF:05:64:F0:45:9B:05:BA:27:28:CD:A2:D2:9E:7C:99:AE:FE:65 Fingerprint (SHA1): BE:D2:20:6C:49:BA:BA:02:CC:0E:2F:B3:49:91:A6:5A:44:09:E2:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201734 (0x1315e406) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:68:f6:f5:9b:6c:c0:f9:5a:c1:f0:2e:42:d2:fc:05: 1a:bd:4d:a2:2e:9e:41:c1:0e:10:4d:d2:23:d5:d1:58: 96:a3:e4:36:d6:a7:3b:69:46:4b:26:4d:16:33:03:35: 82:af:6c:71:88:a2:9e:6e:c4:14:cb:34:6e:cb:e0:e6: 3e:6d:9b:a5:d1:98:d6:25:f4:9f:71:41:cb:cc:63:5e: 1b:e4:d5:7e:94:5d:69:98:74:7b:4f:00:d4:be:00:1c: 32:09:a8:a5:8f:eb:96:05:f3:3d:e0:f9:36:6a:1f:7a: 35:f6:e8:00:fc:90:dc:26:fc:4b:a4:f0:9b:6e:09:58: 42:cc:b4:11:a7:ac:ed:18:06:f4:ac:58:85:1f:1f:75: 7a:d0:60:ce:d5:da:11:92:74:67:41:0d:8e:f1:63:9f: 20:1b:f2:c1:34:54:ee:5c:0b:94:ad:c5:66:84:f1:44: 1a:6c:3f:b1:f0:4e:91:16:44:ec:46:dd:3b:5e:f9:52: 49:6f:08:2f:6a:3d:95:fc:a1:5f:3a:6b:10:b9:af:6b: 44:f4:25:ee:97:23:7b:31:f7:ff:ee:4e:eb:b3:73:e4: c0:92:0f:70:fa:36:66:6c:b5:48:a3:51:e0:b5:32:5f: 1e:2c:a3:da:2f:22:62:67:4b:47:2c:13:7b:ec:94:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:cd:89:fa:30:2b:c0:2c:26:c0:73:a7:dd:8f:71:46: 72:d2:ac:f4:27:4b:18:96:65:25:37:db:63:ef:8e:a1: a2:69:39:12:20:ea:f8:2e:46:3c:76:66:91:6c:b7:61: 09:b0:51:96:6f:8d:de:e4:93:8c:70:4e:70:7a:5b:b9: 52:06:86:57:95:d8:24:4c:00:fb:6a:8b:03:86:fd:8c: c1:d0:d2:e1:f4:cb:7e:1c:fd:03:04:d7:a9:e4:8a:a7: fb:ac:3f:7f:d1:58:d1:d2:9a:d6:21:d9:07:f8:c2:8d: ac:51:3b:c7:95:f4:d8:38:99:2c:c6:49:e4:b7:26:79: 09:a3:ea:3e:73:9c:70:de:4f:d7:78:0c:39:78:79:91: 66:64:0b:26:f3:11:ae:af:51:32:0e:87:d4:ac:ba:93: 33:49:b8:3d:c9:aa:90:b6:88:aa:22:9b:36:8b:67:69: 36:27:27:aa:d6:41:fd:8c:2f:44:99:d9:1b:c1:dc:84: e0:e0:b5:04:dc:ef:f9:eb:3a:42:e4:ed:fc:47:76:07: db:83:26:86:ca:81:25:9b:6e:aa:1e:12:4a:87:f8:86: cf:05:fd:c8:07:30:43:bb:9c:a8:8d:67:7d:c7:1f:df: b7:5e:bd:5e:ed:37:20:76:63:d3:30:e1:6a:33:81:ef Fingerprint (SHA-256): 35:30:AF:67:04:F8:3F:F1:63:85:D4:CC:B1:3C:B3:AD:0F:28:BE:E3:66:98:50:CC:01:E6:24:E2:35:21:32:97 Fingerprint (SHA1): 31:B5:08:3F:BC:20:CB:26:DD:22:62:8B:FD:F0:CC:54:87:08:7B:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201734 (0x1315e406) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:68:f6:f5:9b:6c:c0:f9:5a:c1:f0:2e:42:d2:fc:05: 1a:bd:4d:a2:2e:9e:41:c1:0e:10:4d:d2:23:d5:d1:58: 96:a3:e4:36:d6:a7:3b:69:46:4b:26:4d:16:33:03:35: 82:af:6c:71:88:a2:9e:6e:c4:14:cb:34:6e:cb:e0:e6: 3e:6d:9b:a5:d1:98:d6:25:f4:9f:71:41:cb:cc:63:5e: 1b:e4:d5:7e:94:5d:69:98:74:7b:4f:00:d4:be:00:1c: 32:09:a8:a5:8f:eb:96:05:f3:3d:e0:f9:36:6a:1f:7a: 35:f6:e8:00:fc:90:dc:26:fc:4b:a4:f0:9b:6e:09:58: 42:cc:b4:11:a7:ac:ed:18:06:f4:ac:58:85:1f:1f:75: 7a:d0:60:ce:d5:da:11:92:74:67:41:0d:8e:f1:63:9f: 20:1b:f2:c1:34:54:ee:5c:0b:94:ad:c5:66:84:f1:44: 1a:6c:3f:b1:f0:4e:91:16:44:ec:46:dd:3b:5e:f9:52: 49:6f:08:2f:6a:3d:95:fc:a1:5f:3a:6b:10:b9:af:6b: 44:f4:25:ee:97:23:7b:31:f7:ff:ee:4e:eb:b3:73:e4: c0:92:0f:70:fa:36:66:6c:b5:48:a3:51:e0:b5:32:5f: 1e:2c:a3:da:2f:22:62:67:4b:47:2c:13:7b:ec:94:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:cd:89:fa:30:2b:c0:2c:26:c0:73:a7:dd:8f:71:46: 72:d2:ac:f4:27:4b:18:96:65:25:37:db:63:ef:8e:a1: a2:69:39:12:20:ea:f8:2e:46:3c:76:66:91:6c:b7:61: 09:b0:51:96:6f:8d:de:e4:93:8c:70:4e:70:7a:5b:b9: 52:06:86:57:95:d8:24:4c:00:fb:6a:8b:03:86:fd:8c: c1:d0:d2:e1:f4:cb:7e:1c:fd:03:04:d7:a9:e4:8a:a7: fb:ac:3f:7f:d1:58:d1:d2:9a:d6:21:d9:07:f8:c2:8d: ac:51:3b:c7:95:f4:d8:38:99:2c:c6:49:e4:b7:26:79: 09:a3:ea:3e:73:9c:70:de:4f:d7:78:0c:39:78:79:91: 66:64:0b:26:f3:11:ae:af:51:32:0e:87:d4:ac:ba:93: 33:49:b8:3d:c9:aa:90:b6:88:aa:22:9b:36:8b:67:69: 36:27:27:aa:d6:41:fd:8c:2f:44:99:d9:1b:c1:dc:84: e0:e0:b5:04:dc:ef:f9:eb:3a:42:e4:ed:fc:47:76:07: db:83:26:86:ca:81:25:9b:6e:aa:1e:12:4a:87:f8:86: cf:05:fd:c8:07:30:43:bb:9c:a8:8d:67:7d:c7:1f:df: b7:5e:bd:5e:ed:37:20:76:63:d3:30:e1:6a:33:81:ef Fingerprint (SHA-256): 35:30:AF:67:04:F8:3F:F1:63:85:D4:CC:B1:3C:B3:AD:0F:28:BE:E3:66:98:50:CC:01:E6:24:E2:35:21:32:97 Fingerprint (SHA1): 31:B5:08:3F:BC:20:CB:26:DD:22:62:8B:FD:F0:CC:54:87:08:7B:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201734 (0x1315e406) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:68:f6:f5:9b:6c:c0:f9:5a:c1:f0:2e:42:d2:fc:05: 1a:bd:4d:a2:2e:9e:41:c1:0e:10:4d:d2:23:d5:d1:58: 96:a3:e4:36:d6:a7:3b:69:46:4b:26:4d:16:33:03:35: 82:af:6c:71:88:a2:9e:6e:c4:14:cb:34:6e:cb:e0:e6: 3e:6d:9b:a5:d1:98:d6:25:f4:9f:71:41:cb:cc:63:5e: 1b:e4:d5:7e:94:5d:69:98:74:7b:4f:00:d4:be:00:1c: 32:09:a8:a5:8f:eb:96:05:f3:3d:e0:f9:36:6a:1f:7a: 35:f6:e8:00:fc:90:dc:26:fc:4b:a4:f0:9b:6e:09:58: 42:cc:b4:11:a7:ac:ed:18:06:f4:ac:58:85:1f:1f:75: 7a:d0:60:ce:d5:da:11:92:74:67:41:0d:8e:f1:63:9f: 20:1b:f2:c1:34:54:ee:5c:0b:94:ad:c5:66:84:f1:44: 1a:6c:3f:b1:f0:4e:91:16:44:ec:46:dd:3b:5e:f9:52: 49:6f:08:2f:6a:3d:95:fc:a1:5f:3a:6b:10:b9:af:6b: 44:f4:25:ee:97:23:7b:31:f7:ff:ee:4e:eb:b3:73:e4: c0:92:0f:70:fa:36:66:6c:b5:48:a3:51:e0:b5:32:5f: 1e:2c:a3:da:2f:22:62:67:4b:47:2c:13:7b:ec:94:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:cd:89:fa:30:2b:c0:2c:26:c0:73:a7:dd:8f:71:46: 72:d2:ac:f4:27:4b:18:96:65:25:37:db:63:ef:8e:a1: a2:69:39:12:20:ea:f8:2e:46:3c:76:66:91:6c:b7:61: 09:b0:51:96:6f:8d:de:e4:93:8c:70:4e:70:7a:5b:b9: 52:06:86:57:95:d8:24:4c:00:fb:6a:8b:03:86:fd:8c: c1:d0:d2:e1:f4:cb:7e:1c:fd:03:04:d7:a9:e4:8a:a7: fb:ac:3f:7f:d1:58:d1:d2:9a:d6:21:d9:07:f8:c2:8d: ac:51:3b:c7:95:f4:d8:38:99:2c:c6:49:e4:b7:26:79: 09:a3:ea:3e:73:9c:70:de:4f:d7:78:0c:39:78:79:91: 66:64:0b:26:f3:11:ae:af:51:32:0e:87:d4:ac:ba:93: 33:49:b8:3d:c9:aa:90:b6:88:aa:22:9b:36:8b:67:69: 36:27:27:aa:d6:41:fd:8c:2f:44:99:d9:1b:c1:dc:84: e0:e0:b5:04:dc:ef:f9:eb:3a:42:e4:ed:fc:47:76:07: db:83:26:86:ca:81:25:9b:6e:aa:1e:12:4a:87:f8:86: cf:05:fd:c8:07:30:43:bb:9c:a8:8d:67:7d:c7:1f:df: b7:5e:bd:5e:ed:37:20:76:63:d3:30:e1:6a:33:81:ef Fingerprint (SHA-256): 35:30:AF:67:04:F8:3F:F1:63:85:D4:CC:B1:3C:B3:AD:0F:28:BE:E3:66:98:50:CC:01:E6:24:E2:35:21:32:97 Fingerprint (SHA1): 31:B5:08:3F:BC:20:CB:26:DD:22:62:8B:FD:F0:CC:54:87:08:7B:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201733 (0x1315e405) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:61:33:b8:e8:15:87:d8:11:72:51:c8:18:60:ac:d4: 14:dc:d6:2b:a7:80:05:68:9c:34:4e:bc:7f:c8:d2:7f: 63:24:bd:e1:c4:88:59:9d:2c:70:38:1f:40:1b:80:bc: bc:03:8e:9d:e2:cd:f8:53:09:ac:0e:75:d7:74:e7:47: e9:71:62:34:f7:9c:d7:9d:39:09:fd:03:35:ee:32:27: 92:07:7f:3a:3c:d5:5d:c8:dc:93:09:95:65:01:18:78: 66:d2:ad:5c:68:f4:b2:38:a0:aa:0c:67:70:9b:95:1c: b7:a5:ef:8a:6f:7f:fc:31:ed:b8:70:7a:66:ee:42:bb: 0c:84:54:91:a7:11:95:e0:53:61:44:25:fe:0d:66:1c: d8:7b:fc:49:8e:e1:21:59:3f:17:d2:09:58:37:8f:db: 47:fe:27:a6:49:bb:12:85:95:d4:3b:7b:ca:a8:68:b0: f1:95:9f:03:05:75:90:f8:fb:4b:4c:8d:2a:e8:ed:d7: 66:69:f4:70:46:e1:40:c4:5b:07:ff:12:46:c4:bc:79: bf:d4:de:6d:5b:5f:bd:0c:bd:1e:1d:b7:d4:e5:78:f0: 6b:cd:11:67:62:14:6a:1c:bd:64:37:70:c2:98:76:6b: 07:db:1b:3a:a5:55:28:64:81:eb:df:56:c5:0e:29:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:06:f6:79:e2:9b:01:45:f0:2a:d9:39:d3:62:1d:c8: cb:4e:b6:71:e7:3c:71:1d:fc:20:71:82:56:69:cd:84: 1e:ab:5f:c7:72:12:ca:98:9d:f4:ff:cc:e1:e6:e8:76: e4:81:37:78:d5:ec:a8:bc:85:bd:5e:58:b4:0f:65:a8: 40:9b:9d:21:42:ca:64:6c:d4:e5:00:ea:0b:13:3e:df: 0a:40:5b:5b:f6:9d:e0:92:2c:a3:7a:92:f3:63:fe:90: 42:8c:69:91:5d:00:b1:2f:d0:02:43:8c:52:23:06:7d: 2e:7b:f5:22:bb:63:12:bb:7b:be:94:29:85:09:da:7c: f7:80:4f:ad:b9:8c:bb:6b:74:c0:6f:0d:ae:c1:15:fb: 55:16:44:39:0a:11:a4:5e:da:c8:ce:24:32:56:4e:6c: e2:c8:97:57:d2:c0:1c:a6:57:a4:27:a3:74:0c:f4:c8: c8:cf:d4:37:06:d6:30:8d:45:a9:95:07:8e:df:2b:0e: 2e:2c:fd:a5:81:82:c9:21:67:aa:36:30:ed:c9:f9:b0: 97:fa:6f:55:b5:66:23:f2:51:e4:60:db:10:1b:94:c7: a2:75:d6:f8:5f:c2:67:b4:47:52:36:f4:23:1b:8e:14: 7a:22:8a:70:c7:66:e5:47:52:94:7c:a8:77:ae:20:b4 Fingerprint (SHA-256): C6:44:0D:9E:F4:7D:39:9F:EA:0B:12:2B:DF:FF:05:64:F0:45:9B:05:BA:27:28:CD:A2:D2:9E:7C:99:AE:FE:65 Fingerprint (SHA1): BE:D2:20:6C:49:BA:BA:02:CC:0E:2F:B3:49:91:A6:5A:44:09:E2:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201733 (0x1315e405) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:18:06 2023 Not After : Mon Mar 20 20:18:06 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:61:33:b8:e8:15:87:d8:11:72:51:c8:18:60:ac:d4: 14:dc:d6:2b:a7:80:05:68:9c:34:4e:bc:7f:c8:d2:7f: 63:24:bd:e1:c4:88:59:9d:2c:70:38:1f:40:1b:80:bc: bc:03:8e:9d:e2:cd:f8:53:09:ac:0e:75:d7:74:e7:47: e9:71:62:34:f7:9c:d7:9d:39:09:fd:03:35:ee:32:27: 92:07:7f:3a:3c:d5:5d:c8:dc:93:09:95:65:01:18:78: 66:d2:ad:5c:68:f4:b2:38:a0:aa:0c:67:70:9b:95:1c: b7:a5:ef:8a:6f:7f:fc:31:ed:b8:70:7a:66:ee:42:bb: 0c:84:54:91:a7:11:95:e0:53:61:44:25:fe:0d:66:1c: d8:7b:fc:49:8e:e1:21:59:3f:17:d2:09:58:37:8f:db: 47:fe:27:a6:49:bb:12:85:95:d4:3b:7b:ca:a8:68:b0: f1:95:9f:03:05:75:90:f8:fb:4b:4c:8d:2a:e8:ed:d7: 66:69:f4:70:46:e1:40:c4:5b:07:ff:12:46:c4:bc:79: bf:d4:de:6d:5b:5f:bd:0c:bd:1e:1d:b7:d4:e5:78:f0: 6b:cd:11:67:62:14:6a:1c:bd:64:37:70:c2:98:76:6b: 07:db:1b:3a:a5:55:28:64:81:eb:df:56:c5:0e:29:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:06:f6:79:e2:9b:01:45:f0:2a:d9:39:d3:62:1d:c8: cb:4e:b6:71:e7:3c:71:1d:fc:20:71:82:56:69:cd:84: 1e:ab:5f:c7:72:12:ca:98:9d:f4:ff:cc:e1:e6:e8:76: e4:81:37:78:d5:ec:a8:bc:85:bd:5e:58:b4:0f:65:a8: 40:9b:9d:21:42:ca:64:6c:d4:e5:00:ea:0b:13:3e:df: 0a:40:5b:5b:f6:9d:e0:92:2c:a3:7a:92:f3:63:fe:90: 42:8c:69:91:5d:00:b1:2f:d0:02:43:8c:52:23:06:7d: 2e:7b:f5:22:bb:63:12:bb:7b:be:94:29:85:09:da:7c: f7:80:4f:ad:b9:8c:bb:6b:74:c0:6f:0d:ae:c1:15:fb: 55:16:44:39:0a:11:a4:5e:da:c8:ce:24:32:56:4e:6c: e2:c8:97:57:d2:c0:1c:a6:57:a4:27:a3:74:0c:f4:c8: c8:cf:d4:37:06:d6:30:8d:45:a9:95:07:8e:df:2b:0e: 2e:2c:fd:a5:81:82:c9:21:67:aa:36:30:ed:c9:f9:b0: 97:fa:6f:55:b5:66:23:f2:51:e4:60:db:10:1b:94:c7: a2:75:d6:f8:5f:c2:67:b4:47:52:36:f4:23:1b:8e:14: 7a:22:8a:70:c7:66:e5:47:52:94:7c:a8:77:ae:20:b4 Fingerprint (SHA-256): C6:44:0D:9E:F4:7D:39:9F:EA:0B:12:2B:DF:FF:05:64:F0:45:9B:05:BA:27:28:CD:A2:D2:9E:7C:99:AE:FE:65 Fingerprint (SHA1): BE:D2:20:6C:49:BA:BA:02:CC:0E:2F:B3:49:91:A6:5A:44:09:E2:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201738 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201739 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201740 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201741 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201742 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201743 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201744 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201745 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201746 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 320201747 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 320201748 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 320201749 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 320201750 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 320201751 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 320201752 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 320201753 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 320201754 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 320201755 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 320201756 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 320201757 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 320201758 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 320201759 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201760 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201738 (0x1315e40a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 20 20:18:11 2023 Not After : Mon Mar 20 20:18:11 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:38:3c:f6:43:47:67:fd:14:97:c6:7b:7b:df:52:3c: c8:db:3b:11:9e:e3:98:41:fa:02:b6:b8:5e:37:23:78: fa:5d:7e:15:61:54:b1:8a:47:5d:0a:6b:69:04:20:a4: df:1b:11:fe:c6:c8:8b:de:35:2d:f6:96:ee:f6:8c:ef: f6:32:4d:b7:6f:51:41:a0:08:91:07:26:f0:d2:94:cc: 1c:c6:be:01:df:a1:ca:88:87:2f:d2:41:81:d8:38:8a: 71:ef:06:c3:c5:0d:75:5d:2f:bb:fe:e8:d1:3e:09:20: 0d:d2:65:17:f5:d8:eb:45:2b:fd:c6:b4:09:2c:56:9a: 26:a6:be:f1:5b:ed:3b:72:53:81:6a:14:5e:37:e9:33: 7a:d3:6c:7d:fc:75:79:17:05:4b:4a:fa:0d:95:a1:4f: 09:43:ef:dc:a1:3e:18:82:3c:62:59:23:1b:92:e8:43: 2a:08:c5:13:f2:9a:88:6b:3e:2c:71:87:a4:0a:c0:aa: fc:06:c2:46:ae:bb:97:ab:1b:38:19:ed:07:55:3c:29: 7a:4f:99:51:b4:17:b3:cb:f3:6f:0c:12:d8:bf:e4:b1: 40:d9:cd:ad:cd:dc:e2:c1:1c:ff:40:8f:82:5c:3b:84: a6:2f:3b:03:b4:c3:44:6a:9b:81:39:48:0f:dc:51:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:82:c4:54:d0:54:17:bc:df:2c:24:49:07:e8:ce:67: 3d:f7:f5:a5:5c:8f:d7:49:6f:e1:ce:db:ca:11:59:4b: 7e:27:fa:26:6d:62:38:7e:cb:f1:2f:4f:fa:71:7a:b1: b0:b9:0a:4b:10:f5:9a:7f:88:54:6a:b5:33:21:c7:bb: d2:14:0b:94:de:0d:93:90:35:de:70:82:21:31:4e:f4: 01:14:f6:d9:72:7a:5a:11:67:14:62:d3:27:52:ab:03: c0:fa:8c:00:ea:e3:3a:81:d3:8b:94:c8:1c:ca:71:24: 76:c1:c3:53:33:9b:18:72:af:cf:87:bc:8e:6c:78:c7: 85:2b:57:51:72:04:15:ef:e7:c6:43:e9:66:2c:b2:c5: fe:aa:99:9d:34:3a:3f:88:1e:ed:85:48:16:66:da:4c: 90:47:f6:10:ba:c9:74:95:ca:e3:b3:23:de:0e:82:b7: d4:0b:14:90:5d:dc:50:92:4f:31:14:7b:ca:8d:cb:d2: 99:7f:4b:fc:7f:2d:0d:80:23:14:ea:ee:38:b1:3c:5a: db:ef:2d:1a:12:75:8d:c4:3d:6f:a8:41:3b:57:50:44: 28:11:5c:f8:3a:48:22:2b:b7:79:ae:02:0a:b4:4f:e7: c0:b0:26:84:8b:18:6a:42:c6:88:a4:0f:a8:7d:5a:26 Fingerprint (SHA-256): 7D:6C:20:21:17:E6:5C:C2:80:4C:E1:0A:84:3C:D5:C7:01:45:15:2C:EF:2D:A6:0B:5F:9F:78:D5:9E:40:58:8E Fingerprint (SHA1): B0:13:18:28:77:C3:1D:CD:9B:0E:04:74:AF:D7:1B:1D:28:D3:39:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201739 (0x1315e40b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 20 20:18:11 2023 Not After : Mon Mar 20 20:18:11 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:7c:ac:14:be:74:5d:d9:37:3b:e3:18:b0:48:30:4c: cf:aa:da:21:9e:c0:6a:d7:c4:ca:1c:94:41:d4:53:2b: d6:4d:bf:f7:2d:71:76:46:e2:69:87:6c:db:ed:2b:24: ca:f0:59:03:e7:85:cc:31:9e:70:03:ea:a9:a5:83:98: 05:5f:f3:3f:a8:39:07:a7:25:1a:e8:da:41:0b:14:fc: 59:52:a5:62:03:e3:a5:c4:51:bc:17:c1:0e:8c:1e:b3: da:f8:f0:38:0d:13:0b:99:44:52:0c:e5:d1:ae:1f:2d: 72:61:b2:40:8e:83:b3:1d:72:f6:f3:aa:8e:74:08:3c: a3:cc:4b:9d:8a:78:b7:76:2e:6f:b9:0a:57:9c:26:5a: 11:7b:da:62:10:83:28:31:8c:43:95:76:c7:34:f9:fb: 52:53:3f:40:c0:cb:0a:91:21:23:5a:77:dd:b1:d3:0e: 6e:e9:5b:48:e5:9f:3c:bd:1c:42:7c:2c:fb:16:df:c9: d0:4f:a9:cf:ef:ae:28:4e:f1:b6:36:0f:99:d6:1b:88: ab:fb:b9:83:01:65:66:49:a3:c3:fb:f1:a0:ef:9a:93: 3f:b7:45:a9:b4:00:c3:4a:a0:f7:82:5f:fc:7a:1d:ed: dd:0b:27:14:6d:9f:94:31:2a:7f:3b:16:1d:a8:19:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:5b:a2:35:13:7a:66:5a:f0:a5:f3:9b:aa:0b:45:4a: e4:b9:b9:a3:8b:53:80:73:a4:4a:4c:e4:d9:e3:cc:af: 0a:aa:ed:c3:bd:74:3b:1f:f7:92:f1:15:b6:28:11:37: 0e:ae:f3:01:67:68:69:6a:72:45:ec:82:27:ab:8d:8c: 72:52:7d:a3:e1:33:e2:ce:61:0d:b7:2e:b0:d0:77:00: 2e:df:4c:74:b7:0b:88:db:6c:d9:55:c9:22:c9:02:ac: c2:08:c5:76:38:5f:b5:2f:a4:6f:81:64:42:d4:c7:cb: 87:d2:58:66:e0:d4:00:cf:71:71:e4:ef:b9:a8:d5:14: cf:d2:15:cf:57:0d:68:99:00:ca:2b:30:71:6a:cd:24: e9:a6:49:d2:2a:0e:a3:bf:b6:dd:1b:62:a3:7f:0b:cd: 15:18:49:24:fa:a9:71:1e:71:cb:3e:02:31:ac:70:12: 58:61:8b:14:22:d1:bf:9a:9d:01:dc:c3:a4:db:1e:97: 4f:ce:73:83:07:0c:cb:be:4f:73:80:c1:80:e6:a2:cd: 53:39:58:89:34:f1:17:79:d5:d4:0a:8e:19:1c:a8:a4: 3d:34:84:a8:bf:9b:2a:2f:d0:68:b0:8a:77:34:02:54: e4:6b:78:89:82:13:f1:ed:dd:23:47:dd:bf:9b:22:b6 Fingerprint (SHA-256): 2B:8B:EC:35:8F:BD:13:1E:FB:82:53:2A:62:DB:86:33:5F:2B:A2:31:17:B6:BB:28:E5:E8:6D:B6:AA:5D:F1:D7 Fingerprint (SHA1): 58:F9:92:A7:A7:F3:04:EA:7E:56:86:CE:F8:25:47:45:F4:33:63:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201740 (0x1315e40c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 20 20:18:12 2023 Not After : Mon Mar 20 20:18:12 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:ee:c2:d2:6a:d6:13:65:71:a9:b8:1a:a6:43:49:a3: 2e:53:6f:f6:84:db:45:34:af:c9:98:34:58:b1:99:88: 32:58:16:58:9c:3b:ee:a1:c2:40:9d:1f:9b:6d:09:5e: f8:bd:8e:7a:7b:20:a4:21:69:49:75:53:58:f4:21:1d: 4a:f0:d3:3e:65:e1:3c:2f:71:d5:62:fd:61:9a:65:d4: 90:e8:7f:51:9b:ff:83:e0:a6:67:ba:d9:c6:f9:9c:41: 2e:6d:09:16:f6:85:0c:7d:d9:13:27:6c:4a:a4:fd:78: 24:72:82:10:d7:08:b4:b0:b4:48:0f:4d:dc:ab:86:ef: 2e:29:9c:e3:2b:74:eb:fc:cf:76:e9:e2:0f:d4:13:37: ea:d2:76:a7:bc:c9:c9:99:1e:fb:cd:4b:3c:3a:ad:fe: 82:a1:e6:96:eb:fe:1b:72:1c:b1:26:94:7c:6f:3e:c3: 19:44:1d:35:58:09:2b:c4:1f:bc:7f:78:10:0c:09:07: 3d:15:a3:e1:c7:a0:31:59:5d:86:c2:44:df:6d:d1:14: 80:3b:e6:29:43:03:8a:c5:0b:1c:07:66:3f:51:d9:6a: cf:fd:a4:64:b1:ea:f3:6f:ae:35:3c:a2:1a:74:08:8e: 3a:e0:5a:5b:02:78:c3:27:00:f6:02:fa:82:50:0c:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:24:45:b6:ba:7f:d4:2f:87:2d:cb:38:01:75:c3:00: 67:87:41:9c:9b:24:3b:45:62:99:4a:1c:d5:90:a9:d2: cb:7d:b1:21:6c:5f:2f:e5:f0:b3:76:8d:b9:6f:9e:02: 5d:cc:42:8b:5e:3e:37:1a:52:27:84:b1:23:dc:2d:9a: 1c:56:ed:4b:ab:8e:c7:6e:c3:8f:1c:ec:9e:27:7e:53: 5f:3e:38:46:39:b5:4d:29:de:65:96:83:47:54:95:40: 1d:54:70:4f:89:ec:8b:20:66:63:b5:b0:8a:91:86:d8: 29:67:fe:10:d0:39:35:8c:f3:a7:ec:b1:14:9a:4e:96: 65:f8:4f:b8:b7:5b:93:7f:9e:68:44:38:6b:cd:8d:9e: d0:d9:18:f2:0e:27:16:eb:91:20:54:b8:7e:16:4e:ae: 44:07:29:16:26:40:bb:f5:ca:53:93:04:f1:bf:e6:0c: 9f:50:d1:68:19:62:85:aa:8a:9f:65:32:53:5a:26:78: 78:3a:e6:4f:aa:34:75:26:7d:2b:c6:df:dd:e9:60:d8: 28:46:2d:bf:37:fe:2a:a9:e8:d7:50:56:20:36:0a:47: ea:9d:35:ad:12:2d:0f:69:66:2d:2a:6c:35:cc:3d:7b: 5d:0e:fb:fd:9e:c3:33:c2:31:ca:c0:40:8e:f5:e0:ed Fingerprint (SHA-256): 3A:A4:08:D3:7E:AF:A1:B0:F3:F0:A8:22:4B:49:E6:F8:57:39:8B:8E:E6:11:94:7F:79:17:7C:32:49:62:0B:6F Fingerprint (SHA1): A5:F7:99:EA:A2:0B:50:26:28:6E:04:51:34:DF:9B:3E:F7:4F:31:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201741 (0x1315e40d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 20 20:18:13 2023 Not After : Mon Mar 20 20:18:13 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:10:06:b1:7d:e1:e7:7e:c1:83:dc:30:04:ba:42:e9: 5a:0b:0f:31:bd:ed:a8:b2:7d:62:6c:f2:1f:a2:c8:93: 8e:9a:a3:20:fe:28:ce:64:f6:e5:dd:f8:40:c4:b5:65: e8:5c:b6:d1:ed:02:ea:36:ec:27:68:57:4d:c9:17:e0: 14:13:8d:49:a9:fe:0f:67:91:03:eb:0a:dc:b2:1b:71: 2b:64:87:43:80:fc:27:a2:72:01:da:17:e4:b3:c5:8d: 6e:1a:1a:45:4f:eb:d1:f4:4c:f0:2f:a3:55:1f:2a:1c: d7:ad:9f:f4:2f:69:e7:4c:75:aa:4d:d6:0d:5d:b2:67: 50:3b:6f:ec:f7:ac:2c:50:aa:c0:0a:89:64:2e:9e:fb: 44:9f:39:d9:fd:32:80:bf:97:3f:36:80:cb:16:25:6a: 41:39:02:69:ab:ad:ee:43:8c:a5:7a:51:84:12:a2:34: 32:4d:a2:75:6a:fb:02:78:02:b9:c2:19:3e:5e:3b:24: 61:ff:ab:6b:f4:ca:06:3c:72:ed:81:21:04:d4:5a:4e: d4:fc:0b:1e:2e:17:cb:a7:9f:89:3f:d9:2d:c1:ff:41: 3f:a6:59:95:47:4b:70:94:b3:ea:0b:71:b4:d1:ae:18: 0b:f7:9c:9f:34:17:a2:44:b5:a7:1d:dd:03:93:dd:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:27:dc:55:8a:9f:2d:49:9c:a4:5d:6c:c3:b3:b2:4a: 70:0d:3d:12:b7:da:5f:2b:d6:92:41:1d:9f:e3:9d:01: bc:ec:ff:83:4c:a7:f8:a2:fe:ad:b2:98:73:12:1d:73: 54:56:5c:60:05:7d:a7:31:25:9f:42:cb:44:32:b6:fb: 05:0c:27:3c:14:04:1d:d3:ac:bd:74:4c:06:ef:f0:60: f2:e6:8c:46:b9:86:f7:e5:0b:9a:ee:a7:8d:d7:62:66: 20:13:2a:99:2f:7e:37:a8:54:30:53:f1:fa:d9:29:44: d0:74:5b:d5:86:24:0c:c8:a3:8d:20:76:9c:48:e5:a1: 6d:9b:b1:1c:8a:93:96:48:54:c1:65:b4:6d:4f:34:97: 09:2c:56:4b:1d:e4:92:28:97:7c:d5:18:ba:f9:5d:90: b9:cb:3a:07:15:4b:e1:15:75:73:20:38:ea:b0:0f:ea: e2:82:cd:e2:28:30:ef:02:45:9f:cc:a3:07:d8:5b:25: 52:ed:09:c2:ef:d4:43:a2:26:76:f9:b7:f2:95:bb:02: b2:18:e0:d2:dc:1c:ce:3b:7a:e6:aa:92:b7:f1:c8:97: 2f:58:28:b9:f5:95:3d:90:a5:12:90:09:70:96:ef:f0: 9f:51:19:52:e7:aa:f2:27:e5:94:77:0c:43:6e:6b:4e Fingerprint (SHA-256): 76:B4:75:AA:33:C5:61:B0:E2:55:86:F2:23:DB:59:B8:BD:F2:50:0B:1B:58:6C:D5:A7:D2:01:5E:FE:27:9E:1E Fingerprint (SHA1): 82:CE:5A:7A:2B:5A:B4:91:27:49:25:FE:67:FF:66:E2:60:40:2A:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201742 (0x1315e40e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 20 20:18:13 2023 Not After : Mon Mar 20 20:18:13 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:88:a9:7b:d8:12:1f:d1:e8:9a:6c:b9:b7:59:f2:d2: a6:f8:e9:ab:78:19:d0:cc:58:c1:40:f2:a3:c1:3c:78: f0:ae:9f:67:0f:32:00:0e:02:86:8c:05:cd:7d:51:38: 9d:37:29:49:81:e8:04:75:e1:fa:45:b1:bd:03:46:d7: bd:27:c3:49:b9:67:3d:84:a2:36:06:c1:a4:08:2b:bb: 18:be:e0:20:e6:0a:4e:fa:8a:dc:7f:61:57:ff:a7:43: 0e:5d:76:9e:7f:38:6b:af:ae:0b:25:03:c3:92:23:36: 6c:14:43:b9:4a:7d:96:33:af:07:e3:9b:fb:73:d2:51: e0:a3:6d:1d:df:ad:11:55:f9:b2:a4:4e:df:16:e4:b1: 07:5f:69:44:f7:11:e5:c2:94:fb:c6:ac:94:94:5f:ca: 35:de:aa:7c:56:6d:1a:07:ea:b1:3d:69:a8:7d:d5:95: 79:09:f8:21:be:b2:7f:1f:b0:da:31:f2:b4:2b:85:66: b0:ef:c1:9f:39:0b:5c:63:da:1d:5a:de:e0:69:8a:fa: 26:f8:22:0d:26:4f:4f:72:d9:da:76:ce:5e:d4:44:57: 44:06:07:43:3d:2d:72:ae:53:75:c2:1f:92:84:63:e3: 07:d4:08:04:c1:18:f3:92:c8:11:c3:54:69:26:58:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:26:1b:8a:17:be:3a:72:4f:2d:26:41:90:3c:23:22: 33:00:01:79:e3:df:b0:01:e2:d6:93:e2:1e:ae:52:6f: dd:16:ef:15:af:43:1e:a7:42:00:64:47:73:49:20:67: 3c:63:bc:4c:31:ce:98:7e:d1:1a:25:21:d3:b3:52:c9: cd:d1:92:39:4f:9b:92:59:ce:5d:c6:4e:77:16:f1:9f: aa:4d:10:76:d3:b9:88:45:23:4a:01:3d:bb:64:01:07: b4:c4:5e:56:9c:1b:64:6e:0c:70:b8:c2:33:c4:4f:c4: d3:6b:cd:54:15:1e:4b:93:7a:66:1f:6c:40:d2:24:28: 46:4a:eb:2a:2d:f2:e5:7a:f4:03:7f:11:09:dd:fa:fa: a2:87:9c:d4:80:b8:23:20:4a:e6:f6:74:00:05:0d:c4: f4:31:31:2e:0a:8d:0f:e8:3f:d7:57:79:81:20:fa:f6: 6b:05:72:df:63:47:57:2c:23:6d:a3:36:1e:de:f7:83: 50:7e:ea:df:e8:fc:30:dc:db:8a:95:ed:75:98:ef:de: cd:b5:57:00:fe:5c:79:5d:44:1f:de:07:37:12:18:e2: a0:01:56:eb:ef:c4:b0:8a:6f:dd:b5:6b:67:0b:3f:e1: f5:1c:08:96:47:66:d1:75:be:b3:b4:8f:76:c9:7c:5c Fingerprint (SHA-256): 0D:83:2F:AA:2F:9D:90:EB:82:2A:A6:85:B8:70:ED:C7:52:C4:6D:EE:96:67:17:45:E1:F1:A1:BE:65:F2:75:15 Fingerprint (SHA1): 4C:82:89:2B:74:E7:61:71:AC:B9:4E:16:29:3D:FE:35:FF:45:F9:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201743 (0x1315e40f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 20 20:18:14 2023 Not After : Mon Mar 20 20:18:14 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:cd:15:2d:c3:3a:e6:a4:b4:f4:f0:b5:03:ad:04:df: 3d:c6:c0:aa:a8:fd:8f:85:f9:5e:10:c5:35:14:33:e3: 95:65:43:ef:0c:65:24:7b:de:16:22:eb:08:cc:fd:4e: ca:09:0e:af:32:03:b9:ee:07:9b:0c:eb:ad:ef:3e:d5: e5:a7:77:13:b5:46:07:ca:6b:50:bb:89:39:d8:fc:af: 48:5c:d1:ab:eb:3f:2e:d1:3a:0b:9c:4c:19:e4:83:14: 85:a2:7a:9b:be:ae:4a:79:fb:bb:d2:38:61:80:c1:2b: 10:c4:9e:4c:9e:fb:73:20:12:47:60:ba:cd:5d:12:f8: 34:4c:64:46:98:c6:2a:aa:fe:98:ab:f2:28:5b:d2:81: 01:5d:e3:8f:d1:d0:aa:1c:f0:e9:85:72:9a:38:53:38: bf:3b:e1:ac:2f:dd:70:12:f3:ff:3a:df:e6:1c:31:c0: 20:9f:83:8a:2c:b4:f2:8d:95:d3:a5:ef:61:27:97:68: 50:86:90:ae:a0:cc:bb:9a:8b:aa:42:b4:0b:d4:68:c6: 76:ff:2c:2b:01:fe:41:0c:32:60:67:79:7b:e8:a3:de: 90:7c:22:b9:05:44:a9:0d:d2:10:c4:5b:6f:a9:97:0b: 90:bf:ef:19:7b:d2:28:12:c8:36:2f:a3:c5:a9:eb:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:c4:4f:42:a7:48:ca:d0:63:79:83:fe:57:54:00:85: ce:99:41:d9:a1:3c:10:92:4f:2d:df:be:ce:a2:27:34: e3:1d:d6:e7:b4:a6:f9:5a:c2:5a:7d:1a:72:9d:67:c5: 87:06:37:65:72:da:33:97:c3:0c:fb:fd:1d:20:42:5d: eb:f3:3a:41:8c:63:e2:94:73:e9:f2:2e:e5:ed:42:ce: f7:a2:8f:59:63:e0:b8:3a:58:38:b8:bc:d0:49:5f:bc: d8:85:60:1e:cb:34:92:d8:19:b1:bc:31:af:ba:18:97: 4e:65:b2:37:96:de:cf:11:b8:cf:8e:f8:a6:a0:d9:78: e1:de:e1:69:f8:08:ba:ba:e8:ed:97:2d:bd:66:ce:1c: 97:af:8a:5f:9f:85:41:a2:45:35:ed:91:15:83:36:ce: 0f:8d:00:b3:f0:0c:f6:03:c7:32:18:25:1d:f6:3e:23: b7:68:bd:1e:d9:df:b9:ab:3c:98:d3:cf:a2:76:66:5f: c9:39:b1:12:7a:26:38:5e:14:17:2d:ec:3c:f4:65:40: ca:1d:0d:76:da:88:96:7f:fe:62:ae:bd:d3:99:c1:74: b9:26:4c:72:9d:0f:a1:d3:bf:8b:25:be:71:ca:ab:34: 21:0d:de:68:32:8a:ed:28:0f:b7:dd:fc:31:48:b3:85 Fingerprint (SHA-256): A1:1F:21:0A:C3:97:B7:C9:A3:AD:48:25:33:AA:63:6C:FE:5F:4B:C8:58:01:5A:7A:55:54:2A:AC:87:6E:D9:70 Fingerprint (SHA1): 48:BA:4E:A8:EA:0B:8B:B8:0A:E5:86:8E:CA:4F:EC:CD:A2:A1:38:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201744 (0x1315e410) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 20 20:18:15 2023 Not After : Mon Mar 20 20:18:15 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:2f:8f:84:d3:9f:65:cb:84:81:b6:1e:ef:93:3b:a7: d7:7a:12:c2:19:dc:9c:f9:26:cb:c1:bf:4a:57:b5:97: e6:76:ad:ef:f1:4e:4b:96:ff:db:e1:d8:85:39:05:f0: c1:5e:ef:28:ae:37:f2:97:3a:e4:73:c5:fd:57:f8:80: 4e:a9:e9:fd:a6:2e:be:8c:44:07:7b:d5:52:2f:ed:54: 36:50:85:26:00:31:92:ac:37:11:39:3b:d3:97:bf:7d: cc:2f:5f:5a:ad:e9:fd:d4:6d:ab:c2:1a:51:7e:c9:72: de:e1:26:3c:8b:32:7e:78:49:95:22:e2:81:e2:b0:54: 1e:f5:3b:8a:e1:4f:2c:72:d4:f2:37:3e:b6:3f:8b:09: e6:9d:d0:e2:fb:33:3e:cd:0f:8d:5a:82:15:f3:a7:f0: 37:9c:d8:08:6e:ce:e6:b9:54:28:99:f1:2f:b0:4c:8c: f8:69:aa:dc:a4:9f:22:d9:c9:c8:e6:10:69:71:bb:cd: eb:1e:ca:c5:d9:c3:ca:bd:b3:b6:af:97:fa:8e:f5:41: 43:e2:cc:b6:9c:52:85:82:f5:34:1c:dc:aa:91:39:0b: 3a:2e:b9:6e:34:3e:62:85:b3:75:d7:44:e7:3b:e9:6a: 42:0a:b5:8b:fa:90:fc:65:d9:29:57:7e:9f:14:07:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:63:2e:05:86:ed:cd:bc:7c:bd:59:43:81:eb:62:75: 42:12:7b:1e:8b:69:36:be:b7:19:90:e5:a8:d8:35:e5: 5a:c6:1e:44:3c:15:bf:d8:e0:60:46:9c:5e:ad:22:7d: 87:78:48:3e:d1:39:5d:01:96:30:70:78:66:3d:48:66: 02:19:78:7c:ca:19:d1:92:52:03:86:dc:c7:aa:2d:82: c5:ed:07:ed:6a:5a:8b:97:44:cc:85:2b:47:cf:d1:46: 0f:d4:b5:33:be:d6:aa:78:44:be:7c:66:57:84:87:6f: fb:ad:92:db:28:51:bb:48:1b:83:22:f9:52:7d:0a:06: e4:81:f9:54:1b:58:2e:83:d3:d0:03:6c:ca:8a:f2:98: 35:69:ef:03:6a:35:7f:18:4c:db:ec:b5:04:6f:e4:f9: 51:29:02:24:59:30:9a:a5:da:41:dc:bd:9f:bc:0d:81: 84:6b:60:fa:94:cd:24:ed:09:b8:9d:e1:a7:a8:60:2e: e7:44:dd:1c:07:e5:fb:cf:68:84:b5:16:62:bf:b7:fe: 9d:74:45:b1:b7:ed:68:56:15:ab:13:1c:01:b1:45:f4: 9a:ff:67:ae:aa:c1:56:03:b9:e7:05:54:49:74:7a:2e: ea:a6:d5:0d:c0:7c:53:57:2f:13:b0:86:e9:e7:b5:35 Fingerprint (SHA-256): 5D:3C:9B:75:13:A8:D8:61:A5:82:89:46:0E:5F:96:81:1E:9F:88:5C:0F:02:E0:66:EC:AB:AE:71:F8:81:16:31 Fingerprint (SHA1): 76:5C:A5:41:E4:89:5E:C8:B1:04:E1:95:9B:8A:54:2B:67:38:CB:25 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201745 (0x1315e411) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 20 20:18:15 2023 Not After : Mon Mar 20 20:18:15 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:15:f1:e3:41:8f:b4:7b:c3:52:01:1e:9d:ff:25:b5: ea:75:c4:d8:ce:5a:f1:03:a5:d3:00:ff:f5:80:d1:46: e2:1f:5f:bc:2a:8a:5b:db:1b:c5:a7:f5:c9:92:64:7e: 23:b0:d6:d0:3f:9b:34:72:14:90:25:00:e9:0e:68:19: 05:82:89:0a:20:e6:8b:aa:a1:d8:3f:93:6a:84:e6:e3: 24:1b:b5:a6:45:db:db:df:a8:6b:33:da:b1:38:5e:fe: c0:b9:c8:78:5a:c3:d1:86:95:f4:f0:b2:c1:0a:0a:71: e8:98:1a:84:8b:a1:9a:38:7d:c1:2f:2b:18:f9:e8:1f: 2d:2d:02:73:fa:2f:13:1e:f7:7b:77:a2:cc:3d:4b:66: 9a:3b:84:ae:4f:f6:81:1f:2c:28:16:1e:9d:8d:26:92: 95:80:63:bf:83:f1:2a:73:72:15:e2:87:10:ad:90:a4: f7:91:6e:24:35:51:ab:80:a2:3b:c6:f9:9f:d6:33:6c: 53:49:3d:c2:6a:e5:86:f8:fa:c7:12:bc:a7:b9:a6:b1: 27:6b:94:f7:5e:d7:b2:f1:96:d2:c1:25:91:e5:77:00: a6:12:fa:77:ca:93:ff:9d:43:66:a9:a7:22:2d:68:f2: c5:e4:77:de:26:74:68:58:b5:d4:95:ce:95:47:d4:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:be:b4:12:19:3e:ad:c3:90:a6:2d:ab:66:2b:d4:df: 84:21:28:79:24:8e:a9:03:59:6a:dc:cc:dd:ef:35:11: e8:bc:36:6f:8b:c4:0c:7a:e5:34:32:c2:18:fd:cf:ad: 9c:85:8d:8d:85:93:a5:82:4c:8e:ea:83:b8:b1:dc:3b: aa:71:61:1e:51:63:18:43:89:97:4a:c9:8e:3f:96:c9: ec:50:18:f1:ce:16:b9:91:64:9f:a1:25:b6:bd:b9:b4: 80:a5:e3:fe:87:3b:79:0e:f4:87:d4:b6:ee:0e:4a:0f: 8b:d4:5b:8f:5d:e1:69:d7:c3:e9:df:f0:0f:37:1d:96: 40:3a:d9:a1:a0:bd:84:37:ec:19:6d:21:98:4c:ec:3d: a9:3e:6e:b5:87:ab:56:14:7b:18:4e:d4:98:c4:12:7c: 00:05:af:04:31:ae:e1:92:7c:1b:e1:25:61:5e:01:e4: c9:88:d0:43:91:7f:07:17:37:15:2d:21:be:db:dd:b9: de:49:d2:db:1d:bc:92:44:ee:77:32:9e:cb:26:53:58: 03:aa:f8:69:1f:a1:b2:76:6e:de:84:e3:42:16:66:75: 4d:81:3d:81:b0:32:f7:19:33:b8:d5:f1:3c:7d:dd:81: b4:db:18:21:58:e2:a1:35:8a:93:e9:25:d3:89:06:b3 Fingerprint (SHA-256): F2:99:EC:3A:A6:68:D9:6D:CF:D8:71:6F:AA:EB:34:44:81:E5:19:17:F7:B7:18:6A:84:EC:27:F2:68:49:B3:D2 Fingerprint (SHA1): AA:89:9F:E0:A4:9E:C5:79:08:51:7E:60:9C:B7:84:34:A0:EC:23:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201746 (0x1315e412) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 20 20:18:16 2023 Not After : Mon Mar 20 20:18:16 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:b3:12:83:aa:37:bf:0d:8f:af:7b:1a:07:24:ff:a8: ca:b1:00:c1:c2:7c:63:bf:d7:e7:bb:8d:82:fb:f8:bb: 0f:35:ca:8a:9a:20:11:6e:db:c2:0d:ec:3a:73:b0:61: 53:ed:a2:4b:8d:96:1e:71:7d:9a:b9:37:03:f9:3e:36: 4d:f5:f5:26:82:10:8f:d9:07:11:4b:1c:5c:64:02:dd: f3:fd:d2:d5:60:fb:72:b9:47:24:3e:fd:18:a7:92:68: bf:6b:b1:e0:e5:ad:bb:a0:1e:4a:b1:87:2a:ea:f4:1c: ae:f2:a7:98:54:09:63:77:c1:91:be:50:8b:81:34:41: ac:e4:e4:50:13:2d:ea:2d:87:b6:70:db:aa:9d:30:07: fb:65:89:2e:87:bb:c1:75:23:47:c2:e2:4e:56:34:0f: 92:15:fc:9d:72:bb:06:fa:33:87:6d:bb:05:e5:b3:ca: 19:4e:25:70:50:90:22:0b:fb:d2:7c:29:94:73:9c:17: 13:27:72:17:9a:57:cc:5e:85:e9:db:2d:a9:b9:78:c8: 73:57:42:6b:e9:a6:44:24:ee:17:bf:d5:e4:d8:a9:4b: 80:2c:c6:7c:06:4a:c2:fe:0f:86:95:d2:d5:4b:e2:6e: 49:66:ab:7f:07:0c:37:72:df:fe:f7:5a:c4:e3:47:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:65:21:39:9a:f7:0f:ff:bd:21:1a:a6:39:5a:28:7f: b0:09:87:86:08:d0:60:ec:82:37:c1:97:8f:56:10:a1: 13:37:16:76:24:72:0c:47:55:2f:5b:b9:ee:a2:50:6f: cd:28:50:91:54:ab:cc:1e:6a:59:62:8f:4c:13:d9:5f: 22:69:73:02:d6:8f:c9:8d:3e:ce:f5:16:54:ef:01:be: 01:42:bc:75:06:94:20:ff:0b:30:21:39:3c:9a:cc:8c: 43:7e:66:30:e6:60:f7:bc:83:12:36:9c:96:20:59:fa: 3d:b7:d2:d2:4b:d1:21:04:a2:93:78:8e:d3:f0:aa:87: 48:cb:e1:9e:68:7d:ac:6f:75:88:33:8d:fa:8d:dd:0f: df:fa:0e:72:3a:0e:25:f8:48:15:9d:a1:89:16:e9:cc: 70:1c:b7:d0:6e:3a:1d:45:29:7b:5a:a1:d6:d5:96:2d: 4f:90:fb:78:5d:42:6f:4d:9b:57:47:89:6a:8c:c2:c2: 10:c3:b0:97:db:c6:9a:81:e3:95:2d:e2:99:94:7d:4b: a7:7d:d5:e6:c1:47:3a:b9:71:49:26:80:ef:6f:62:05: c7:69:1d:60:3e:7a:0e:26:4a:4a:6b:96:74:e7:9d:5f: 3f:26:96:b4:dc:f8:63:68:ab:2a:38:1e:9b:f6:ff:38 Fingerprint (SHA-256): 8A:1F:F0:35:46:49:19:A3:45:7B:3F:5C:1E:21:5E:99:BE:42:49:1C:D1:DA:52:B8:9E:9B:C0:9D:4C:96:42:C7 Fingerprint (SHA1): 76:47:02:05:96:80:87:87:E3:DC:3F:0F:2F:D5:40:82:3C:7C:D9:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201761 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201762 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201763 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320201764 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201761 (0x1315e421) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:23 2023 Not After : Mon Mar 20 20:18:23 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:d8:9c:4f:f6:de:43:9e:4d:a4:82:37:13:8a:26:2a: 3e:c8:76:83:86:17:b0:92:c4:79:0f:52:5a:a5:ab:09: 63:bd:2b:7e:3d:c0:a7:c8:79:b1:04:98:3d:4d:e0:6b: d0:35:e1:f8:d8:eb:1d:bc:19:5f:7f:d8:5d:8c:5f:77: 0e:9a:16:b6:dc:ec:f8:3f:13:6f:b0:0e:ec:6d:db:7e: 41:dc:57:cb:a1:a3:ef:9b:54:4c:de:ad:53:29:f9:33: ce:bc:82:10:bd:2e:90:fc:52:12:29:46:10:18:c8:a3: 0c:a1:34:a2:91:2f:c6:a4:4e:8e:e9:56:5b:d2:36:85: 50:54:05:4a:1b:f4:0d:ec:25:f6:d9:93:67:a9:3e:12: 77:4f:51:c8:dd:ba:f9:35:1a:c2:f3:8a:46:45:f2:97: 12:9d:92:21:3c:8c:59:0d:96:d4:e5:28:4a:07:fa:75: 98:9e:3f:da:5e:da:8c:44:fe:33:b8:62:c4:4c:80:31: 93:88:76:0d:c0:c2:6c:3e:37:a1:19:86:95:67:09:af: e8:56:56:a8:3f:87:cd:99:1e:25:25:da:17:3e:28:99: ac:5e:7a:db:77:43:4d:14:0a:90:38:9e:9e:7c:3f:b0: 1d:31:dc:cf:f4:ec:b2:46:8f:a8:58:a5:27:5d:d7:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:91:78:79:bc:26:f5:62:c7:83:6d:47:2a:87:58:61: ee:0c:94:55:da:cb:81:fc:40:d3:dd:b0:ee:c0:eb:db: fc:33:91:5e:51:94:ed:c3:6a:a1:a9:4f:02:15:c3:90: b6:b5:08:1d:37:e5:5b:1b:86:8f:62:da:45:e0:23:32: 75:7c:16:bd:14:5b:d6:44:9c:56:0a:a9:43:82:3f:85: c4:61:38:0d:bf:0a:d7:0c:34:b8:2a:4c:86:4f:5e:dd: 11:af:bb:d3:91:ed:96:12:56:65:46:35:df:49:c2:d2: 55:05:91:6c:16:d0:66:63:44:e1:82:c2:cb:15:60:79: 8a:69:41:28:c4:4b:49:e0:f0:91:68:e5:8c:71:34:8e: 8d:4a:dc:28:d1:09:e0:3f:f6:5e:ba:0b:36:4c:ea:91: 88:37:0a:ff:bd:23:ee:cc:83:62:43:15:c3:3a:c5:d0: 26:c9:2b:a5:46:f2:c5:ed:17:7f:ca:48:8b:b4:76:6c: e3:3b:8c:16:f3:0b:48:4c:b4:81:46:ab:22:8f:c3:24: 99:d8:68:94:2b:b3:68:d3:93:5a:dd:7d:64:ac:b2:d8: 0b:9a:4b:9d:ad:33:ad:ab:e2:24:f4:41:9f:6e:74:66: 54:fc:62:75:07:53:a6:b1:3d:b5:73:2b:26:ae:35:3d Fingerprint (SHA-256): 0C:E6:5E:EA:85:71:95:0F:6D:88:20:05:4E:98:24:77:6D:17:9A:F4:6D:1F:18:9E:B7:5C:DE:70:2D:8A:F9:3E Fingerprint (SHA1): 64:63:13:C2:FD:06:79:2B:F6:38:D5:24:1A:CB:0A:78:A3:CE:1C:CB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201762 (0x1315e422) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:24 2023 Not After : Mon Mar 20 20:18:24 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:46:3a:e1:7a:61:d1:cc:68:3e:8b:c0:2b:f6:fb:f8: 44:25:00:08:f5:05:de:17:68:e1:15:11:7c:0c:1e:bc: 33:12:7a:bc:0a:1d:dc:8a:36:91:9c:4f:d3:a9:91:f2: 30:94:7a:02:7d:e4:8d:46:0f:3b:05:9d:09:6b:5a:dd: 07:02:85:d2:14:36:51:b5:f1:83:f1:52:6a:af:db:c5: d1:c3:7e:0b:73:3b:04:3e:0e:6e:b5:7c:ca:e0:1a:b8: c3:fd:66:bf:2e:0b:c3:cf:bf:90:a7:44:f3:91:95:ad: 52:5c:e3:0a:de:e6:97:56:e7:c2:54:db:ce:11:17:3d: 05:1a:48:6f:5a:7d:67:56:5e:41:9f:d4:cf:b2:2e:54: 05:09:98:85:ae:81:ad:54:5d:49:9e:89:60:f5:9d:e3: f6:bc:e0:ae:78:50:2d:4d:c4:a2:91:aa:98:57:ee:f8: b2:15:63:5d:26:8b:e1:15:03:45:98:71:c5:5c:27:fe: 06:ec:3e:9a:32:b5:84:3d:20:78:4e:ef:68:c4:9c:39: ce:f2:03:23:7f:0e:21:a2:1f:74:5c:a9:c3:d9:67:39: 98:d9:49:1a:4f:7e:ab:23:8f:3c:d1:08:3d:33:62:72: ee:fd:7b:e5:dc:4b:8b:13:10:e6:39:53:2f:89:9b:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:68:ef:b3:83:af:09:a3:0d:08:4b:85:3f:d5:59:5f: f4:15:77:25:2a:70:2b:7e:f1:10:55:08:7a:66:b2:22: f3:04:58:d3:06:f9:76:04:d7:5d:ad:67:97:be:7a:b3: b0:67:4e:7e:2c:28:62:de:44:e6:5e:c2:3d:e5:c2:b8: c1:2e:a4:dc:9b:55:58:5e:0b:e9:8d:9a:4c:f7:a9:bb: 2a:e0:65:94:79:1b:9b:1b:f8:44:31:d3:b1:a2:ff:d5: 89:94:dc:1a:87:29:2b:e6:bf:e2:60:a7:69:b4:ef:96: 5b:73:fe:3e:f9:aa:71:ff:ef:ab:63:62:86:87:df:5f: 8b:ce:f6:17:78:59:69:e5:51:e4:92:af:9d:ee:49:c0: f1:74:fb:52:d0:d3:50:a6:28:d8:04:fb:73:26:3e:95: eb:3c:b4:45:84:5c:d5:bd:44:f8:a4:c4:29:5e:4c:00: 0b:b0:1f:0c:9b:c9:85:25:80:f3:0c:b0:ce:5b:7b:59: 6c:42:24:f3:ad:8b:db:bf:8e:b8:fe:af:77:ee:b4:da: 31:41:bd:86:60:4e:85:bf:71:73:3c:c3:6a:a9:bc:d5: 47:10:19:4b:3d:ab:f9:72:a6:08:98:cc:91:d0:98:55: 88:03:c1:24:4b:75:20:a8:e2:d4:6d:8b:5f:2e:5c:e0 Fingerprint (SHA-256): AC:B7:C9:33:F6:AD:39:4E:4F:2B:F6:93:EC:8B:F2:62:9C:A1:D7:B4:D8:BD:CF:96:DA:D0:E7:AF:9E:A0:32:04 Fingerprint (SHA1): 56:79:4C:BD:12:F3:3A:95:F3:73:C3:9D:F5:4D:09:EA:A7:6C:2D:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201763 (0x1315e423) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:18:25 2023 Not After : Mon Mar 20 20:18:25 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:0e:4a:7c:79:16:8b:b6:79:24:85:66:81:96:7f:4a: 77:86:cc:c7:00:74:c3:8d:1b:dc:c5:cb:2e:07:f9:99: 6a:73:4a:ca:fa:1f:f5:f7:98:d8:6d:86:9b:7a:c0:0b: 61:72:de:41:66:2b:7c:65:db:40:3c:11:cd:e4:20:19: c0:0e:cb:e2:e7:cc:76:07:61:ba:31:d6:93:1b:ea:a4: 92:1b:1f:78:c8:01:15:3a:30:a1:7b:11:06:5a:2a:33: 68:50:89:82:8a:95:e0:92:63:23:c9:b1:94:5e:f0:ac: 31:f7:09:02:5d:b3:64:7b:29:25:0c:86:b6:79:9e:c9: af:02:ca:41:6e:cc:55:26:a0:8b:bd:10:25:ee:2f:7d: 20:66:b1:49:91:5b:33:01:99:e4:0b:b4:c5:5e:63:90: 3c:8d:e1:94:51:9a:ea:d6:ea:3a:01:64:47:42:eb:25: 6d:78:70:8b:e0:fa:44:13:cd:8e:2c:38:79:c7:51:e6: af:e3:fa:f7:34:af:56:05:ba:84:9e:e4:4c:62:a6:ee: 71:4b:90:27:7e:ec:ff:a5:5c:5b:54:08:bc:6e:5f:de: 56:41:ee:4b:87:46:10:dc:93:0b:63:88:4a:99:9b:94: 06:77:2a:72:d7:e7:2c:e8:97:6c:ae:fe:5f:89:67:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:6d:e0:75:13:12:0b:89:8b:64:26:1a:d0:d2:5a:fa: ba:ac:87:eb:f8:8a:92:3d:64:bd:25:b3:ec:26:68:4c: 2b:f6:f4:20:3b:98:cd:b4:65:b5:12:38:47:ef:60:13: 8a:16:ca:15:a7:ff:ea:db:9b:12:a8:07:d3:0c:ba:33: 57:8a:8e:94:d6:eb:5a:a8:c2:f1:1a:81:81:51:21:53: 30:c0:2e:73:94:fa:37:88:2d:86:bc:94:50:ca:44:9d: 15:76:83:93:fe:1f:b9:a6:ce:6a:66:24:ec:39:bc:89: 48:b8:6d:6c:71:c8:f8:87:7c:1f:df:10:47:c5:0f:d6: 3c:05:6f:b6:cd:33:dc:72:95:d7:45:e1:8f:0e:44:74: af:c4:86:91:3e:3c:f6:fd:cd:ad:5f:0e:ad:2f:60:ba: 51:a3:65:54:37:ae:63:77:84:30:8c:3e:9a:94:19:94: e6:7b:e8:65:a3:c3:5b:ae:90:b1:47:6a:94:ad:d2:e2: 7b:8e:b7:3e:db:af:31:c2:7e:8f:26:ea:61:ea:da:99: 8b:7c:03:f1:c6:63:9d:f2:d0:09:c3:f2:01:7c:ce:92: 4b:5d:8e:12:48:11:f5:f1:30:41:d0:53:72:56:dd:18: 85:5b:f8:46:ef:a3:be:7f:f6:48:c0:b5:fc:16:ba:d3 Fingerprint (SHA-256): E9:DA:6F:0D:C6:8A:DA:58:2B:48:B5:25:04:EF:23:D0:F8:C2:E5:6B:39:EE:A0:CD:21:E0:A1:8B:AA:89:24:06 Fingerprint (SHA1): AE:FF:04:48:B8:73:F3:BD:3F:63:86:B2:8B:86:77:15:4F:16:05:C0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201761 (0x1315e421) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:23 2023 Not After : Mon Mar 20 20:18:23 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:d8:9c:4f:f6:de:43:9e:4d:a4:82:37:13:8a:26:2a: 3e:c8:76:83:86:17:b0:92:c4:79:0f:52:5a:a5:ab:09: 63:bd:2b:7e:3d:c0:a7:c8:79:b1:04:98:3d:4d:e0:6b: d0:35:e1:f8:d8:eb:1d:bc:19:5f:7f:d8:5d:8c:5f:77: 0e:9a:16:b6:dc:ec:f8:3f:13:6f:b0:0e:ec:6d:db:7e: 41:dc:57:cb:a1:a3:ef:9b:54:4c:de:ad:53:29:f9:33: ce:bc:82:10:bd:2e:90:fc:52:12:29:46:10:18:c8:a3: 0c:a1:34:a2:91:2f:c6:a4:4e:8e:e9:56:5b:d2:36:85: 50:54:05:4a:1b:f4:0d:ec:25:f6:d9:93:67:a9:3e:12: 77:4f:51:c8:dd:ba:f9:35:1a:c2:f3:8a:46:45:f2:97: 12:9d:92:21:3c:8c:59:0d:96:d4:e5:28:4a:07:fa:75: 98:9e:3f:da:5e:da:8c:44:fe:33:b8:62:c4:4c:80:31: 93:88:76:0d:c0:c2:6c:3e:37:a1:19:86:95:67:09:af: e8:56:56:a8:3f:87:cd:99:1e:25:25:da:17:3e:28:99: ac:5e:7a:db:77:43:4d:14:0a:90:38:9e:9e:7c:3f:b0: 1d:31:dc:cf:f4:ec:b2:46:8f:a8:58:a5:27:5d:d7:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:91:78:79:bc:26:f5:62:c7:83:6d:47:2a:87:58:61: ee:0c:94:55:da:cb:81:fc:40:d3:dd:b0:ee:c0:eb:db: fc:33:91:5e:51:94:ed:c3:6a:a1:a9:4f:02:15:c3:90: b6:b5:08:1d:37:e5:5b:1b:86:8f:62:da:45:e0:23:32: 75:7c:16:bd:14:5b:d6:44:9c:56:0a:a9:43:82:3f:85: c4:61:38:0d:bf:0a:d7:0c:34:b8:2a:4c:86:4f:5e:dd: 11:af:bb:d3:91:ed:96:12:56:65:46:35:df:49:c2:d2: 55:05:91:6c:16:d0:66:63:44:e1:82:c2:cb:15:60:79: 8a:69:41:28:c4:4b:49:e0:f0:91:68:e5:8c:71:34:8e: 8d:4a:dc:28:d1:09:e0:3f:f6:5e:ba:0b:36:4c:ea:91: 88:37:0a:ff:bd:23:ee:cc:83:62:43:15:c3:3a:c5:d0: 26:c9:2b:a5:46:f2:c5:ed:17:7f:ca:48:8b:b4:76:6c: e3:3b:8c:16:f3:0b:48:4c:b4:81:46:ab:22:8f:c3:24: 99:d8:68:94:2b:b3:68:d3:93:5a:dd:7d:64:ac:b2:d8: 0b:9a:4b:9d:ad:33:ad:ab:e2:24:f4:41:9f:6e:74:66: 54:fc:62:75:07:53:a6:b1:3d:b5:73:2b:26:ae:35:3d Fingerprint (SHA-256): 0C:E6:5E:EA:85:71:95:0F:6D:88:20:05:4E:98:24:77:6D:17:9A:F4:6D:1F:18:9E:B7:5C:DE:70:2D:8A:F9:3E Fingerprint (SHA1): 64:63:13:C2:FD:06:79:2B:F6:38:D5:24:1A:CB:0A:78:A3:CE:1C:CB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201762 (0x1315e422) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:24 2023 Not After : Mon Mar 20 20:18:24 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:46:3a:e1:7a:61:d1:cc:68:3e:8b:c0:2b:f6:fb:f8: 44:25:00:08:f5:05:de:17:68:e1:15:11:7c:0c:1e:bc: 33:12:7a:bc:0a:1d:dc:8a:36:91:9c:4f:d3:a9:91:f2: 30:94:7a:02:7d:e4:8d:46:0f:3b:05:9d:09:6b:5a:dd: 07:02:85:d2:14:36:51:b5:f1:83:f1:52:6a:af:db:c5: d1:c3:7e:0b:73:3b:04:3e:0e:6e:b5:7c:ca:e0:1a:b8: c3:fd:66:bf:2e:0b:c3:cf:bf:90:a7:44:f3:91:95:ad: 52:5c:e3:0a:de:e6:97:56:e7:c2:54:db:ce:11:17:3d: 05:1a:48:6f:5a:7d:67:56:5e:41:9f:d4:cf:b2:2e:54: 05:09:98:85:ae:81:ad:54:5d:49:9e:89:60:f5:9d:e3: f6:bc:e0:ae:78:50:2d:4d:c4:a2:91:aa:98:57:ee:f8: b2:15:63:5d:26:8b:e1:15:03:45:98:71:c5:5c:27:fe: 06:ec:3e:9a:32:b5:84:3d:20:78:4e:ef:68:c4:9c:39: ce:f2:03:23:7f:0e:21:a2:1f:74:5c:a9:c3:d9:67:39: 98:d9:49:1a:4f:7e:ab:23:8f:3c:d1:08:3d:33:62:72: ee:fd:7b:e5:dc:4b:8b:13:10:e6:39:53:2f:89:9b:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:68:ef:b3:83:af:09:a3:0d:08:4b:85:3f:d5:59:5f: f4:15:77:25:2a:70:2b:7e:f1:10:55:08:7a:66:b2:22: f3:04:58:d3:06:f9:76:04:d7:5d:ad:67:97:be:7a:b3: b0:67:4e:7e:2c:28:62:de:44:e6:5e:c2:3d:e5:c2:b8: c1:2e:a4:dc:9b:55:58:5e:0b:e9:8d:9a:4c:f7:a9:bb: 2a:e0:65:94:79:1b:9b:1b:f8:44:31:d3:b1:a2:ff:d5: 89:94:dc:1a:87:29:2b:e6:bf:e2:60:a7:69:b4:ef:96: 5b:73:fe:3e:f9:aa:71:ff:ef:ab:63:62:86:87:df:5f: 8b:ce:f6:17:78:59:69:e5:51:e4:92:af:9d:ee:49:c0: f1:74:fb:52:d0:d3:50:a6:28:d8:04:fb:73:26:3e:95: eb:3c:b4:45:84:5c:d5:bd:44:f8:a4:c4:29:5e:4c:00: 0b:b0:1f:0c:9b:c9:85:25:80:f3:0c:b0:ce:5b:7b:59: 6c:42:24:f3:ad:8b:db:bf:8e:b8:fe:af:77:ee:b4:da: 31:41:bd:86:60:4e:85:bf:71:73:3c:c3:6a:a9:bc:d5: 47:10:19:4b:3d:ab:f9:72:a6:08:98:cc:91:d0:98:55: 88:03:c1:24:4b:75:20:a8:e2:d4:6d:8b:5f:2e:5c:e0 Fingerprint (SHA-256): AC:B7:C9:33:F6:AD:39:4E:4F:2B:F6:93:EC:8B:F2:62:9C:A1:D7:B4:D8:BD:CF:96:DA:D0:E7:AF:9E:A0:32:04 Fingerprint (SHA1): 56:79:4C:BD:12:F3:3A:95:F3:73:C3:9D:F5:4D:09:EA:A7:6C:2D:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201763 (0x1315e423) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:18:25 2023 Not After : Mon Mar 20 20:18:25 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:0e:4a:7c:79:16:8b:b6:79:24:85:66:81:96:7f:4a: 77:86:cc:c7:00:74:c3:8d:1b:dc:c5:cb:2e:07:f9:99: 6a:73:4a:ca:fa:1f:f5:f7:98:d8:6d:86:9b:7a:c0:0b: 61:72:de:41:66:2b:7c:65:db:40:3c:11:cd:e4:20:19: c0:0e:cb:e2:e7:cc:76:07:61:ba:31:d6:93:1b:ea:a4: 92:1b:1f:78:c8:01:15:3a:30:a1:7b:11:06:5a:2a:33: 68:50:89:82:8a:95:e0:92:63:23:c9:b1:94:5e:f0:ac: 31:f7:09:02:5d:b3:64:7b:29:25:0c:86:b6:79:9e:c9: af:02:ca:41:6e:cc:55:26:a0:8b:bd:10:25:ee:2f:7d: 20:66:b1:49:91:5b:33:01:99:e4:0b:b4:c5:5e:63:90: 3c:8d:e1:94:51:9a:ea:d6:ea:3a:01:64:47:42:eb:25: 6d:78:70:8b:e0:fa:44:13:cd:8e:2c:38:79:c7:51:e6: af:e3:fa:f7:34:af:56:05:ba:84:9e:e4:4c:62:a6:ee: 71:4b:90:27:7e:ec:ff:a5:5c:5b:54:08:bc:6e:5f:de: 56:41:ee:4b:87:46:10:dc:93:0b:63:88:4a:99:9b:94: 06:77:2a:72:d7:e7:2c:e8:97:6c:ae:fe:5f:89:67:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:6d:e0:75:13:12:0b:89:8b:64:26:1a:d0:d2:5a:fa: ba:ac:87:eb:f8:8a:92:3d:64:bd:25:b3:ec:26:68:4c: 2b:f6:f4:20:3b:98:cd:b4:65:b5:12:38:47:ef:60:13: 8a:16:ca:15:a7:ff:ea:db:9b:12:a8:07:d3:0c:ba:33: 57:8a:8e:94:d6:eb:5a:a8:c2:f1:1a:81:81:51:21:53: 30:c0:2e:73:94:fa:37:88:2d:86:bc:94:50:ca:44:9d: 15:76:83:93:fe:1f:b9:a6:ce:6a:66:24:ec:39:bc:89: 48:b8:6d:6c:71:c8:f8:87:7c:1f:df:10:47:c5:0f:d6: 3c:05:6f:b6:cd:33:dc:72:95:d7:45:e1:8f:0e:44:74: af:c4:86:91:3e:3c:f6:fd:cd:ad:5f:0e:ad:2f:60:ba: 51:a3:65:54:37:ae:63:77:84:30:8c:3e:9a:94:19:94: e6:7b:e8:65:a3:c3:5b:ae:90:b1:47:6a:94:ad:d2:e2: 7b:8e:b7:3e:db:af:31:c2:7e:8f:26:ea:61:ea:da:99: 8b:7c:03:f1:c6:63:9d:f2:d0:09:c3:f2:01:7c:ce:92: 4b:5d:8e:12:48:11:f5:f1:30:41:d0:53:72:56:dd:18: 85:5b:f8:46:ef:a3:be:7f:f6:48:c0:b5:fc:16:ba:d3 Fingerprint (SHA-256): E9:DA:6F:0D:C6:8A:DA:58:2B:48:B5:25:04:EF:23:D0:F8:C2:E5:6B:39:EE:A0:CD:21:E0:A1:8B:AA:89:24:06 Fingerprint (SHA1): AE:FF:04:48:B8:73:F3:BD:3F:63:86:B2:8B:86:77:15:4F:16:05:C0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201765 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201766 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201767 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320201768 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320201769 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201765 (0x1315e425) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:28 2023 Not After : Mon Mar 20 20:18:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:35:7f:9f:f5:e7:30:a3:6e:b1:35:b2:2f:97:cb:44: 2d:de:3e:3a:a9:2e:5e:bc:50:1f:e5:aa:b0:7a:21:31: 30:ab:1c:0c:48:ba:1c:1f:44:67:f2:4f:a9:2f:0c:94: 16:40:bf:00:19:a2:13:13:06:ad:e2:a3:77:5c:73:3c: f0:42:c9:4f:ae:a8:c1:64:18:1c:cb:cd:9e:a5:a5:0f: e8:32:2c:ad:8c:bf:e4:5f:45:18:9b:32:e0:38:4b:a1: 39:66:1d:5f:fe:21:ac:e5:e3:6d:bc:6a:19:6f:02:cf: 24:31:e4:c8:fe:59:d2:b6:18:28:56:55:9e:09:12:14: e9:27:bf:43:7f:4b:96:16:4e:0f:b3:66:4c:71:8f:d1: e1:de:01:b3:3a:ac:5e:6a:c5:36:ff:ab:ab:8b:9c:06: 14:15:2e:54:58:22:3f:e7:b7:63:1c:fc:4b:38:2f:04: 23:57:c7:4e:a2:6b:16:67:e4:72:a2:97:8d:20:c5:69: 76:7b:61:01:0a:48:e4:6e:21:bf:74:3d:72:00:03:cf: c6:b5:3b:7f:01:b4:9b:5a:51:b8:68:93:56:7e:5e:60: 2d:c8:4b:24:68:56:ee:50:b7:c7:ac:80:42:b4:e9:5c: 8d:39:79:7a:9f:1e:aa:ad:08:40:c4:61:7b:40:57:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:74:70:28:8d:74:02:3f:d4:13:3c:00:88:dc:3d:26: d3:d4:b2:7c:70:91:f8:25:3c:3d:b8:e1:05:e9:47:06: 4d:4a:69:89:8f:46:7b:26:35:b8:60:6a:b8:dd:39:ff: 8f:e3:93:fc:45:67:86:3e:00:8a:e7:44:40:db:e7:3c: 95:1f:31:4b:95:44:75:32:a7:22:01:aa:58:f0:dd:fb: 0d:d8:2c:ca:3b:88:c7:d5:92:a5:7d:69:5f:cd:5c:2c: 9f:f7:84:d0:33:c0:40:07:b6:3c:51:77:f8:87:d1:8c: 1f:c7:88:b3:b4:54:8f:f1:3c:b1:34:86:2a:8b:cb:e2: 80:65:7a:28:1d:22:ef:e8:ec:4c:67:da:6b:86:b7:be: 11:e3:38:12:8a:3b:ac:6b:d1:d0:55:6b:e4:cf:a5:31: ff:ea:43:93:04:c6:b1:8f:4a:b7:56:df:bc:9f:b0:f9: 8f:7f:3f:1d:b9:62:1f:90:a1:5e:1f:c1:80:b4:f4:9a: 49:f4:c0:9e:cd:7a:b7:b0:ad:12:16:47:0f:27:3e:34: 37:f9:5f:37:6b:b7:9d:ea:cb:0c:99:09:e7:ae:0b:ab: 44:08:85:09:b6:aa:1d:44:03:d1:e3:98:fd:a4:2e:5a: 6f:ad:41:22:99:2d:a7:6d:a2:57:ac:f9:86:42:32:6c Fingerprint (SHA-256): CD:CA:0E:13:00:54:36:34:66:E1:52:BB:EF:E4:05:D5:27:69:70:5D:93:F7:78:43:0F:25:7E:A7:BE:9F:AF:0F Fingerprint (SHA1): BD:16:3D:90:6D:9C:F1:F0:E5:0A:B0:C8:1E:D8:18:C7:25:3B:D1:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201766 (0x1315e426) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:29 2023 Not After : Mon Mar 20 20:18:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:31:97:cc:e6:b6:55:2b:fb:ca:75:8d:d7:3e:fb:e9: f5:04:39:93:ce:3d:53:f0:7d:3f:57:4b:73:48:b8:9d: 18:ed:3a:7a:94:d2:04:07:e5:57:fb:9e:9e:e3:e9:4c: ca:42:b6:6a:a3:16:fb:49:c4:48:1e:69:d6:94:cc:b3: ae:8b:16:d3:71:16:62:e3:c1:bc:12:77:3a:81:ab:45: 68:32:c9:0b:d6:8c:9d:c1:e7:bd:83:d6:88:89:b6:28: cf:61:a3:c9:ef:23:6e:fb:8b:15:79:43:98:c9:ae:d6: 68:67:b6:fc:17:a8:cc:a4:3d:b8:56:8b:9d:8b:37:cf: 74:ca:7e:c6:c9:5f:c6:52:91:f7:ef:ea:8c:f6:ae:9c: 59:71:79:8c:97:37:55:2d:cc:fa:45:6a:15:16:f9:1e: bc:61:4c:7a:f8:f9:54:41:f2:e5:7b:02:03:52:87:0f: 6f:0a:44:ab:17:4d:1c:a9:09:da:18:be:c2:ea:67:e7: 0b:9e:cf:a6:29:5b:98:f7:9f:31:52:77:4d:f5:55:91: 61:86:e9:eb:af:93:64:02:c1:57:23:a9:ee:cb:d6:19: ce:79:b4:1c:c0:70:50:5c:20:87:3f:e6:70:58:02:e3: 9f:a1:8e:ac:bf:c7:d7:17:ad:f3:e0:0f:5f:5e:b2:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:37:59:d8:9b:22:f7:d9:53:48:ac:33:be:8a:8b:c7: 6a:d9:b8:61:be:e2:6e:c5:91:94:b9:3f:a5:7f:62:c1: fd:66:a7:4a:44:b1:57:c5:21:5b:b5:0b:80:33:7e:e6: e3:3c:31:ba:8c:40:b6:44:93:89:e0:6b:27:12:53:0b: 63:b2:12:f1:49:99:88:d3:41:fe:dd:b6:59:2e:52:57: 09:25:2b:47:91:07:f3:97:e4:65:91:50:18:42:af:61: 61:79:1b:e3:64:a0:93:1f:18:eb:c9:83:0d:83:05:82: 53:7a:9b:e6:9b:89:08:4a:ee:b6:73:21:5f:58:eb:12: 51:48:ea:42:94:bc:38:47:75:5a:43:2e:da:cd:03:b8: de:56:31:5f:3c:3b:aa:d2:2d:a6:d3:13:c8:f3:ab:5f: 92:53:6a:f0:45:9c:50:32:ba:d8:5b:a5:21:19:4b:e5: c1:d4:c9:53:11:dc:dd:91:b4:36:83:94:0f:6e:cb:11: 4c:21:73:1e:af:7e:d1:15:d3:43:d0:5d:9a:d0:5e:75: c4:91:1e:47:b2:30:ca:85:6b:72:29:86:bc:08:da:3f: a1:5a:1e:ea:9a:4e:28:9e:11:af:f6:ed:47:9c:57:fc: 5b:ea:ec:b6:0b:81:51:cb:b8:1b:36:c0:fc:74:68:16 Fingerprint (SHA-256): 26:0E:73:7E:8F:28:5D:0A:A4:BF:D3:76:86:8C:D7:F1:85:D6:42:C6:EC:99:6B:7F:81:9C:3B:BB:3E:42:78:A5 Fingerprint (SHA1): 59:68:88:00:F4:6D:5E:FA:19:33:B1:AD:88:F7:C9:E8:A9:B9:1C:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201767 (0x1315e427) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:18:30 2023 Not After : Mon Mar 20 20:18:30 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:30:74:82:7d:fb:77:e5:ef:c6:7a:88:98:bf:54:23: f6:57:1e:c0:62:df:dc:1e:01:de:95:78:97:40:be:ea: 0e:71:d1:10:4c:67:cb:a3:29:bb:b8:e1:1a:cc:71:66: 5e:0e:3e:ea:7c:ba:a9:f9:68:ce:6f:82:6c:af:b9:31: 3c:da:75:4b:51:a1:1d:a0:5c:62:23:95:8e:06:61:36: 67:b2:9c:60:50:07:bc:d3:fa:e1:f9:78:88:53:cc:bc: cf:2c:45:4e:9c:c6:0d:b7:d3:38:2c:f1:92:3c:df:3e: 32:33:3e:43:e6:c8:88:a1:be:e9:b8:63:03:ee:e0:9c: d0:28:46:09:a6:f8:31:34:4a:09:f4:5c:cd:30:70:e3: 4f:01:cc:01:8c:ad:e3:fc:47:86:20:c4:3c:50:63:f5: e7:06:e0:a2:6c:39:47:97:65:8a:b8:f4:b2:fc:cf:17: 86:51:23:57:70:83:d4:4b:2f:9c:69:7e:4a:8c:ff:6a: 2a:bb:32:09:84:f3:18:a4:36:14:9e:ba:50:60:a4:e7: 25:1d:68:40:50:f9:56:3f:2b:0c:27:69:cd:10:1c:b3: 27:c8:06:c0:ef:c5:8c:a1:53:a5:a6:7e:61:50:50:99: 0c:8f:3f:88:18:ac:db:e2:9f:60:36:52:cb:73:9e:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:53:83:bc:61:16:96:fe:6f:ee:73:30:f2:fc:e9:8e: 7a:70:e0:95:20:e0:05:4c:a8:cb:93:73:a6:75:17:8c: 91:54:22:1f:f8:9b:c5:25:0e:dd:49:ff:39:d3:3a:18: cf:21:2b:e4:9e:f8:ae:3a:af:4f:7d:37:7b:a9:ff:f2: a2:a5:fa:7e:0a:59:d8:4b:56:4d:5f:ad:18:b9:5a:42: 38:cf:18:32:85:c2:bf:84:32:1e:16:28:c0:86:e1:5a: 12:a6:30:f7:54:87:26:eb:de:30:f0:d9:3d:2b:5f:62: 73:a0:ef:3a:75:fa:12:50:1e:43:00:69:b6:6f:60:57: 8a:14:31:40:cc:0d:28:57:c9:de:99:59:08:02:60:e2: 81:51:0b:dd:53:ad:f5:9c:c5:b8:e1:8d:28:73:94:70: c1:bb:94:05:ac:32:25:67:c6:87:32:dd:54:e1:16:33: 79:ab:39:81:d8:c2:b4:33:da:c3:38:fc:99:63:f2:17: 8b:6e:bb:46:43:08:0c:25:65:48:c6:02:70:93:96:2b: 35:49:60:07:0e:ac:40:f5:22:b5:3b:24:54:7a:80:57: 59:3b:4c:12:51:77:33:e6:55:79:db:c6:05:c9:fa:b2: 85:b9:97:99:10:c4:33:b5:d2:2e:f8:52:2a:d5:b4:12 Fingerprint (SHA-256): 40:47:6D:B2:E8:A9:A7:FB:45:18:DF:2E:1E:86:A6:9E:EC:DA:F4:F3:C7:E3:4C:37:2C:D3:4F:64:23:53:36:14 Fingerprint (SHA1): 4C:13:46:65:6B:9A:9C:63:C2:2B:20:EF:CC:8B:D2:47:26:F3:03:B8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201765 (0x1315e425) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:28 2023 Not After : Mon Mar 20 20:18:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:35:7f:9f:f5:e7:30:a3:6e:b1:35:b2:2f:97:cb:44: 2d:de:3e:3a:a9:2e:5e:bc:50:1f:e5:aa:b0:7a:21:31: 30:ab:1c:0c:48:ba:1c:1f:44:67:f2:4f:a9:2f:0c:94: 16:40:bf:00:19:a2:13:13:06:ad:e2:a3:77:5c:73:3c: f0:42:c9:4f:ae:a8:c1:64:18:1c:cb:cd:9e:a5:a5:0f: e8:32:2c:ad:8c:bf:e4:5f:45:18:9b:32:e0:38:4b:a1: 39:66:1d:5f:fe:21:ac:e5:e3:6d:bc:6a:19:6f:02:cf: 24:31:e4:c8:fe:59:d2:b6:18:28:56:55:9e:09:12:14: e9:27:bf:43:7f:4b:96:16:4e:0f:b3:66:4c:71:8f:d1: e1:de:01:b3:3a:ac:5e:6a:c5:36:ff:ab:ab:8b:9c:06: 14:15:2e:54:58:22:3f:e7:b7:63:1c:fc:4b:38:2f:04: 23:57:c7:4e:a2:6b:16:67:e4:72:a2:97:8d:20:c5:69: 76:7b:61:01:0a:48:e4:6e:21:bf:74:3d:72:00:03:cf: c6:b5:3b:7f:01:b4:9b:5a:51:b8:68:93:56:7e:5e:60: 2d:c8:4b:24:68:56:ee:50:b7:c7:ac:80:42:b4:e9:5c: 8d:39:79:7a:9f:1e:aa:ad:08:40:c4:61:7b:40:57:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:74:70:28:8d:74:02:3f:d4:13:3c:00:88:dc:3d:26: d3:d4:b2:7c:70:91:f8:25:3c:3d:b8:e1:05:e9:47:06: 4d:4a:69:89:8f:46:7b:26:35:b8:60:6a:b8:dd:39:ff: 8f:e3:93:fc:45:67:86:3e:00:8a:e7:44:40:db:e7:3c: 95:1f:31:4b:95:44:75:32:a7:22:01:aa:58:f0:dd:fb: 0d:d8:2c:ca:3b:88:c7:d5:92:a5:7d:69:5f:cd:5c:2c: 9f:f7:84:d0:33:c0:40:07:b6:3c:51:77:f8:87:d1:8c: 1f:c7:88:b3:b4:54:8f:f1:3c:b1:34:86:2a:8b:cb:e2: 80:65:7a:28:1d:22:ef:e8:ec:4c:67:da:6b:86:b7:be: 11:e3:38:12:8a:3b:ac:6b:d1:d0:55:6b:e4:cf:a5:31: ff:ea:43:93:04:c6:b1:8f:4a:b7:56:df:bc:9f:b0:f9: 8f:7f:3f:1d:b9:62:1f:90:a1:5e:1f:c1:80:b4:f4:9a: 49:f4:c0:9e:cd:7a:b7:b0:ad:12:16:47:0f:27:3e:34: 37:f9:5f:37:6b:b7:9d:ea:cb:0c:99:09:e7:ae:0b:ab: 44:08:85:09:b6:aa:1d:44:03:d1:e3:98:fd:a4:2e:5a: 6f:ad:41:22:99:2d:a7:6d:a2:57:ac:f9:86:42:32:6c Fingerprint (SHA-256): CD:CA:0E:13:00:54:36:34:66:E1:52:BB:EF:E4:05:D5:27:69:70:5D:93:F7:78:43:0F:25:7E:A7:BE:9F:AF:0F Fingerprint (SHA1): BD:16:3D:90:6D:9C:F1:F0:E5:0A:B0:C8:1E:D8:18:C7:25:3B:D1:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201766 (0x1315e426) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:29 2023 Not After : Mon Mar 20 20:18:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:31:97:cc:e6:b6:55:2b:fb:ca:75:8d:d7:3e:fb:e9: f5:04:39:93:ce:3d:53:f0:7d:3f:57:4b:73:48:b8:9d: 18:ed:3a:7a:94:d2:04:07:e5:57:fb:9e:9e:e3:e9:4c: ca:42:b6:6a:a3:16:fb:49:c4:48:1e:69:d6:94:cc:b3: ae:8b:16:d3:71:16:62:e3:c1:bc:12:77:3a:81:ab:45: 68:32:c9:0b:d6:8c:9d:c1:e7:bd:83:d6:88:89:b6:28: cf:61:a3:c9:ef:23:6e:fb:8b:15:79:43:98:c9:ae:d6: 68:67:b6:fc:17:a8:cc:a4:3d:b8:56:8b:9d:8b:37:cf: 74:ca:7e:c6:c9:5f:c6:52:91:f7:ef:ea:8c:f6:ae:9c: 59:71:79:8c:97:37:55:2d:cc:fa:45:6a:15:16:f9:1e: bc:61:4c:7a:f8:f9:54:41:f2:e5:7b:02:03:52:87:0f: 6f:0a:44:ab:17:4d:1c:a9:09:da:18:be:c2:ea:67:e7: 0b:9e:cf:a6:29:5b:98:f7:9f:31:52:77:4d:f5:55:91: 61:86:e9:eb:af:93:64:02:c1:57:23:a9:ee:cb:d6:19: ce:79:b4:1c:c0:70:50:5c:20:87:3f:e6:70:58:02:e3: 9f:a1:8e:ac:bf:c7:d7:17:ad:f3:e0:0f:5f:5e:b2:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:37:59:d8:9b:22:f7:d9:53:48:ac:33:be:8a:8b:c7: 6a:d9:b8:61:be:e2:6e:c5:91:94:b9:3f:a5:7f:62:c1: fd:66:a7:4a:44:b1:57:c5:21:5b:b5:0b:80:33:7e:e6: e3:3c:31:ba:8c:40:b6:44:93:89:e0:6b:27:12:53:0b: 63:b2:12:f1:49:99:88:d3:41:fe:dd:b6:59:2e:52:57: 09:25:2b:47:91:07:f3:97:e4:65:91:50:18:42:af:61: 61:79:1b:e3:64:a0:93:1f:18:eb:c9:83:0d:83:05:82: 53:7a:9b:e6:9b:89:08:4a:ee:b6:73:21:5f:58:eb:12: 51:48:ea:42:94:bc:38:47:75:5a:43:2e:da:cd:03:b8: de:56:31:5f:3c:3b:aa:d2:2d:a6:d3:13:c8:f3:ab:5f: 92:53:6a:f0:45:9c:50:32:ba:d8:5b:a5:21:19:4b:e5: c1:d4:c9:53:11:dc:dd:91:b4:36:83:94:0f:6e:cb:11: 4c:21:73:1e:af:7e:d1:15:d3:43:d0:5d:9a:d0:5e:75: c4:91:1e:47:b2:30:ca:85:6b:72:29:86:bc:08:da:3f: a1:5a:1e:ea:9a:4e:28:9e:11:af:f6:ed:47:9c:57:fc: 5b:ea:ec:b6:0b:81:51:cb:b8:1b:36:c0:fc:74:68:16 Fingerprint (SHA-256): 26:0E:73:7E:8F:28:5D:0A:A4:BF:D3:76:86:8C:D7:F1:85:D6:42:C6:EC:99:6B:7F:81:9C:3B:BB:3E:42:78:A5 Fingerprint (SHA1): 59:68:88:00:F4:6D:5E:FA:19:33:B1:AD:88:F7:C9:E8:A9:B9:1C:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201767 (0x1315e427) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:18:30 2023 Not After : Mon Mar 20 20:18:30 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:30:74:82:7d:fb:77:e5:ef:c6:7a:88:98:bf:54:23: f6:57:1e:c0:62:df:dc:1e:01:de:95:78:97:40:be:ea: 0e:71:d1:10:4c:67:cb:a3:29:bb:b8:e1:1a:cc:71:66: 5e:0e:3e:ea:7c:ba:a9:f9:68:ce:6f:82:6c:af:b9:31: 3c:da:75:4b:51:a1:1d:a0:5c:62:23:95:8e:06:61:36: 67:b2:9c:60:50:07:bc:d3:fa:e1:f9:78:88:53:cc:bc: cf:2c:45:4e:9c:c6:0d:b7:d3:38:2c:f1:92:3c:df:3e: 32:33:3e:43:e6:c8:88:a1:be:e9:b8:63:03:ee:e0:9c: d0:28:46:09:a6:f8:31:34:4a:09:f4:5c:cd:30:70:e3: 4f:01:cc:01:8c:ad:e3:fc:47:86:20:c4:3c:50:63:f5: e7:06:e0:a2:6c:39:47:97:65:8a:b8:f4:b2:fc:cf:17: 86:51:23:57:70:83:d4:4b:2f:9c:69:7e:4a:8c:ff:6a: 2a:bb:32:09:84:f3:18:a4:36:14:9e:ba:50:60:a4:e7: 25:1d:68:40:50:f9:56:3f:2b:0c:27:69:cd:10:1c:b3: 27:c8:06:c0:ef:c5:8c:a1:53:a5:a6:7e:61:50:50:99: 0c:8f:3f:88:18:ac:db:e2:9f:60:36:52:cb:73:9e:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:53:83:bc:61:16:96:fe:6f:ee:73:30:f2:fc:e9:8e: 7a:70:e0:95:20:e0:05:4c:a8:cb:93:73:a6:75:17:8c: 91:54:22:1f:f8:9b:c5:25:0e:dd:49:ff:39:d3:3a:18: cf:21:2b:e4:9e:f8:ae:3a:af:4f:7d:37:7b:a9:ff:f2: a2:a5:fa:7e:0a:59:d8:4b:56:4d:5f:ad:18:b9:5a:42: 38:cf:18:32:85:c2:bf:84:32:1e:16:28:c0:86:e1:5a: 12:a6:30:f7:54:87:26:eb:de:30:f0:d9:3d:2b:5f:62: 73:a0:ef:3a:75:fa:12:50:1e:43:00:69:b6:6f:60:57: 8a:14:31:40:cc:0d:28:57:c9:de:99:59:08:02:60:e2: 81:51:0b:dd:53:ad:f5:9c:c5:b8:e1:8d:28:73:94:70: c1:bb:94:05:ac:32:25:67:c6:87:32:dd:54:e1:16:33: 79:ab:39:81:d8:c2:b4:33:da:c3:38:fc:99:63:f2:17: 8b:6e:bb:46:43:08:0c:25:65:48:c6:02:70:93:96:2b: 35:49:60:07:0e:ac:40:f5:22:b5:3b:24:54:7a:80:57: 59:3b:4c:12:51:77:33:e6:55:79:db:c6:05:c9:fa:b2: 85:b9:97:99:10:c4:33:b5:d2:2e:f8:52:2a:d5:b4:12 Fingerprint (SHA-256): 40:47:6D:B2:E8:A9:A7:FB:45:18:DF:2E:1E:86:A6:9E:EC:DA:F4:F3:C7:E3:4C:37:2C:D3:4F:64:23:53:36:14 Fingerprint (SHA1): 4C:13:46:65:6B:9A:9C:63:C2:2B:20:EF:CC:8B:D2:47:26:F3:03:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201765 (0x1315e425) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:28 2023 Not After : Mon Mar 20 20:18:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:35:7f:9f:f5:e7:30:a3:6e:b1:35:b2:2f:97:cb:44: 2d:de:3e:3a:a9:2e:5e:bc:50:1f:e5:aa:b0:7a:21:31: 30:ab:1c:0c:48:ba:1c:1f:44:67:f2:4f:a9:2f:0c:94: 16:40:bf:00:19:a2:13:13:06:ad:e2:a3:77:5c:73:3c: f0:42:c9:4f:ae:a8:c1:64:18:1c:cb:cd:9e:a5:a5:0f: e8:32:2c:ad:8c:bf:e4:5f:45:18:9b:32:e0:38:4b:a1: 39:66:1d:5f:fe:21:ac:e5:e3:6d:bc:6a:19:6f:02:cf: 24:31:e4:c8:fe:59:d2:b6:18:28:56:55:9e:09:12:14: e9:27:bf:43:7f:4b:96:16:4e:0f:b3:66:4c:71:8f:d1: e1:de:01:b3:3a:ac:5e:6a:c5:36:ff:ab:ab:8b:9c:06: 14:15:2e:54:58:22:3f:e7:b7:63:1c:fc:4b:38:2f:04: 23:57:c7:4e:a2:6b:16:67:e4:72:a2:97:8d:20:c5:69: 76:7b:61:01:0a:48:e4:6e:21:bf:74:3d:72:00:03:cf: c6:b5:3b:7f:01:b4:9b:5a:51:b8:68:93:56:7e:5e:60: 2d:c8:4b:24:68:56:ee:50:b7:c7:ac:80:42:b4:e9:5c: 8d:39:79:7a:9f:1e:aa:ad:08:40:c4:61:7b:40:57:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:74:70:28:8d:74:02:3f:d4:13:3c:00:88:dc:3d:26: d3:d4:b2:7c:70:91:f8:25:3c:3d:b8:e1:05:e9:47:06: 4d:4a:69:89:8f:46:7b:26:35:b8:60:6a:b8:dd:39:ff: 8f:e3:93:fc:45:67:86:3e:00:8a:e7:44:40:db:e7:3c: 95:1f:31:4b:95:44:75:32:a7:22:01:aa:58:f0:dd:fb: 0d:d8:2c:ca:3b:88:c7:d5:92:a5:7d:69:5f:cd:5c:2c: 9f:f7:84:d0:33:c0:40:07:b6:3c:51:77:f8:87:d1:8c: 1f:c7:88:b3:b4:54:8f:f1:3c:b1:34:86:2a:8b:cb:e2: 80:65:7a:28:1d:22:ef:e8:ec:4c:67:da:6b:86:b7:be: 11:e3:38:12:8a:3b:ac:6b:d1:d0:55:6b:e4:cf:a5:31: ff:ea:43:93:04:c6:b1:8f:4a:b7:56:df:bc:9f:b0:f9: 8f:7f:3f:1d:b9:62:1f:90:a1:5e:1f:c1:80:b4:f4:9a: 49:f4:c0:9e:cd:7a:b7:b0:ad:12:16:47:0f:27:3e:34: 37:f9:5f:37:6b:b7:9d:ea:cb:0c:99:09:e7:ae:0b:ab: 44:08:85:09:b6:aa:1d:44:03:d1:e3:98:fd:a4:2e:5a: 6f:ad:41:22:99:2d:a7:6d:a2:57:ac:f9:86:42:32:6c Fingerprint (SHA-256): CD:CA:0E:13:00:54:36:34:66:E1:52:BB:EF:E4:05:D5:27:69:70:5D:93:F7:78:43:0F:25:7E:A7:BE:9F:AF:0F Fingerprint (SHA1): BD:16:3D:90:6D:9C:F1:F0:E5:0A:B0:C8:1E:D8:18:C7:25:3B:D1:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201765 (0x1315e425) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:28 2023 Not After : Mon Mar 20 20:18:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:35:7f:9f:f5:e7:30:a3:6e:b1:35:b2:2f:97:cb:44: 2d:de:3e:3a:a9:2e:5e:bc:50:1f:e5:aa:b0:7a:21:31: 30:ab:1c:0c:48:ba:1c:1f:44:67:f2:4f:a9:2f:0c:94: 16:40:bf:00:19:a2:13:13:06:ad:e2:a3:77:5c:73:3c: f0:42:c9:4f:ae:a8:c1:64:18:1c:cb:cd:9e:a5:a5:0f: e8:32:2c:ad:8c:bf:e4:5f:45:18:9b:32:e0:38:4b:a1: 39:66:1d:5f:fe:21:ac:e5:e3:6d:bc:6a:19:6f:02:cf: 24:31:e4:c8:fe:59:d2:b6:18:28:56:55:9e:09:12:14: e9:27:bf:43:7f:4b:96:16:4e:0f:b3:66:4c:71:8f:d1: e1:de:01:b3:3a:ac:5e:6a:c5:36:ff:ab:ab:8b:9c:06: 14:15:2e:54:58:22:3f:e7:b7:63:1c:fc:4b:38:2f:04: 23:57:c7:4e:a2:6b:16:67:e4:72:a2:97:8d:20:c5:69: 76:7b:61:01:0a:48:e4:6e:21:bf:74:3d:72:00:03:cf: c6:b5:3b:7f:01:b4:9b:5a:51:b8:68:93:56:7e:5e:60: 2d:c8:4b:24:68:56:ee:50:b7:c7:ac:80:42:b4:e9:5c: 8d:39:79:7a:9f:1e:aa:ad:08:40:c4:61:7b:40:57:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:74:70:28:8d:74:02:3f:d4:13:3c:00:88:dc:3d:26: d3:d4:b2:7c:70:91:f8:25:3c:3d:b8:e1:05:e9:47:06: 4d:4a:69:89:8f:46:7b:26:35:b8:60:6a:b8:dd:39:ff: 8f:e3:93:fc:45:67:86:3e:00:8a:e7:44:40:db:e7:3c: 95:1f:31:4b:95:44:75:32:a7:22:01:aa:58:f0:dd:fb: 0d:d8:2c:ca:3b:88:c7:d5:92:a5:7d:69:5f:cd:5c:2c: 9f:f7:84:d0:33:c0:40:07:b6:3c:51:77:f8:87:d1:8c: 1f:c7:88:b3:b4:54:8f:f1:3c:b1:34:86:2a:8b:cb:e2: 80:65:7a:28:1d:22:ef:e8:ec:4c:67:da:6b:86:b7:be: 11:e3:38:12:8a:3b:ac:6b:d1:d0:55:6b:e4:cf:a5:31: ff:ea:43:93:04:c6:b1:8f:4a:b7:56:df:bc:9f:b0:f9: 8f:7f:3f:1d:b9:62:1f:90:a1:5e:1f:c1:80:b4:f4:9a: 49:f4:c0:9e:cd:7a:b7:b0:ad:12:16:47:0f:27:3e:34: 37:f9:5f:37:6b:b7:9d:ea:cb:0c:99:09:e7:ae:0b:ab: 44:08:85:09:b6:aa:1d:44:03:d1:e3:98:fd:a4:2e:5a: 6f:ad:41:22:99:2d:a7:6d:a2:57:ac:f9:86:42:32:6c Fingerprint (SHA-256): CD:CA:0E:13:00:54:36:34:66:E1:52:BB:EF:E4:05:D5:27:69:70:5D:93:F7:78:43:0F:25:7E:A7:BE:9F:AF:0F Fingerprint (SHA1): BD:16:3D:90:6D:9C:F1:F0:E5:0A:B0:C8:1E:D8:18:C7:25:3B:D1:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201766 (0x1315e426) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:29 2023 Not After : Mon Mar 20 20:18:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:31:97:cc:e6:b6:55:2b:fb:ca:75:8d:d7:3e:fb:e9: f5:04:39:93:ce:3d:53:f0:7d:3f:57:4b:73:48:b8:9d: 18:ed:3a:7a:94:d2:04:07:e5:57:fb:9e:9e:e3:e9:4c: ca:42:b6:6a:a3:16:fb:49:c4:48:1e:69:d6:94:cc:b3: ae:8b:16:d3:71:16:62:e3:c1:bc:12:77:3a:81:ab:45: 68:32:c9:0b:d6:8c:9d:c1:e7:bd:83:d6:88:89:b6:28: cf:61:a3:c9:ef:23:6e:fb:8b:15:79:43:98:c9:ae:d6: 68:67:b6:fc:17:a8:cc:a4:3d:b8:56:8b:9d:8b:37:cf: 74:ca:7e:c6:c9:5f:c6:52:91:f7:ef:ea:8c:f6:ae:9c: 59:71:79:8c:97:37:55:2d:cc:fa:45:6a:15:16:f9:1e: bc:61:4c:7a:f8:f9:54:41:f2:e5:7b:02:03:52:87:0f: 6f:0a:44:ab:17:4d:1c:a9:09:da:18:be:c2:ea:67:e7: 0b:9e:cf:a6:29:5b:98:f7:9f:31:52:77:4d:f5:55:91: 61:86:e9:eb:af:93:64:02:c1:57:23:a9:ee:cb:d6:19: ce:79:b4:1c:c0:70:50:5c:20:87:3f:e6:70:58:02:e3: 9f:a1:8e:ac:bf:c7:d7:17:ad:f3:e0:0f:5f:5e:b2:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:37:59:d8:9b:22:f7:d9:53:48:ac:33:be:8a:8b:c7: 6a:d9:b8:61:be:e2:6e:c5:91:94:b9:3f:a5:7f:62:c1: fd:66:a7:4a:44:b1:57:c5:21:5b:b5:0b:80:33:7e:e6: e3:3c:31:ba:8c:40:b6:44:93:89:e0:6b:27:12:53:0b: 63:b2:12:f1:49:99:88:d3:41:fe:dd:b6:59:2e:52:57: 09:25:2b:47:91:07:f3:97:e4:65:91:50:18:42:af:61: 61:79:1b:e3:64:a0:93:1f:18:eb:c9:83:0d:83:05:82: 53:7a:9b:e6:9b:89:08:4a:ee:b6:73:21:5f:58:eb:12: 51:48:ea:42:94:bc:38:47:75:5a:43:2e:da:cd:03:b8: de:56:31:5f:3c:3b:aa:d2:2d:a6:d3:13:c8:f3:ab:5f: 92:53:6a:f0:45:9c:50:32:ba:d8:5b:a5:21:19:4b:e5: c1:d4:c9:53:11:dc:dd:91:b4:36:83:94:0f:6e:cb:11: 4c:21:73:1e:af:7e:d1:15:d3:43:d0:5d:9a:d0:5e:75: c4:91:1e:47:b2:30:ca:85:6b:72:29:86:bc:08:da:3f: a1:5a:1e:ea:9a:4e:28:9e:11:af:f6:ed:47:9c:57:fc: 5b:ea:ec:b6:0b:81:51:cb:b8:1b:36:c0:fc:74:68:16 Fingerprint (SHA-256): 26:0E:73:7E:8F:28:5D:0A:A4:BF:D3:76:86:8C:D7:F1:85:D6:42:C6:EC:99:6B:7F:81:9C:3B:BB:3E:42:78:A5 Fingerprint (SHA1): 59:68:88:00:F4:6D:5E:FA:19:33:B1:AD:88:F7:C9:E8:A9:B9:1C:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201766 (0x1315e426) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:18:29 2023 Not After : Mon Mar 20 20:18:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:31:97:cc:e6:b6:55:2b:fb:ca:75:8d:d7:3e:fb:e9: f5:04:39:93:ce:3d:53:f0:7d:3f:57:4b:73:48:b8:9d: 18:ed:3a:7a:94:d2:04:07:e5:57:fb:9e:9e:e3:e9:4c: ca:42:b6:6a:a3:16:fb:49:c4:48:1e:69:d6:94:cc:b3: ae:8b:16:d3:71:16:62:e3:c1:bc:12:77:3a:81:ab:45: 68:32:c9:0b:d6:8c:9d:c1:e7:bd:83:d6:88:89:b6:28: cf:61:a3:c9:ef:23:6e:fb:8b:15:79:43:98:c9:ae:d6: 68:67:b6:fc:17:a8:cc:a4:3d:b8:56:8b:9d:8b:37:cf: 74:ca:7e:c6:c9:5f:c6:52:91:f7:ef:ea:8c:f6:ae:9c: 59:71:79:8c:97:37:55:2d:cc:fa:45:6a:15:16:f9:1e: bc:61:4c:7a:f8:f9:54:41:f2:e5:7b:02:03:52:87:0f: 6f:0a:44:ab:17:4d:1c:a9:09:da:18:be:c2:ea:67:e7: 0b:9e:cf:a6:29:5b:98:f7:9f:31:52:77:4d:f5:55:91: 61:86:e9:eb:af:93:64:02:c1:57:23:a9:ee:cb:d6:19: ce:79:b4:1c:c0:70:50:5c:20:87:3f:e6:70:58:02:e3: 9f:a1:8e:ac:bf:c7:d7:17:ad:f3:e0:0f:5f:5e:b2:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:37:59:d8:9b:22:f7:d9:53:48:ac:33:be:8a:8b:c7: 6a:d9:b8:61:be:e2:6e:c5:91:94:b9:3f:a5:7f:62:c1: fd:66:a7:4a:44:b1:57:c5:21:5b:b5:0b:80:33:7e:e6: e3:3c:31:ba:8c:40:b6:44:93:89:e0:6b:27:12:53:0b: 63:b2:12:f1:49:99:88:d3:41:fe:dd:b6:59:2e:52:57: 09:25:2b:47:91:07:f3:97:e4:65:91:50:18:42:af:61: 61:79:1b:e3:64:a0:93:1f:18:eb:c9:83:0d:83:05:82: 53:7a:9b:e6:9b:89:08:4a:ee:b6:73:21:5f:58:eb:12: 51:48:ea:42:94:bc:38:47:75:5a:43:2e:da:cd:03:b8: de:56:31:5f:3c:3b:aa:d2:2d:a6:d3:13:c8:f3:ab:5f: 92:53:6a:f0:45:9c:50:32:ba:d8:5b:a5:21:19:4b:e5: c1:d4:c9:53:11:dc:dd:91:b4:36:83:94:0f:6e:cb:11: 4c:21:73:1e:af:7e:d1:15:d3:43:d0:5d:9a:d0:5e:75: c4:91:1e:47:b2:30:ca:85:6b:72:29:86:bc:08:da:3f: a1:5a:1e:ea:9a:4e:28:9e:11:af:f6:ed:47:9c:57:fc: 5b:ea:ec:b6:0b:81:51:cb:b8:1b:36:c0:fc:74:68:16 Fingerprint (SHA-256): 26:0E:73:7E:8F:28:5D:0A:A4:BF:D3:76:86:8C:D7:F1:85:D6:42:C6:EC:99:6B:7F:81:9C:3B:BB:3E:42:78:A5 Fingerprint (SHA1): 59:68:88:00:F4:6D:5E:FA:19:33:B1:AD:88:F7:C9:E8:A9:B9:1C:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201767 (0x1315e427) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:18:30 2023 Not After : Mon Mar 20 20:18:30 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:30:74:82:7d:fb:77:e5:ef:c6:7a:88:98:bf:54:23: f6:57:1e:c0:62:df:dc:1e:01:de:95:78:97:40:be:ea: 0e:71:d1:10:4c:67:cb:a3:29:bb:b8:e1:1a:cc:71:66: 5e:0e:3e:ea:7c:ba:a9:f9:68:ce:6f:82:6c:af:b9:31: 3c:da:75:4b:51:a1:1d:a0:5c:62:23:95:8e:06:61:36: 67:b2:9c:60:50:07:bc:d3:fa:e1:f9:78:88:53:cc:bc: cf:2c:45:4e:9c:c6:0d:b7:d3:38:2c:f1:92:3c:df:3e: 32:33:3e:43:e6:c8:88:a1:be:e9:b8:63:03:ee:e0:9c: d0:28:46:09:a6:f8:31:34:4a:09:f4:5c:cd:30:70:e3: 4f:01:cc:01:8c:ad:e3:fc:47:86:20:c4:3c:50:63:f5: e7:06:e0:a2:6c:39:47:97:65:8a:b8:f4:b2:fc:cf:17: 86:51:23:57:70:83:d4:4b:2f:9c:69:7e:4a:8c:ff:6a: 2a:bb:32:09:84:f3:18:a4:36:14:9e:ba:50:60:a4:e7: 25:1d:68:40:50:f9:56:3f:2b:0c:27:69:cd:10:1c:b3: 27:c8:06:c0:ef:c5:8c:a1:53:a5:a6:7e:61:50:50:99: 0c:8f:3f:88:18:ac:db:e2:9f:60:36:52:cb:73:9e:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:53:83:bc:61:16:96:fe:6f:ee:73:30:f2:fc:e9:8e: 7a:70:e0:95:20:e0:05:4c:a8:cb:93:73:a6:75:17:8c: 91:54:22:1f:f8:9b:c5:25:0e:dd:49:ff:39:d3:3a:18: cf:21:2b:e4:9e:f8:ae:3a:af:4f:7d:37:7b:a9:ff:f2: a2:a5:fa:7e:0a:59:d8:4b:56:4d:5f:ad:18:b9:5a:42: 38:cf:18:32:85:c2:bf:84:32:1e:16:28:c0:86:e1:5a: 12:a6:30:f7:54:87:26:eb:de:30:f0:d9:3d:2b:5f:62: 73:a0:ef:3a:75:fa:12:50:1e:43:00:69:b6:6f:60:57: 8a:14:31:40:cc:0d:28:57:c9:de:99:59:08:02:60:e2: 81:51:0b:dd:53:ad:f5:9c:c5:b8:e1:8d:28:73:94:70: c1:bb:94:05:ac:32:25:67:c6:87:32:dd:54:e1:16:33: 79:ab:39:81:d8:c2:b4:33:da:c3:38:fc:99:63:f2:17: 8b:6e:bb:46:43:08:0c:25:65:48:c6:02:70:93:96:2b: 35:49:60:07:0e:ac:40:f5:22:b5:3b:24:54:7a:80:57: 59:3b:4c:12:51:77:33:e6:55:79:db:c6:05:c9:fa:b2: 85:b9:97:99:10:c4:33:b5:d2:2e:f8:52:2a:d5:b4:12 Fingerprint (SHA-256): 40:47:6D:B2:E8:A9:A7:FB:45:18:DF:2E:1E:86:A6:9E:EC:DA:F4:F3:C7:E3:4C:37:2C:D3:4F:64:23:53:36:14 Fingerprint (SHA1): 4C:13:46:65:6B:9A:9C:63:C2:2B:20:EF:CC:8B:D2:47:26:F3:03:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201767 (0x1315e427) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:18:30 2023 Not After : Mon Mar 20 20:18:30 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:30:74:82:7d:fb:77:e5:ef:c6:7a:88:98:bf:54:23: f6:57:1e:c0:62:df:dc:1e:01:de:95:78:97:40:be:ea: 0e:71:d1:10:4c:67:cb:a3:29:bb:b8:e1:1a:cc:71:66: 5e:0e:3e:ea:7c:ba:a9:f9:68:ce:6f:82:6c:af:b9:31: 3c:da:75:4b:51:a1:1d:a0:5c:62:23:95:8e:06:61:36: 67:b2:9c:60:50:07:bc:d3:fa:e1:f9:78:88:53:cc:bc: cf:2c:45:4e:9c:c6:0d:b7:d3:38:2c:f1:92:3c:df:3e: 32:33:3e:43:e6:c8:88:a1:be:e9:b8:63:03:ee:e0:9c: d0:28:46:09:a6:f8:31:34:4a:09:f4:5c:cd:30:70:e3: 4f:01:cc:01:8c:ad:e3:fc:47:86:20:c4:3c:50:63:f5: e7:06:e0:a2:6c:39:47:97:65:8a:b8:f4:b2:fc:cf:17: 86:51:23:57:70:83:d4:4b:2f:9c:69:7e:4a:8c:ff:6a: 2a:bb:32:09:84:f3:18:a4:36:14:9e:ba:50:60:a4:e7: 25:1d:68:40:50:f9:56:3f:2b:0c:27:69:cd:10:1c:b3: 27:c8:06:c0:ef:c5:8c:a1:53:a5:a6:7e:61:50:50:99: 0c:8f:3f:88:18:ac:db:e2:9f:60:36:52:cb:73:9e:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:53:83:bc:61:16:96:fe:6f:ee:73:30:f2:fc:e9:8e: 7a:70:e0:95:20:e0:05:4c:a8:cb:93:73:a6:75:17:8c: 91:54:22:1f:f8:9b:c5:25:0e:dd:49:ff:39:d3:3a:18: cf:21:2b:e4:9e:f8:ae:3a:af:4f:7d:37:7b:a9:ff:f2: a2:a5:fa:7e:0a:59:d8:4b:56:4d:5f:ad:18:b9:5a:42: 38:cf:18:32:85:c2:bf:84:32:1e:16:28:c0:86:e1:5a: 12:a6:30:f7:54:87:26:eb:de:30:f0:d9:3d:2b:5f:62: 73:a0:ef:3a:75:fa:12:50:1e:43:00:69:b6:6f:60:57: 8a:14:31:40:cc:0d:28:57:c9:de:99:59:08:02:60:e2: 81:51:0b:dd:53:ad:f5:9c:c5:b8:e1:8d:28:73:94:70: c1:bb:94:05:ac:32:25:67:c6:87:32:dd:54:e1:16:33: 79:ab:39:81:d8:c2:b4:33:da:c3:38:fc:99:63:f2:17: 8b:6e:bb:46:43:08:0c:25:65:48:c6:02:70:93:96:2b: 35:49:60:07:0e:ac:40:f5:22:b5:3b:24:54:7a:80:57: 59:3b:4c:12:51:77:33:e6:55:79:db:c6:05:c9:fa:b2: 85:b9:97:99:10:c4:33:b5:d2:2e:f8:52:2a:d5:b4:12 Fingerprint (SHA-256): 40:47:6D:B2:E8:A9:A7:FB:45:18:DF:2E:1E:86:A6:9E:EC:DA:F4:F3:C7:E3:4C:37:2C:D3:4F:64:23:53:36:14 Fingerprint (SHA1): 4C:13:46:65:6B:9A:9C:63:C2:2B:20:EF:CC:8B:D2:47:26:F3:03:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201770 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320201771 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201772 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 320201773 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320201774 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320201775 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 320201776 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201770 (0x1315e42a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:34 2023 Not After : Mon Mar 20 20:18:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:e2:f3:66:97:0b:4b:2a:fe:08:99:3e:d9:8c:20:ef: b8:fa:08:b9:25:f0:2e:8a:e7:65:23:10:ee:66:99:06: 25:f2:e8:47:83:15:96:27:13:04:2e:24:76:3e:1a:23: 49:8d:79:e0:53:bb:0a:2d:86:e6:a9:90:e6:ce:2b:45: f8:be:ba:48:5c:9b:4e:23:cf:a2:2c:9c:68:36:9c:e2: e6:67:3b:0c:8d:29:08:76:70:c4:32:cf:96:0a:42:68: 18:6e:47:50:75:1f:9e:9a:18:24:2a:a6:6c:20:0a:81: 6d:50:a1:87:7e:57:98:77:a8:37:8b:3c:ec:5b:f7:0d: ae:54:aa:20:69:c7:05:31:c0:6e:e2:cd:03:19:21:84: a6:a5:bd:a0:8e:98:45:31:0f:1f:1c:8a:1b:2f:12:af: 16:55:87:58:2f:13:4f:08:ce:17:c5:62:97:e7:dd:6a: c6:75:72:d4:4b:4b:b6:9c:33:06:6f:bb:da:27:6c:4d: de:ab:71:d2:57:39:1f:ac:c4:a1:ac:6f:25:d8:4f:36: e1:fc:3f:9d:29:c1:59:a5:52:aa:be:c9:62:06:9b:27: a6:1f:2d:7a:15:75:bb:8f:07:54:b5:4b:38:94:fc:50: d4:6e:e9:45:b4:69:37:db:a5:b7:fb:5b:dc:f5:d8:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:1e:86:04:3e:8e:c2:a5:3d:8a:1d:d2:89:a4:59:76: bd:68:42:f3:36:f4:89:eb:96:ba:eb:3f:01:fb:a9:21: b7:83:9a:64:7b:4e:cd:74:aa:d4:54:5f:8c:0a:e7:b0: 21:69:3a:7c:e5:91:04:67:85:18:8e:44:fd:5d:e5:87: 32:8b:26:0d:c6:3d:b6:9f:a7:88:e0:4d:55:23:53:20: 73:91:25:13:6c:7b:23:a0:6a:c4:a0:87:f9:17:cb:35: be:09:8c:2b:9f:4b:86:e6:fd:ec:b3:86:43:04:e3:82: 71:96:92:dc:2c:8c:eb:fb:f0:2d:14:20:27:56:48:8c: ff:75:9b:f3:61:57:6a:eb:7b:b9:b1:ef:de:ef:10:c2: a9:51:a3:28:55:bd:ad:c9:33:53:b7:06:75:cd:34:be: ac:e9:df:e9:12:b9:ef:a8:d5:ab:d5:61:b0:8d:f6:21: ee:ec:86:8b:48:5e:83:57:cb:e9:fc:37:53:a3:ed:83: ac:f3:97:c0:87:cd:5e:de:98:31:7c:7b:94:e7:d2:be: 61:6a:80:aa:06:bc:a6:b1:31:e5:de:43:fb:ae:b4:b7: 19:95:dd:ea:c3:1d:de:d8:2c:74:0b:00:b8:35:60:3e: a2:50:50:36:ac:56:f3:32:e2:b6:36:2d:7b:ab:8c:88 Fingerprint (SHA-256): B1:E7:D1:EC:72:82:6F:55:2E:EC:C7:5C:66:50:30:40:24:67:A8:33:73:DE:7E:FB:D6:E0:0B:48:42:20:55:85 Fingerprint (SHA1): 89:AE:A9:6C:40:19:83:76:8D:8F:15:CF:A2:09:4C:BF:07:F7:49:72 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201770 (0x1315e42a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:34 2023 Not After : Mon Mar 20 20:18:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:e2:f3:66:97:0b:4b:2a:fe:08:99:3e:d9:8c:20:ef: b8:fa:08:b9:25:f0:2e:8a:e7:65:23:10:ee:66:99:06: 25:f2:e8:47:83:15:96:27:13:04:2e:24:76:3e:1a:23: 49:8d:79:e0:53:bb:0a:2d:86:e6:a9:90:e6:ce:2b:45: f8:be:ba:48:5c:9b:4e:23:cf:a2:2c:9c:68:36:9c:e2: e6:67:3b:0c:8d:29:08:76:70:c4:32:cf:96:0a:42:68: 18:6e:47:50:75:1f:9e:9a:18:24:2a:a6:6c:20:0a:81: 6d:50:a1:87:7e:57:98:77:a8:37:8b:3c:ec:5b:f7:0d: ae:54:aa:20:69:c7:05:31:c0:6e:e2:cd:03:19:21:84: a6:a5:bd:a0:8e:98:45:31:0f:1f:1c:8a:1b:2f:12:af: 16:55:87:58:2f:13:4f:08:ce:17:c5:62:97:e7:dd:6a: c6:75:72:d4:4b:4b:b6:9c:33:06:6f:bb:da:27:6c:4d: de:ab:71:d2:57:39:1f:ac:c4:a1:ac:6f:25:d8:4f:36: e1:fc:3f:9d:29:c1:59:a5:52:aa:be:c9:62:06:9b:27: a6:1f:2d:7a:15:75:bb:8f:07:54:b5:4b:38:94:fc:50: d4:6e:e9:45:b4:69:37:db:a5:b7:fb:5b:dc:f5:d8:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:1e:86:04:3e:8e:c2:a5:3d:8a:1d:d2:89:a4:59:76: bd:68:42:f3:36:f4:89:eb:96:ba:eb:3f:01:fb:a9:21: b7:83:9a:64:7b:4e:cd:74:aa:d4:54:5f:8c:0a:e7:b0: 21:69:3a:7c:e5:91:04:67:85:18:8e:44:fd:5d:e5:87: 32:8b:26:0d:c6:3d:b6:9f:a7:88:e0:4d:55:23:53:20: 73:91:25:13:6c:7b:23:a0:6a:c4:a0:87:f9:17:cb:35: be:09:8c:2b:9f:4b:86:e6:fd:ec:b3:86:43:04:e3:82: 71:96:92:dc:2c:8c:eb:fb:f0:2d:14:20:27:56:48:8c: ff:75:9b:f3:61:57:6a:eb:7b:b9:b1:ef:de:ef:10:c2: a9:51:a3:28:55:bd:ad:c9:33:53:b7:06:75:cd:34:be: ac:e9:df:e9:12:b9:ef:a8:d5:ab:d5:61:b0:8d:f6:21: ee:ec:86:8b:48:5e:83:57:cb:e9:fc:37:53:a3:ed:83: ac:f3:97:c0:87:cd:5e:de:98:31:7c:7b:94:e7:d2:be: 61:6a:80:aa:06:bc:a6:b1:31:e5:de:43:fb:ae:b4:b7: 19:95:dd:ea:c3:1d:de:d8:2c:74:0b:00:b8:35:60:3e: a2:50:50:36:ac:56:f3:32:e2:b6:36:2d:7b:ab:8c:88 Fingerprint (SHA-256): B1:E7:D1:EC:72:82:6F:55:2E:EC:C7:5C:66:50:30:40:24:67:A8:33:73:DE:7E:FB:D6:E0:0B:48:42:20:55:85 Fingerprint (SHA1): 89:AE:A9:6C:40:19:83:76:8D:8F:15:CF:A2:09:4C:BF:07:F7:49:72 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201777 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320201778 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 320201779 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 320201780 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 320201781 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 320201782 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 320201783 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 320201784 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 320201785 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 320201786 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 320201787 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 320201788 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 320201789 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 320201790 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 320201791 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 320201792 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 320201793 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 320201794 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 320201795 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 320201796 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 320201797 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 320201798 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 320201799 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 320201800 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 320201801 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 320201802 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 320201803 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 320201804 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 320201805 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 320201806 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201777 (0x1315e431) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:18:40 2023 Not After : Mon Mar 20 20:18:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:d5:d3:7e:84:cf:e6:d4:ee:ed:15:65:93:17:ee: bc:4a:47:dc:0d:fe:78:84:d8:69:5e:81:41:30:e2:86: f2:1f:52:94:9a:a5:b8:83:89:75:a8:9a:5d:67:a8:28: 96:49:94:91:5f:8f:0a:0b:fd:ea:02:ad:23:b9:c0:f1: c6:0e:cc:6c:59:de:ef:84:e2:3b:fe:33:0c:29:18:4e: e1:15:6f:4c:c7:ef:ca:50:2e:b5:58:48:83:33:6f:b2: e6:b9:ec:b2:3b:b2:3b:be:7a:bc:88:89:8f:a4:e6:86: 9c:96:0a:ef:d0:10:e5:f9:fb:08:ce:21:03:f3:d8:d9: c9:a7:68:02:ac:a6:27:b2:d7:f8:1c:b4:b7:e6:25:b3: 7a:84:c5:8b:68:91:65:24:08:06:f5:9f:33:99:8a:b6: a6:2d:2e:4d:7f:ce:15:74:18:02:58:57:ba:18:7f:9f: 84:d7:86:0c:43:6f:d6:31:e6:79:5c:4b:7e:9e:c6:13: 26:c4:6f:99:91:1d:c1:ee:73:21:d0:f8:c7:88:b2:e6: db:4e:84:73:90:7b:ac:87:0b:c9:71:0a:28:1d:86:39: 68:fc:c7:9f:ed:08:cb:01:d5:dd:0f:db:b6:ce:bd:2d: ba:d8:bd:09:6c:7c:91:f1:7e:60:e5:9c:47:b7:45:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:3c:80:60:bf:c7:30:1c:12:ef:55:2c:72:a8:4b:6e: 10:92:4b:e7:63:70:dd:c9:ec:d1:72:98:21:df:14:e7: 5d:cf:f2:91:37:35:e7:45:78:40:3b:de:0b:4b:a3:01: 6e:83:26:e6:9b:fb:45:d0:92:19:0c:12:76:da:a8:3d: 1c:2e:44:3f:de:03:4c:cb:b7:39:25:0e:36:82:b6:43: c8:87:f3:17:96:6a:18:f2:36:6b:e4:be:37:b4:43:51: 0f:7e:e9:ef:b5:e5:c3:b6:b6:88:4f:1a:88:89:87:4f: 9c:bf:5b:c4:6f:a8:48:66:6e:bf:70:94:82:1d:4d:a1: 66:56:fe:aa:5b:d9:ad:12:f5:36:a9:42:e0:36:3d:6e: 30:60:fc:4d:19:cb:30:89:ee:21:26:9e:7d:2b:68:64: dc:b9:4f:ca:f8:50:05:8c:1c:6e:e8:31:91:f0:aa:bc: 24:29:17:39:ae:73:34:ba:d9:c2:09:07:93:6e:13:c4: b5:e2:d4:7b:f3:d9:2c:ee:92:07:73:dd:b9:1c:b3:50: ad:e1:53:33:73:ba:c1:af:0e:0f:20:74:31:5c:cc:53: 6c:01:df:c7:8c:00:c4:b7:5c:23:e5:0f:3d:c5:3c:cb: a6:d1:f6:2e:f9:72:3a:c5:03:5e:91:40:8f:c2:52:ab Fingerprint (SHA-256): F1:79:74:F7:94:DC:70:D5:5D:95:5D:18:F6:FD:68:11:9A:38:C1:7B:AB:65:00:80:5A:04:D8:AA:E9:A6:E7:D8 Fingerprint (SHA1): 88:24:B3:83:4E:66:09:78:B4:E1:0E:70:2C:88:65:76:23:35:B0:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201807 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 320201808 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 320201809 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 320201810 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 320201811 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 320201812 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 320201813 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201807 (0x1315e44f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:06 2023 Not After : Mon Mar 20 20:19:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:44:ee:6d:e4:1f:a7:bd:2c:18:36:b5:2f:f4:9d:25: 0c:45:8c:3a:60:9a:9c:c2:94:37:ac:29:0a:cc:18:b4: af:7d:73:c0:65:be:00:9e:a4:a7:98:eb:c5:19:38:f4: ed:b7:e3:72:9c:da:29:d6:36:63:f2:28:58:38:c1:44: 8c:f9:c0:ba:ee:68:e9:21:d2:19:18:bb:4e:fb:b9:41: f9:c3:27:92:43:c7:c1:9a:db:6c:93:e7:a4:fa:38:41: f6:e3:4c:7d:4b:22:04:70:d3:3d:05:a6:f6:04:d5:7c: c7:d3:25:f1:fc:de:1d:5a:0a:95:6f:9d:f2:c2:c2:b2: 6a:77:29:6b:4d:00:a2:b0:9e:d7:5f:4e:25:4b:55:5e: 6f:5e:10:65:f2:8f:c9:7d:f7:91:4d:ce:2a:34:42:ff: 54:ff:d7:30:e5:2c:c5:e7:ae:76:1f:fc:bd:f3:09:9f: 7a:be:16:5f:98:74:0e:c5:3e:85:51:05:6b:87:75:63: e0:a3:81:26:fd:ec:15:39:ee:78:31:93:7f:44:6d:4e: 80:2e:60:d8:ec:ea:70:93:bb:e9:54:7d:a5:be:48:cb: 64:e2:26:df:21:c3:64:bf:e3:46:cc:39:75:d0:58:76: de:0b:b4:84:92:43:d7:e6:25:50:e5:51:50:ed:0f:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:04:28:04:7b:7e:6b:99:49:f2:f2:71:d8:d2:7a:36: 13:13:eb:21:be:0c:dc:24:78:2c:53:22:0e:a6:4c:d3: f9:c1:32:17:f1:ef:d1:d0:e9:63:7c:57:40:ae:b4:ee: 91:6a:5c:ab:19:5f:3b:5c:97:66:86:bc:2c:f1:5e:c9: 25:56:b7:71:24:15:4c:9d:d7:2d:e5:1e:37:a0:f0:af: 13:db:7f:5e:f6:84:7b:dd:e5:9c:b6:74:e8:37:ba:2e: b1:99:00:f5:00:63:6e:5b:38:76:2b:4d:97:33:df:1f: f5:9d:8c:fd:41:24:00:59:4f:ff:df:88:79:f4:b7:f0: 63:b8:32:78:00:0d:a6:0b:3e:8c:40:99:2d:b7:26:0f: 80:bc:dd:51:d1:23:72:6b:bf:54:59:97:a9:bd:bd:3e: 46:1e:e8:c0:43:93:5f:71:1d:6d:3a:5e:5b:62:94:d3: f0:3e:a9:88:87:35:4e:b4:26:28:99:bd:46:7e:aa:7c: a5:5d:b0:22:71:b6:f6:b7:62:fa:f0:93:77:cf:ac:dc: ec:44:64:1a:3c:a7:37:df:e7:11:16:b2:90:13:22:6c: 2b:c5:c4:ff:22:91:27:f7:cc:ed:82:51:47:f6:e5:ea: 89:fb:58:2b:45:35:a6:8a:0f:a4:15:a0:2e:56:6a:68 Fingerprint (SHA-256): 16:04:80:02:D0:6A:13:76:56:23:FA:9F:A9:65:E5:86:F2:02:6F:0C:D9:72:79:E9:59:8C:99:9A:54:47:C1:06 Fingerprint (SHA1): BF:84:8D:E8:BE:3B:B4:44:AA:6C:62:C1:76:71:FC:F9:45:46:22:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201807 (0x1315e44f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:06 2023 Not After : Mon Mar 20 20:19:06 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:44:ee:6d:e4:1f:a7:bd:2c:18:36:b5:2f:f4:9d:25: 0c:45:8c:3a:60:9a:9c:c2:94:37:ac:29:0a:cc:18:b4: af:7d:73:c0:65:be:00:9e:a4:a7:98:eb:c5:19:38:f4: ed:b7:e3:72:9c:da:29:d6:36:63:f2:28:58:38:c1:44: 8c:f9:c0:ba:ee:68:e9:21:d2:19:18:bb:4e:fb:b9:41: f9:c3:27:92:43:c7:c1:9a:db:6c:93:e7:a4:fa:38:41: f6:e3:4c:7d:4b:22:04:70:d3:3d:05:a6:f6:04:d5:7c: c7:d3:25:f1:fc:de:1d:5a:0a:95:6f:9d:f2:c2:c2:b2: 6a:77:29:6b:4d:00:a2:b0:9e:d7:5f:4e:25:4b:55:5e: 6f:5e:10:65:f2:8f:c9:7d:f7:91:4d:ce:2a:34:42:ff: 54:ff:d7:30:e5:2c:c5:e7:ae:76:1f:fc:bd:f3:09:9f: 7a:be:16:5f:98:74:0e:c5:3e:85:51:05:6b:87:75:63: e0:a3:81:26:fd:ec:15:39:ee:78:31:93:7f:44:6d:4e: 80:2e:60:d8:ec:ea:70:93:bb:e9:54:7d:a5:be:48:cb: 64:e2:26:df:21:c3:64:bf:e3:46:cc:39:75:d0:58:76: de:0b:b4:84:92:43:d7:e6:25:50:e5:51:50:ed:0f:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:04:28:04:7b:7e:6b:99:49:f2:f2:71:d8:d2:7a:36: 13:13:eb:21:be:0c:dc:24:78:2c:53:22:0e:a6:4c:d3: f9:c1:32:17:f1:ef:d1:d0:e9:63:7c:57:40:ae:b4:ee: 91:6a:5c:ab:19:5f:3b:5c:97:66:86:bc:2c:f1:5e:c9: 25:56:b7:71:24:15:4c:9d:d7:2d:e5:1e:37:a0:f0:af: 13:db:7f:5e:f6:84:7b:dd:e5:9c:b6:74:e8:37:ba:2e: b1:99:00:f5:00:63:6e:5b:38:76:2b:4d:97:33:df:1f: f5:9d:8c:fd:41:24:00:59:4f:ff:df:88:79:f4:b7:f0: 63:b8:32:78:00:0d:a6:0b:3e:8c:40:99:2d:b7:26:0f: 80:bc:dd:51:d1:23:72:6b:bf:54:59:97:a9:bd:bd:3e: 46:1e:e8:c0:43:93:5f:71:1d:6d:3a:5e:5b:62:94:d3: f0:3e:a9:88:87:35:4e:b4:26:28:99:bd:46:7e:aa:7c: a5:5d:b0:22:71:b6:f6:b7:62:fa:f0:93:77:cf:ac:dc: ec:44:64:1a:3c:a7:37:df:e7:11:16:b2:90:13:22:6c: 2b:c5:c4:ff:22:91:27:f7:cc:ed:82:51:47:f6:e5:ea: 89:fb:58:2b:45:35:a6:8a:0f:a4:15:a0:2e:56:6a:68 Fingerprint (SHA-256): 16:04:80:02:D0:6A:13:76:56:23:FA:9F:A9:65:E5:86:F2:02:6F:0C:D9:72:79:E9:59:8C:99:9A:54:47:C1:06 Fingerprint (SHA1): BF:84:8D:E8:BE:3B:B4:44:AA:6C:62:C1:76:71:FC:F9:45:46:22:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201814 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201815 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201816 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320201817 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201814 (0x1315e456) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:12 2023 Not After : Mon Mar 20 20:19:12 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:98:80:4a:cc:2b:8d:6b:39:27:d3:09:4f:bf:79:95: 60:e6:24:26:e4:1e:98:67:59:30:76:a8:bf:bf:5e:fa: 65:c3:e1:f2:56:68:e6:d4:a4:f8:9b:2f:5c:d7:55:61: 02:c6:16:82:10:e4:d5:c8:44:12:1a:02:f1:46:aa:b6: 90:6a:29:89:6e:75:4d:5d:f6:3d:1f:3c:5a:42:78:cd: d8:8b:b5:12:6f:65:f0:44:a5:2b:f8:92:7d:5c:79:a1: 25:71:82:67:ce:e4:b9:2d:ea:38:b2:3f:b2:13:4d:d4: 5c:a7:66:1c:a1:c5:29:81:c8:87:08:5d:31:d9:72:9c: 3c:32:aa:7c:6b:a3:c0:59:7e:70:b3:5d:43:74:c6:2c: 26:81:cb:9b:c2:30:e8:5f:33:48:ab:60:e3:6b:3b:38: e9:af:fc:02:09:7a:1b:97:b9:9f:4b:5c:ae:a0:59:0b: 2d:5e:1d:e3:fa:03:fd:ea:07:7d:64:94:5d:0e:52:54: 57:9b:84:58:5a:9a:0b:6e:0d:88:d4:19:be:83:2a:31: 75:eb:13:0f:ca:d6:d4:0d:72:88:77:67:76:d0:2f:01: 15:7d:49:43:79:3b:a8:bb:c2:4b:5d:f5:5a:d7:1b:81: dd:67:3a:cf:d5:b8:96:33:21:10:38:6b:8e:0f:37:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:2a:81:37:f7:d3:49:86:8d:1b:98:ee:9c:fa:b9:1e: f2:93:15:ce:07:25:a8:8f:4d:f8:fd:e2:50:72:a9:d2: b0:20:fa:db:40:aa:95:30:fd:00:9d:f5:bd:b1:86:0e: c9:d8:a6:53:3b:71:26:27:4c:9f:21:73:e1:b6:cb:00: 80:f4:74:54:e0:95:59:59:dc:c7:ab:b9:8f:e5:69:a7: 2e:20:e4:bb:b6:c2:10:8e:95:bf:23:0e:1d:d8:71:df: 8a:52:a6:1a:03:19:de:09:77:c1:ab:ee:ec:46:18:3c: 83:39:c9:3b:c7:74:a1:fe:cb:2e:7a:34:30:ff:2e:46: 6b:c3:9e:f9:94:44:99:b5:ee:9d:ed:c4:10:be:2f:2a: 5f:61:7d:7a:2e:af:0a:00:37:c9:bc:37:7d:de:28:ca: d2:3c:7a:fa:70:e1:0d:9b:92:53:59:1f:f5:0b:a2:bc: fb:e9:64:ce:3b:46:ae:75:fd:14:b4:68:3c:67:9d:54: 8c:88:9e:60:c7:ec:44:b8:78:d4:74:d0:65:5a:de:73: e1:39:40:2d:d1:98:48:ed:b2:aa:37:74:11:ce:5e:e1: 93:bc:7a:ee:39:8c:c9:c0:14:22:05:b1:41:bb:3c:c9: 18:ce:27:f6:1d:aa:c8:26:9d:b1:c1:85:9d:00:70:38 Fingerprint (SHA-256): 59:A2:48:DD:8C:DA:E7:79:4C:6D:63:C0:C2:B2:D7:B4:72:C5:CE:1B:EA:2E:EE:01:B6:29:D8:50:3B:2B:1E:18 Fingerprint (SHA1): 05:33:C8:95:B2:4C:C3:99:59:42:8F:6B:95:A8:6A:35:77:D6:EF:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201815 (0x1315e457) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:13 2023 Not After : Mon Mar 20 20:19:13 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:d5:53:81:ab:3a:d7:15:74:fd:38:53:7c:f8:ac:c4: 89:73:d7:74:1b:b1:2a:d6:39:62:f1:f4:84:ea:08:45: 44:01:b7:3e:2b:3c:5b:b9:0d:db:79:31:91:1e:82:de: 80:2e:b0:58:bb:fb:20:ba:2b:16:27:63:4c:73:d5:9e: 51:cc:47:67:69:d2:7a:7c:0f:57:4e:06:da:4d:57:ea: 8a:06:1c:48:ea:e6:95:05:89:36:9c:7a:a4:df:95:cc: 49:f8:27:48:e6:32:17:67:72:9c:00:e4:4b:0c:69:3c: 2a:d4:63:79:1e:14:d3:86:03:29:86:9a:a8:e6:8d:d2: d1:f0:ac:82:29:ff:e0:0f:a6:c0:7c:76:1d:77:63:01: 04:40:dd:17:6c:3a:ea:3c:e8:32:53:81:c8:c3:70:5f: b6:2e:6c:a6:29:13:f1:8f:dd:bb:19:c6:d5:46:87:74: d4:a6:82:ec:6f:3c:06:ac:fb:66:a9:b7:40:fb:c7:26: f5:2c:6f:57:58:91:1c:21:e6:71:30:20:f7:fc:44:26: 98:0a:a7:b1:fa:83:be:71:6e:93:fd:29:8e:a1:74:9d: 89:ff:fb:36:cc:72:90:5d:29:23:6c:d0:f2:24:59:30: e6:47:87:db:dd:0b:2c:22:6f:82:58:75:6a:9f:4c:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:40:48:fc:4b:25:58:95:a7:6b:55:03:c2:ca:16:ff: 71:e3:41:0a:11:47:65:12:81:9c:98:c5:82:31:84:b2: 1c:39:89:d6:8d:a8:ef:97:df:94:e9:bb:ca:22:63:14: 2a:66:c4:ab:f8:26:7c:a6:14:f7:6a:76:f1:99:53:e4: e1:83:cd:5a:3e:a1:55:e3:1f:fa:0a:66:72:c1:7b:1c: dc:30:64:24:eb:a6:cf:f0:ec:8e:0a:28:ce:f4:28:e4: 25:c9:7a:4b:a5:59:ac:93:c6:3e:1a:65:0c:dc:4a:bc: 94:fb:af:e3:07:c6:29:2d:01:2a:e1:ae:ae:d9:6d:64: d1:10:f0:dc:84:a7:da:f1:72:9d:a7:89:1d:19:ac:7b: a4:cf:d6:ab:f5:57:b0:89:a1:97:fa:09:03:b8:bf:c7: b9:7a:a5:79:82:99:dc:9f:7e:85:5d:45:fd:6c:18:78: fd:90:59:8c:d1:b8:59:4e:cd:40:9f:32:94:34:a2:e8: 29:3e:c7:c8:4f:d1:50:52:9c:d7:68:57:f4:4f:d0:de: 13:6a:7b:63:cd:e2:60:8e:1c:53:64:bc:d3:23:33:80: c9:7a:37:36:d2:c9:9c:7b:fe:1b:1d:cc:5e:40:29:c7: bf:1e:d2:c5:8f:9d:e6:61:aa:45:05:6c:00:3a:0f:7f Fingerprint (SHA-256): 82:75:55:34:3A:36:C9:56:D0:E2:E4:86:5B:B6:D3:7E:28:00:AB:43:2D:9E:03:C4:90:FC:47:39:1F:73:1C:B6 Fingerprint (SHA1): 4D:37:7B:45:44:02:96:CF:26:EB:41:84:5F:1A:38:72:FE:DE:89:20 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201816 (0x1315e458) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:19:13 2023 Not After : Mon Mar 20 20:19:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:f7:92:48:b1:f4:40:b1:be:86:e0:76:e3:6a:3e:e7: 79:df:89:a1:82:97:51:ee:a5:82:07:11:13:a8:3c:99: de:f8:88:41:22:e6:09:4c:46:ac:a1:50:eb:13:d2:36: 31:3e:f4:da:55:19:d0:00:d2:bb:83:fc:d2:0a:af:f8: 8e:77:18:71:c4:14:52:0a:7a:5a:d7:f0:05:23:39:63: b2:c2:1a:96:47:f3:d7:ee:3e:4d:a3:ea:1e:2e:52:85: 80:45:5c:74:46:90:3d:cd:db:4c:be:67:c0:2e:90:0d: 7e:08:07:4b:d6:10:e2:50:3e:99:7c:34:fd:44:8b:58: 29:d0:55:49:10:b7:d2:7b:c2:9a:f4:5a:cf:d1:d9:d0: 90:fd:de:b7:2a:5f:18:b6:ed:04:39:f9:2e:68:7a:e2: d7:d6:70:18:36:02:9a:12:7f:92:5d:cb:5c:63:4a:c6: ed:46:61:47:9c:20:e5:92:69:7f:50:8b:fd:99:d3:38: f6:58:1e:b7:20:55:58:74:0d:0c:87:02:57:13:22:70: 58:33:61:ca:7a:85:c0:fc:b6:b5:38:c0:db:95:9b:0a: dd:d1:31:b3:e1:c2:fd:b2:86:cf:a6:cc:5d:a2:ba:b7: a7:f6:df:28:cc:54:21:c6:47:c1:85:96:7d:82:6c:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:5b:2f:a1:0f:cb:e7:dc:5a:b7:c2:22:2c:81:bb:d6: 04:1a:de:91:2e:91:0f:0f:9a:b9:6d:55:44:0c:77:21: 7e:66:29:34:7a:05:61:71:8f:96:b2:e7:72:5d:16:98: be:31:b4:24:b0:6b:f2:61:9c:40:56:77:e8:29:67:40: 8d:30:86:af:3d:c5:42:5a:c1:26:60:2c:af:55:c1:60: 19:65:84:b9:c6:3a:1a:92:17:89:6b:73:24:a2:ac:95: 85:b9:b5:33:de:68:59:3b:4b:75:4a:dc:aa:4d:7b:ea: d7:6f:28:76:c7:b2:7b:98:df:52:aa:dd:ec:17:52:86: da:6d:b0:c3:cf:05:8f:bc:35:7a:0e:2a:88:4c:e0:8b: 17:a1:fc:66:ef:6a:29:f8:d1:a2:8b:21:00:78:2c:8f: 90:ac:3e:ea:06:e6:97:b2:94:14:bc:64:ff:23:40:6a: a0:53:85:55:e1:80:69:b2:56:41:de:fa:bc:4c:7b:ee: e7:08:06:61:a3:20:bf:5b:5b:74:40:cb:3d:39:cd:84: d7:39:b1:3c:72:13:ab:59:22:27:78:90:40:bb:fb:6b: 35:0a:22:f6:25:d5:20:d4:0c:40:7b:25:5f:4e:23:db: a3:30:bf:78:ef:df:cc:68:54:3f:af:eb:a4:cf:70:a8 Fingerprint (SHA-256): 2C:D2:AA:1B:8F:84:8B:CF:7D:F8:4B:D4:8A:B0:22:71:A9:70:A7:68:3B:FC:02:B5:09:37:70:0A:B8:88:D7:70 Fingerprint (SHA1): 02:0B:9C:77:84:41:AE:43:BC:87:F6:B4:C3:96:65:1C:F8:8D:BA:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201818 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201819 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201820 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 320201821 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 320201822 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201818 (0x1315e45a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:15 2023 Not After : Mon Mar 20 20:19:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cb:cb:13:2d:c8:6e:1d:70:04:af:b0:08:52:02:0c: 76:9e:6c:61:0d:a5:fb:e1:8a:f3:ef:bd:bd:18:74:29: c8:4c:a8:83:01:10:dc:46:9b:c8:62:3e:f2:57:1c:42: a7:d3:35:87:2b:76:a8:50:de:77:74:fd:68:d3:1d:ec: 51:7a:2b:b0:67:8f:f8:19:9a:5f:85:98:69:f6:7e:34: 1d:a9:b8:b6:b9:27:9e:dc:96:3e:af:06:ee:6a:5f:e9: 76:84:85:16:3a:1a:f1:a3:a4:31:13:14:55:d3:eb:41: 42:f3:a3:05:de:24:4d:45:fc:cf:33:21:f2:e5:80:c9: 19:5c:5a:5f:83:0c:73:58:5d:fb:dc:eb:82:57:0a:97: 6c:55:7e:98:c2:49:5d:d1:19:87:4d:03:c9:25:64:6d: 9a:12:d8:b0:cf:0c:98:88:e3:18:0d:a7:27:9c:0c:bb: 39:fc:9d:8a:cd:e8:2e:aa:95:79:7e:30:33:55:46:13: 95:ee:fe:c0:ca:25:a7:62:0d:00:31:91:a0:b8:b7:a2: b4:ba:57:f7:8b:b3:01:c9:03:cf:9a:d8:72:68:93:bd: 53:fc:af:fc:f9:52:a4:2d:e4:e7:63:06:b6:60:22:4f: 94:4b:88:45:e6:86:1e:d1:65:17:59:cd:94:6d:1c:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:b6:fb:6a:89:f1:fb:9b:1b:7b:5a:59:ff:fe:93:db: df:c7:72:d6:48:47:71:37:ac:aa:ec:b0:a6:cc:00:93: 0a:2d:19:d3:f2:92:ef:b2:b1:c9:31:76:89:10:35:5c: 25:5a:be:1f:a1:65:6b:6f:6c:16:a1:ca:26:13:30:f7: 1f:bd:0a:03:de:94:17:d5:7f:cf:be:69:fd:ab:ca:9d: a1:12:6c:ef:f7:c8:c2:bb:3c:41:81:73:0b:f2:08:88: 9c:29:a3:93:f8:d3:73:44:31:6b:38:65:d1:03:2a:13: a5:01:13:eb:39:9d:67:69:c1:55:2a:a1:9a:97:63:00: 3b:4e:d3:43:03:4d:3d:6a:b5:1d:e3:14:ae:2e:d9:a6: d7:bb:ea:87:6a:5c:37:6d:f2:18:1e:13:a4:86:31:5f: 96:8d:fc:b7:c4:01:1f:1a:34:e0:43:49:cf:22:10:47: 4c:24:17:97:5f:04:7a:3a:8c:8d:e5:d3:e1:3f:8f:d6: 6d:37:e8:a7:56:20:25:18:80:98:51:f6:6c:d6:e5:0a: 2a:17:cd:8f:c3:90:96:37:c3:e7:aa:df:3a:8e:c0:07: 5b:c9:5a:62:75:6a:da:ef:db:37:30:c7:57:bc:39:b2: d4:a8:7a:4e:9e:77:81:23:32:42:6f:64:df:62:b2:20 Fingerprint (SHA-256): C1:9E:A0:8A:88:90:C7:EC:0E:88:33:4B:FA:F9:7D:BC:2E:FA:99:6B:B2:05:3E:B4:4D:55:84:F4:12:89:62:6E Fingerprint (SHA1): DE:27:35:13:E9:1F:2C:FC:87:1D:16:41:49:7D:BD:4E:5A:85:DB:4F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201819 (0x1315e45b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:16 2023 Not After : Mon Mar 20 20:19:16 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ee:dc:c7:d7:00:61:5e:e7:17:d7:7a:a1:52:1d:2a: 0d:5a:2c:21:13:b0:bf:13:c4:d3:be:11:7b:ff:9f:3e: c5:fe:b9:eb:e6:29:82:29:8a:3e:3d:32:5b:3d:e8:e1: 39:29:a9:15:0e:2d:77:9b:a8:32:45:75:39:7a:ab:f9: 30:83:c9:cf:33:7f:ec:36:74:b1:69:5e:bb:6c:2d:d3: 14:db:eb:68:f9:e9:d0:4e:5a:35:cf:d0:13:4f:60:72: 64:13:7b:13:ca:e9:e6:78:fb:df:bd:8e:d2:9c:d9:0b: ab:ff:92:5b:c2:48:e5:e1:32:20:36:f4:02:69:e7:cc: 2e:05:93:f8:29:22:9e:91:8c:db:a8:f5:d4:9c:86:3c: dd:b3:84:70:e8:b5:91:03:3b:c3:14:5b:b6:36:e6:25: e0:d8:e1:44:a1:c5:93:c2:dc:4f:3d:5a:5f:68:c0:7b: 30:78:43:ab:24:64:4c:fb:07:6f:20:69:e0:04:3b:ec: c8:6e:53:a2:0a:13:ea:52:84:d2:b1:59:5e:64:b6:cd: 85:05:84:df:ef:12:71:f2:12:f6:ef:68:20:aa:39:e2: 90:4b:70:46:1e:af:c3:fc:44:d5:61:3b:d5:6c:e3:fe: 3d:4a:20:e8:99:aa:b4:ca:47:dc:0c:4d:c2:46:4f:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:4d:ee:eb:93:9a:06:af:6a:47:d4:21:4d:5c:5c:d3: 18:90:ee:73:73:cf:0d:17:73:dd:a2:7b:15:bb:82:aa: 3c:ca:47:55:f3:31:99:c7:13:54:04:52:59:ff:26:86: 36:4a:29:de:c1:2f:cd:d1:5a:20:18:50:a4:55:d0:94: ef:11:fe:c3:e4:5a:1b:62:24:69:7f:78:06:13:22:32: 43:d1:d3:33:59:cd:fe:fe:be:e2:f1:15:70:7c:54:d3: c1:19:c3:4c:de:0f:45:0d:f9:39:70:5f:ee:f0:d3:41: 9a:24:87:89:f2:7e:01:4b:03:cb:ea:8c:49:d9:75:b6: d6:9e:fc:28:ec:8b:be:6f:1a:df:5b:fd:ad:17:fd:b3: ad:82:1c:32:83:e2:92:c5:53:30:02:94:f6:dc:c5:05: 98:c6:00:05:a2:79:ac:a7:9f:96:2d:04:c2:bc:e8:78: 98:34:3d:79:82:df:33:46:77:89:10:36:bc:be:fe:f4: ff:a7:26:72:f6:46:07:4d:dc:8c:12:19:e9:5e:d0:fa: 50:68:c2:89:72:b8:84:8b:c7:bf:8f:93:a3:43:58:8a: 84:41:f5:33:56:33:aa:ce:a8:94:d4:2e:c8:1d:e9:0d: 78:29:e2:48:d8:0b:ef:ee:51:0c:af:84:10:e2:aa:f7 Fingerprint (SHA-256): 95:45:E6:02:FD:4C:4D:D6:11:08:8E:1A:31:DE:C9:CD:F4:92:9C:90:A4:0E:FA:98:5F:44:D8:77:9B:6D:9F:DB Fingerprint (SHA1): E9:0B:DE:56:06:F8:6F:6F:5E:E3:4A:E5:C0:A3:2A:73:59:87:EA:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201820 (0x1315e45c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:19:17 2023 Not After : Mon Mar 20 20:19:17 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:12:89:dc:a9:24:50:61:53:95:f6:01:ba:c7:75:58: 38:a8:1a:e0:a9:9f:5f:2d:0a:18:9e:f7:ce:5c:f9:ad: 48:67:37:e9:f7:e7:bc:ba:bc:87:d8:9d:20:ad:b2:2f: 3f:ed:fc:b2:1e:54:0e:5f:34:8c:d6:d3:62:e1:1f:b5: 52:bc:68:51:5b:67:5a:f8:cc:87:24:8b:b3:16:e1:bb: 23:aa:a6:63:92:db:e1:f2:02:f7:46:fe:12:12:12:08: c6:ab:0b:9b:cf:b4:05:93:56:1c:2c:a2:17:02:f3:6f: 03:8c:99:52:d9:26:49:7b:3f:60:a1:bc:7a:63:cd:c2: 41:41:7f:80:e2:11:83:0e:15:5e:3d:e8:11:74:fd:21: 13:eb:50:b5:76:ec:19:3d:f4:91:50:53:0f:40:fe:0d: 85:e8:79:17:a2:85:00:a7:5f:c1:56:0a:60:0b:58:d3: b9:fe:58:c5:dd:e2:01:46:83:95:84:ba:fd:65:a8:36: 06:30:d1:1c:56:71:1c:de:fb:c9:40:5b:e5:82:4b:eb: c2:cb:38:b0:23:1a:77:11:ea:4f:e5:1e:88:7c:06:91: 4c:b6:54:83:78:10:8f:1c:d5:2a:81:46:16:38:65:06: a0:54:57:f8:36:39:b3:71:bc:51:d1:9a:01:87:a5:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:ee:4e:00:a9:69:ab:e6:b3:87:4d:99:69:c4:cd:90: ea:77:8c:2b:b0:f5:c9:59:82:b6:8c:d3:be:dc:93:0b: ad:56:5c:93:0e:6e:c7:0b:02:cc:07:5c:b7:02:dd:7c: 39:cf:03:88:f4:3b:46:6a:7d:67:44:6c:50:4d:a3:15: b3:83:91:b3:bf:a0:2f:4e:a0:55:b7:f4:d4:e1:29:2b: 19:97:67:4c:fd:ad:8c:20:56:c6:cd:6c:06:d4:ba:fc: 73:d6:96:03:6f:17:df:4f:f2:1c:83:34:86:ab:94:7b: 60:f0:7c:a2:af:84:01:64:4f:34:45:67:6a:a2:b9:1a: aa:00:b7:bf:cc:f5:18:35:85:cb:e6:1d:11:aa:43:9d: c4:64:81:33:45:0c:d7:86:21:fc:d3:6b:c7:0d:6a:1f: 58:fb:31:9e:86:70:d6:b6:80:fc:b8:cc:3e:f7:17:3b: 6d:54:b9:64:33:9d:bf:b8:eb:5d:85:94:48:4c:0b:1d: 85:d8:4f:3e:4c:0a:2b:e9:9d:2f:32:8e:67:b8:de:84: 4a:43:01:f9:e7:f2:78:1b:f0:f2:d5:46:a1:d5:92:72: 37:44:e6:37:b4:f1:cd:bb:38:6a:b0:68:36:16:4b:93: 5e:ef:fd:a8:d6:a5:ec:a3:2b:07:0f:98:e5:3a:ec:56 Fingerprint (SHA-256): AE:6A:22:79:2F:F6:3D:32:E3:CB:50:2F:08:4A:78:50:5E:65:E5:A8:CF:C2:8D:B3:C2:DC:7B:B6:19:0C:B8:99 Fingerprint (SHA1): 4E:59:68:27:D8:5D:F5:D0:CF:B5:98:0D:B4:42:0F:77:15:E2:C0:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201823 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201824 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201825 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA1Root-320201716.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320201826 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201823 (0x1315e45f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:20 2023 Not After : Mon Mar 20 20:19:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:5f:e2:9a:b1:1b:ea:71:bc:ca:20:9b:8b:8c:ff:a7: cc:77:8f:52:62:63:dd:29:6f:f3:cc:f5:1d:3a:dc:9f: 22:34:23:72:5f:fc:6c:9a:01:48:24:8b:49:7a:4a:3d: 88:12:15:21:84:c4:9d:75:ed:f1:50:50:ad:bc:07:45: 08:b7:26:87:3d:23:79:02:64:6e:75:54:06:d5:fc:38: 78:8c:2f:64:aa:60:26:8d:35:df:d2:73:08:f6:5d:9d: 7b:48:19:98:97:40:dc:26:40:cb:3a:54:37:21:ef:49: 87:ef:14:6a:25:1f:d9:27:6d:19:0d:00:ea:97:18:25: 18:36:54:ac:20:20:89:f3:ae:e9:4f:c0:18:f0:fb:45: 2f:c0:34:92:93:d3:c3:48:95:98:b7:54:fd:30:c4:32: d3:b2:34:53:3c:b1:3a:6c:4e:0d:f3:e2:4b:c5:47:6c: f8:41:41:97:11:fe:60:7f:37:74:35:d9:5d:56:86:e9: ac:1e:47:77:c1:6b:e6:c1:62:d1:cd:d2:87:34:8a:70: b4:48:fa:32:82:6f:e3:cd:3e:c6:c9:19:7a:28:80:f7: 2c:bf:79:cc:2b:28:83:a9:d7:c4:a8:43:a7:7a:d5:2b: f8:d1:f0:d8:43:15:49:d3:31:a7:9a:9c:df:a1:04:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:29:83:4c:05:ac:e3:e7:e4:62:02:da:6a:19:1f:45: f4:f3:6d:1c:9c:dd:30:57:fe:41:8a:4a:7d:73:20:71: 1a:48:7c:a3:dc:32:e2:92:54:ff:40:29:58:b1:ec:35: d8:44:08:a7:62:a0:4b:c8:b0:09:43:46:3f:2a:2e:59: dd:54:c0:c9:47:05:9d:31:36:d2:c6:89:41:dc:05:69: 7d:08:0e:d8:14:4e:d5:17:a5:2f:99:9f:7d:08:f1:b7: 28:8a:ad:0e:74:79:e0:2f:a0:35:be:5e:17:2c:ea:fb: 9b:61:d2:55:29:df:31:df:04:8c:93:18:03:d9:9c:2c: 72:12:f8:1d:26:44:78:2b:b3:2e:5e:72:e4:75:c8:61: a0:88:89:8c:81:3d:90:e2:d7:65:6c:c3:82:7c:e1:ae: 99:a2:76:28:7b:52:25:c8:de:cb:bf:aa:48:1b:09:18: b8:b2:f6:8a:4c:17:b0:2f:3a:f3:9b:67:39:e1:d2:25: a0:e1:49:10:81:13:8b:be:5c:e3:a6:f3:04:d5:c0:4e: cb:2c:67:b4:dc:58:5e:e1:63:38:60:0e:31:4e:12:ef: 11:3d:a9:d6:a1:19:19:ac:68:f2:39:cb:ab:c5:cd:43: d0:4d:25:01:24:89:6b:a3:36:56:2b:e9:6b:48:f4:b1 Fingerprint (SHA-256): ED:38:F1:6F:8C:56:F7:CF:C1:71:2A:20:1E:CC:22:AB:D5:D4:DD:A7:84:41:77:52:EA:70:CC:6F:B2:11:39:7C Fingerprint (SHA1): 1E:66:E0:D7:1D:6C:F6:DD:63:6D:E1:EF:BA:EC:48:8F:3A:F4:33:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201827 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201828 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320201829 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320201830 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320201831 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320201717.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201832 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201828 (0x1315e464) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:23 2023 Not After : Mon Mar 20 20:19:23 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:d8:d3:c3:ce:02:e9:3d:77:e3:ac:e4:9c:96:73: 49:23:a4:0d:7b:a5:71:9a:17:dd:e2:55:ba:f0:16:04: e2:93:4e:cd:c1:26:72:3b:1e:36:11:56:7f:8a:9e:6e: da:74:dc:da:c7:01:e4:c8:3a:b9:eb:62:2e:96:3a:83: 62:c3:4c:93:82:6f:bf:fa:75:7c:bc:57:9a:51:c9:ff: 59:d9:7f:32:a7:a5:8b:22:5f:f5:d6:dd:58:c9:8e:4c: fd:f0:98:10:6c:2e:a5:9f:f0:98:1e:c2:96:f4:0e:e1: 68:89:bf:b6:28:3f:ac:2b:39:7c:d6:e5:2e:ba:fa:ba: 90:4b:e8:00:6b:28:4b:63:06:19:9d:b3:fd:2d:d0:c0: fa:43:21:59:f9:2f:32:65:1f:fc:67:2b:13:c2:22:50: a7:90:23:6c:d6:a6:74:bd:fa:2f:65:d6:fc:2f:b1:32: 71:34:3d:0c:6a:86:af:ea:f1:0e:c6:db:fa:3e:b0:5a: c5:5f:8e:ce:fb:1a:2b:e9:f1:11:c5:92:df:16:e7:10: 01:a3:e5:51:90:74:4b:ec:43:82:07:f5:73:c3:74:26: f5:be:3a:1a:7a:05:e6:4f:d5:6d:61:a6:be:21:90:33: e1:33:f2:7f:63:89:7f:7e:2b:b3:e1:c1:f7:61:b8:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:20:8b:78:a1:c9:83:90:84:9f:dc:24:16:b7:34:17: fd:32:77:94:77:7c:2a:5d:ce:ef:2c:78:38:7c:06:92: cb:7a:e6:32:03:13:3f:d7:28:14:b6:c8:7c:69:17:fe: e0:91:fb:e9:7f:b4:6e:a2:61:b4:b5:bd:23:a0:21:8b: 0d:ef:64:3c:46:4d:9c:5c:5a:ad:7c:e9:ad:d0:4e:fe: 32:67:08:1a:bf:18:41:ec:f0:e8:a9:79:ac:77:3c:b5: f9:74:24:88:66:cf:af:e1:01:9a:cf:05:89:b8:a7:10: b8:06:62:42:26:02:42:9c:c9:72:24:3d:a3:4c:df:0c: d1:35:0e:d5:5c:53:10:05:ed:f3:de:6f:d7:01:a7:02: 50:b7:69:8c:14:d5:aa:cf:53:93:b0:1a:d0:65:3c:59: c8:1d:f4:b2:8d:ee:7d:a1:5e:76:fa:66:32:32:c0:f5: e6:c0:d3:a0:7e:ce:73:19:78:18:7a:f0:a8:dc:a0:92: 43:b3:53:66:86:8f:a6:bf:ef:c7:e0:64:53:75:5d:89: b3:78:d1:7b:c7:97:15:01:e1:a8:62:cc:cb:13:57:1e: 5e:ca:a6:bb:57:0d:c8:a3:c3:1c:84:de:56:b0:de:dd: 38:57:8f:83:0c:4d:ff:02:92:f3:14:e5:06:85:98:63 Fingerprint (SHA-256): 45:DB:47:8E:47:6E:D0:AB:FC:2B:BF:00:C2:7E:46:2F:02:23:13:EC:26:93:CD:14:B3:81:9D:E0:DF:EA:E4:48 Fingerprint (SHA1): 29:DD:84:53:2A:C9:D4:1A:36:7B:6F:AD:F2:58:5C:EA:FA:71:1F:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201828 (0x1315e464) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:23 2023 Not After : Mon Mar 20 20:19:23 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:d8:d3:c3:ce:02:e9:3d:77:e3:ac:e4:9c:96:73: 49:23:a4:0d:7b:a5:71:9a:17:dd:e2:55:ba:f0:16:04: e2:93:4e:cd:c1:26:72:3b:1e:36:11:56:7f:8a:9e:6e: da:74:dc:da:c7:01:e4:c8:3a:b9:eb:62:2e:96:3a:83: 62:c3:4c:93:82:6f:bf:fa:75:7c:bc:57:9a:51:c9:ff: 59:d9:7f:32:a7:a5:8b:22:5f:f5:d6:dd:58:c9:8e:4c: fd:f0:98:10:6c:2e:a5:9f:f0:98:1e:c2:96:f4:0e:e1: 68:89:bf:b6:28:3f:ac:2b:39:7c:d6:e5:2e:ba:fa:ba: 90:4b:e8:00:6b:28:4b:63:06:19:9d:b3:fd:2d:d0:c0: fa:43:21:59:f9:2f:32:65:1f:fc:67:2b:13:c2:22:50: a7:90:23:6c:d6:a6:74:bd:fa:2f:65:d6:fc:2f:b1:32: 71:34:3d:0c:6a:86:af:ea:f1:0e:c6:db:fa:3e:b0:5a: c5:5f:8e:ce:fb:1a:2b:e9:f1:11:c5:92:df:16:e7:10: 01:a3:e5:51:90:74:4b:ec:43:82:07:f5:73:c3:74:26: f5:be:3a:1a:7a:05:e6:4f:d5:6d:61:a6:be:21:90:33: e1:33:f2:7f:63:89:7f:7e:2b:b3:e1:c1:f7:61:b8:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:20:8b:78:a1:c9:83:90:84:9f:dc:24:16:b7:34:17: fd:32:77:94:77:7c:2a:5d:ce:ef:2c:78:38:7c:06:92: cb:7a:e6:32:03:13:3f:d7:28:14:b6:c8:7c:69:17:fe: e0:91:fb:e9:7f:b4:6e:a2:61:b4:b5:bd:23:a0:21:8b: 0d:ef:64:3c:46:4d:9c:5c:5a:ad:7c:e9:ad:d0:4e:fe: 32:67:08:1a:bf:18:41:ec:f0:e8:a9:79:ac:77:3c:b5: f9:74:24:88:66:cf:af:e1:01:9a:cf:05:89:b8:a7:10: b8:06:62:42:26:02:42:9c:c9:72:24:3d:a3:4c:df:0c: d1:35:0e:d5:5c:53:10:05:ed:f3:de:6f:d7:01:a7:02: 50:b7:69:8c:14:d5:aa:cf:53:93:b0:1a:d0:65:3c:59: c8:1d:f4:b2:8d:ee:7d:a1:5e:76:fa:66:32:32:c0:f5: e6:c0:d3:a0:7e:ce:73:19:78:18:7a:f0:a8:dc:a0:92: 43:b3:53:66:86:8f:a6:bf:ef:c7:e0:64:53:75:5d:89: b3:78:d1:7b:c7:97:15:01:e1:a8:62:cc:cb:13:57:1e: 5e:ca:a6:bb:57:0d:c8:a3:c3:1c:84:de:56:b0:de:dd: 38:57:8f:83:0c:4d:ff:02:92:f3:14:e5:06:85:98:63 Fingerprint (SHA-256): 45:DB:47:8E:47:6E:D0:AB:FC:2B:BF:00:C2:7E:46:2F:02:23:13:EC:26:93:CD:14:B3:81:9D:E0:DF:EA:E4:48 Fingerprint (SHA1): 29:DD:84:53:2A:C9:D4:1A:36:7B:6F:AD:F2:58:5C:EA:FA:71:1F:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201833 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201834 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320201835 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320201836 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320201837 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320201718.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201838 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320201839 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-BridgeNavy-320201719.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320201840 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201834 (0x1315e46a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:28 2023 Not After : Mon Mar 20 20:19:28 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d4:eb:65:82:91:dd:6e:fb:39:63:d7:f1:fb:ea:7e: 38:24:2e:f8:56:ef:8e:9e:d4:7a:46:2a:13:3f:db:af: 6b:e6:da:f6:11:71:62:ae:f3:a3:0c:9a:89:aa:0d:d9: 9d:39:0f:a3:2b:c4:c6:03:32:66:4f:1e:8d:18:d5:9f: 82:fc:47:94:b1:ba:d9:8e:14:5b:09:8d:9e:db:b5:68: 03:6a:20:af:d2:43:d2:6a:aa:a2:62:31:cc:cd:c0:85: 48:ad:e5:09:31:dc:20:f7:f0:fd:0d:84:4a:79:13:e1: b0:b0:27:6e:2d:37:c3:b8:84:29:80:b6:6a:1e:c3:b9: ca:7a:62:0d:fc:fa:68:d3:90:4d:76:e9:33:e7:6f:25: 80:62:6d:3a:19:8b:79:1c:2f:15:87:bf:6b:0a:c3:81: 7b:f7:dc:28:b4:6e:28:d0:04:94:a5:7b:12:59:24:3e: c8:56:2c:f5:50:60:ce:78:e4:0d:ac:a4:83:c8:5f:c7: d2:55:da:83:91:d5:f5:93:37:b4:c9:d9:5d:09:2a:e5: 87:31:37:e6:e3:e1:b8:db:26:02:0f:61:8f:37:cf:f3: 4c:82:37:80:ee:24:4a:fd:ba:02:60:8c:b6:fc:d4:db: 22:bc:ba:3b:e8:94:e1:d8:c8:cc:a4:ae:1b:24:c9:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:31:f6:f0:3c:1a:01:b8:53:9c:5b:45:15:b6:f0:fc: c5:f1:9b:44:0a:ab:d9:ef:28:95:a9:a8:9b:f2:11:50: df:f8:db:a3:46:73:2f:dd:d0:cb:42:55:e0:a1:9f:4e: 94:30:f8:59:49:f0:92:c5:ee:8c:ee:cb:23:14:44:62: 4f:b0:aa:a7:d3:ba:47:88:7d:60:e6:54:74:23:99:34: 1f:de:21:61:47:5a:40:a9:2a:3b:f6:ea:bc:9a:cd:3c: 3e:9a:8f:70:b6:9c:04:bb:84:22:40:0d:0c:94:a3:69: 80:6d:ad:59:4a:b0:f9:80:0a:2b:39:f0:10:48:c5:b6: f2:b6:1b:43:f7:e1:6b:56:f2:c0:10:5c:61:5b:2c:00: 79:26:dc:ff:72:10:4f:38:10:08:62:64:83:0c:29:1d: fe:a0:1a:f9:79:62:b8:7c:47:01:58:4e:0d:95:00:76: 01:62:91:ea:a6:f7:3c:11:3e:cb:7b:74:0b:67:f3:4f: ba:47:40:4d:7a:eb:22:1f:be:d4:7a:26:58:12:e0:91: 0e:aa:63:38:95:04:30:15:fb:51:aa:9c:cd:4e:1b:28: f8:32:ee:ed:2e:72:f4:b1:5d:48:c7:b8:7c:96:50:72: e1:f5:bc:16:cc:d4:be:35:2d:5a:93:d5:bf:13:9d:1e Fingerprint (SHA-256): 26:7A:72:90:F4:AB:A5:D0:05:55:92:7B:5B:5D:AB:ED:F7:13:66:96:76:5F:ED:71:D1:18:43:11:82:1B:82:45 Fingerprint (SHA1): 0A:40:D5:F9:A5:C1:26:14:61:62:06:90:DC:D2:D1:FA:2B:48:0B:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201834 (0x1315e46a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:28 2023 Not After : Mon Mar 20 20:19:28 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d4:eb:65:82:91:dd:6e:fb:39:63:d7:f1:fb:ea:7e: 38:24:2e:f8:56:ef:8e:9e:d4:7a:46:2a:13:3f:db:af: 6b:e6:da:f6:11:71:62:ae:f3:a3:0c:9a:89:aa:0d:d9: 9d:39:0f:a3:2b:c4:c6:03:32:66:4f:1e:8d:18:d5:9f: 82:fc:47:94:b1:ba:d9:8e:14:5b:09:8d:9e:db:b5:68: 03:6a:20:af:d2:43:d2:6a:aa:a2:62:31:cc:cd:c0:85: 48:ad:e5:09:31:dc:20:f7:f0:fd:0d:84:4a:79:13:e1: b0:b0:27:6e:2d:37:c3:b8:84:29:80:b6:6a:1e:c3:b9: ca:7a:62:0d:fc:fa:68:d3:90:4d:76:e9:33:e7:6f:25: 80:62:6d:3a:19:8b:79:1c:2f:15:87:bf:6b:0a:c3:81: 7b:f7:dc:28:b4:6e:28:d0:04:94:a5:7b:12:59:24:3e: c8:56:2c:f5:50:60:ce:78:e4:0d:ac:a4:83:c8:5f:c7: d2:55:da:83:91:d5:f5:93:37:b4:c9:d9:5d:09:2a:e5: 87:31:37:e6:e3:e1:b8:db:26:02:0f:61:8f:37:cf:f3: 4c:82:37:80:ee:24:4a:fd:ba:02:60:8c:b6:fc:d4:db: 22:bc:ba:3b:e8:94:e1:d8:c8:cc:a4:ae:1b:24:c9:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:31:f6:f0:3c:1a:01:b8:53:9c:5b:45:15:b6:f0:fc: c5:f1:9b:44:0a:ab:d9:ef:28:95:a9:a8:9b:f2:11:50: df:f8:db:a3:46:73:2f:dd:d0:cb:42:55:e0:a1:9f:4e: 94:30:f8:59:49:f0:92:c5:ee:8c:ee:cb:23:14:44:62: 4f:b0:aa:a7:d3:ba:47:88:7d:60:e6:54:74:23:99:34: 1f:de:21:61:47:5a:40:a9:2a:3b:f6:ea:bc:9a:cd:3c: 3e:9a:8f:70:b6:9c:04:bb:84:22:40:0d:0c:94:a3:69: 80:6d:ad:59:4a:b0:f9:80:0a:2b:39:f0:10:48:c5:b6: f2:b6:1b:43:f7:e1:6b:56:f2:c0:10:5c:61:5b:2c:00: 79:26:dc:ff:72:10:4f:38:10:08:62:64:83:0c:29:1d: fe:a0:1a:f9:79:62:b8:7c:47:01:58:4e:0d:95:00:76: 01:62:91:ea:a6:f7:3c:11:3e:cb:7b:74:0b:67:f3:4f: ba:47:40:4d:7a:eb:22:1f:be:d4:7a:26:58:12:e0:91: 0e:aa:63:38:95:04:30:15:fb:51:aa:9c:cd:4e:1b:28: f8:32:ee:ed:2e:72:f4:b1:5d:48:c7:b8:7c:96:50:72: e1:f5:bc:16:cc:d4:be:35:2d:5a:93:d5:bf:13:9d:1e Fingerprint (SHA-256): 26:7A:72:90:F4:AB:A5:D0:05:55:92:7B:5B:5D:AB:ED:F7:13:66:96:76:5F:ED:71:D1:18:43:11:82:1B:82:45 Fingerprint (SHA1): 0A:40:D5:F9:A5:C1:26:14:61:62:06:90:DC:D2:D1:FA:2B:48:0B:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201833 (0x1315e469) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:19:27 2023 Not After : Mon Mar 20 20:19:27 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:ae:1f:b3:4b:76:07:f3:97:4a:fd:d7:0e:2d:e9:14: 0f:d3:ed:2d:e7:a6:f8:d3:93:f2:38:5d:75:35:67:79: 50:b8:ca:1a:bf:94:5d:f0:df:eb:a8:e6:24:cf:e8:fd: 4c:08:3e:df:59:dd:5d:25:64:6b:d2:e8:aa:e1:e9:20: 36:ea:4f:d5:fb:c0:2d:4d:ca:a6:ed:22:d1:68:84:b4: c8:69:6a:4b:74:5f:06:a4:2c:20:23:2b:11:a6:84:26: 90:33:6f:8a:1e:40:fd:ae:3f:fc:ae:9e:e9:f5:e0:90: c7:b5:7a:77:a6:9c:85:e4:39:36:ca:6b:42:b8:e7:bf: a9:b1:5e:4c:e5:9f:a9:be:dc:f0:73:72:d1:52:04:87: df:10:9f:a4:c2:3f:9a:2d:03:55:e2:f4:56:e2:97:38: 0e:bc:f2:90:b0:75:4a:d7:f7:ab:29:ab:15:37:8c:e0: a7:c2:48:7c:fa:90:79:7b:88:1a:ed:b3:0a:b6:6e:90: 98:38:d6:b1:11:9e:71:f3:4a:5b:53:c1:61:2f:f9:06: c5:18:45:3e:bc:c0:54:8e:6a:15:8d:18:36:97:0b:dd: 17:a4:18:f9:b3:69:74:90:d4:7e:0e:a7:23:a0:e2:c5: 62:a8:53:75:dc:1c:a3:60:db:53:78:25:79:ba:6c:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:ee:93:99:18:20:c7:bd:9e:73:10:31:8b:af:60:82: 4f:67:dc:be:ac:6a:d8:7f:dc:c9:62:2b:92:50:52:4c: f5:d5:e7:db:85:2c:d1:42:37:09:40:1f:90:ab:6f:4e: ec:31:0e:9e:6a:21:c8:18:7a:1f:a8:81:57:85:6f:5b: ef:ad:a1:38:f8:9a:f1:90:df:67:74:35:43:d4:84:8c: 84:6a:a7:3d:5a:12:e0:e8:60:f7:0e:3e:f2:6c:ec:f0: 2d:3b:19:f0:12:c2:31:8c:b0:1d:4a:77:24:3b:92:e8: f1:d1:85:9e:94:3a:73:18:48:41:b8:0d:fb:b1:49:fc: 96:80:6f:7c:0b:23:fa:14:23:68:b6:97:a0:b8:56:c0: 2a:36:de:16:f8:b9:8d:c9:a2:aa:4b:62:e9:43:36:c7: 00:c7:9c:3c:dd:16:36:8d:50:52:38:e3:a7:a5:e9:b7: 1a:f9:9b:cc:07:e8:ae:53:de:9d:4f:29:b9:71:59:c6: 2b:f7:e2:c7:7f:0d:f2:15:93:51:2f:a8:91:7f:db:bd: 72:97:3d:4b:57:4b:ac:43:94:a0:f0:39:d5:e3:fd:88: ed:2b:a0:d9:ff:4c:20:11:3a:00:33:27:9c:4e:97:96: 45:ab:33:fe:89:13:00:4b:3b:27:38:90:0f:7d:4c:7a Fingerprint (SHA-256): A8:E5:79:47:09:E0:4E:82:ED:FF:2A:7E:03:38:B2:37:EB:D7:12:AB:C8:D2:8B:5A:06:D2:B6:A3:B2:C9:78:6A Fingerprint (SHA1): C5:E9:46:C1:FE:3A:0A:58:07:A8:4E:38:17:64:01:D3:02:ED:BF:9D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201834 (0x1315e46a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:28 2023 Not After : Mon Mar 20 20:19:28 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d4:eb:65:82:91:dd:6e:fb:39:63:d7:f1:fb:ea:7e: 38:24:2e:f8:56:ef:8e:9e:d4:7a:46:2a:13:3f:db:af: 6b:e6:da:f6:11:71:62:ae:f3:a3:0c:9a:89:aa:0d:d9: 9d:39:0f:a3:2b:c4:c6:03:32:66:4f:1e:8d:18:d5:9f: 82:fc:47:94:b1:ba:d9:8e:14:5b:09:8d:9e:db:b5:68: 03:6a:20:af:d2:43:d2:6a:aa:a2:62:31:cc:cd:c0:85: 48:ad:e5:09:31:dc:20:f7:f0:fd:0d:84:4a:79:13:e1: b0:b0:27:6e:2d:37:c3:b8:84:29:80:b6:6a:1e:c3:b9: ca:7a:62:0d:fc:fa:68:d3:90:4d:76:e9:33:e7:6f:25: 80:62:6d:3a:19:8b:79:1c:2f:15:87:bf:6b:0a:c3:81: 7b:f7:dc:28:b4:6e:28:d0:04:94:a5:7b:12:59:24:3e: c8:56:2c:f5:50:60:ce:78:e4:0d:ac:a4:83:c8:5f:c7: d2:55:da:83:91:d5:f5:93:37:b4:c9:d9:5d:09:2a:e5: 87:31:37:e6:e3:e1:b8:db:26:02:0f:61:8f:37:cf:f3: 4c:82:37:80:ee:24:4a:fd:ba:02:60:8c:b6:fc:d4:db: 22:bc:ba:3b:e8:94:e1:d8:c8:cc:a4:ae:1b:24:c9:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:31:f6:f0:3c:1a:01:b8:53:9c:5b:45:15:b6:f0:fc: c5:f1:9b:44:0a:ab:d9:ef:28:95:a9:a8:9b:f2:11:50: df:f8:db:a3:46:73:2f:dd:d0:cb:42:55:e0:a1:9f:4e: 94:30:f8:59:49:f0:92:c5:ee:8c:ee:cb:23:14:44:62: 4f:b0:aa:a7:d3:ba:47:88:7d:60:e6:54:74:23:99:34: 1f:de:21:61:47:5a:40:a9:2a:3b:f6:ea:bc:9a:cd:3c: 3e:9a:8f:70:b6:9c:04:bb:84:22:40:0d:0c:94:a3:69: 80:6d:ad:59:4a:b0:f9:80:0a:2b:39:f0:10:48:c5:b6: f2:b6:1b:43:f7:e1:6b:56:f2:c0:10:5c:61:5b:2c:00: 79:26:dc:ff:72:10:4f:38:10:08:62:64:83:0c:29:1d: fe:a0:1a:f9:79:62:b8:7c:47:01:58:4e:0d:95:00:76: 01:62:91:ea:a6:f7:3c:11:3e:cb:7b:74:0b:67:f3:4f: ba:47:40:4d:7a:eb:22:1f:be:d4:7a:26:58:12:e0:91: 0e:aa:63:38:95:04:30:15:fb:51:aa:9c:cd:4e:1b:28: f8:32:ee:ed:2e:72:f4:b1:5d:48:c7:b8:7c:96:50:72: e1:f5:bc:16:cc:d4:be:35:2d:5a:93:d5:bf:13:9d:1e Fingerprint (SHA-256): 26:7A:72:90:F4:AB:A5:D0:05:55:92:7B:5B:5D:AB:ED:F7:13:66:96:76:5F:ED:71:D1:18:43:11:82:1B:82:45 Fingerprint (SHA1): 0A:40:D5:F9:A5:C1:26:14:61:62:06:90:DC:D2:D1:FA:2B:48:0B:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201834 (0x1315e46a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:28 2023 Not After : Mon Mar 20 20:19:28 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d4:eb:65:82:91:dd:6e:fb:39:63:d7:f1:fb:ea:7e: 38:24:2e:f8:56:ef:8e:9e:d4:7a:46:2a:13:3f:db:af: 6b:e6:da:f6:11:71:62:ae:f3:a3:0c:9a:89:aa:0d:d9: 9d:39:0f:a3:2b:c4:c6:03:32:66:4f:1e:8d:18:d5:9f: 82:fc:47:94:b1:ba:d9:8e:14:5b:09:8d:9e:db:b5:68: 03:6a:20:af:d2:43:d2:6a:aa:a2:62:31:cc:cd:c0:85: 48:ad:e5:09:31:dc:20:f7:f0:fd:0d:84:4a:79:13:e1: b0:b0:27:6e:2d:37:c3:b8:84:29:80:b6:6a:1e:c3:b9: ca:7a:62:0d:fc:fa:68:d3:90:4d:76:e9:33:e7:6f:25: 80:62:6d:3a:19:8b:79:1c:2f:15:87:bf:6b:0a:c3:81: 7b:f7:dc:28:b4:6e:28:d0:04:94:a5:7b:12:59:24:3e: c8:56:2c:f5:50:60:ce:78:e4:0d:ac:a4:83:c8:5f:c7: d2:55:da:83:91:d5:f5:93:37:b4:c9:d9:5d:09:2a:e5: 87:31:37:e6:e3:e1:b8:db:26:02:0f:61:8f:37:cf:f3: 4c:82:37:80:ee:24:4a:fd:ba:02:60:8c:b6:fc:d4:db: 22:bc:ba:3b:e8:94:e1:d8:c8:cc:a4:ae:1b:24:c9:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:31:f6:f0:3c:1a:01:b8:53:9c:5b:45:15:b6:f0:fc: c5:f1:9b:44:0a:ab:d9:ef:28:95:a9:a8:9b:f2:11:50: df:f8:db:a3:46:73:2f:dd:d0:cb:42:55:e0:a1:9f:4e: 94:30:f8:59:49:f0:92:c5:ee:8c:ee:cb:23:14:44:62: 4f:b0:aa:a7:d3:ba:47:88:7d:60:e6:54:74:23:99:34: 1f:de:21:61:47:5a:40:a9:2a:3b:f6:ea:bc:9a:cd:3c: 3e:9a:8f:70:b6:9c:04:bb:84:22:40:0d:0c:94:a3:69: 80:6d:ad:59:4a:b0:f9:80:0a:2b:39:f0:10:48:c5:b6: f2:b6:1b:43:f7:e1:6b:56:f2:c0:10:5c:61:5b:2c:00: 79:26:dc:ff:72:10:4f:38:10:08:62:64:83:0c:29:1d: fe:a0:1a:f9:79:62:b8:7c:47:01:58:4e:0d:95:00:76: 01:62:91:ea:a6:f7:3c:11:3e:cb:7b:74:0b:67:f3:4f: ba:47:40:4d:7a:eb:22:1f:be:d4:7a:26:58:12:e0:91: 0e:aa:63:38:95:04:30:15:fb:51:aa:9c:cd:4e:1b:28: f8:32:ee:ed:2e:72:f4:b1:5d:48:c7:b8:7c:96:50:72: e1:f5:bc:16:cc:d4:be:35:2d:5a:93:d5:bf:13:9d:1e Fingerprint (SHA-256): 26:7A:72:90:F4:AB:A5:D0:05:55:92:7B:5B:5D:AB:ED:F7:13:66:96:76:5F:ED:71:D1:18:43:11:82:1B:82:45 Fingerprint (SHA1): 0A:40:D5:F9:A5:C1:26:14:61:62:06:90:DC:D2:D1:FA:2B:48:0B:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201841 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201842 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 320201843 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 320201844 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 320201845 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 320201846 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320201847 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320201848 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201849 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320201850 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201841 (0x1315e471) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:19:32 2023 Not After : Mon Mar 20 20:19:32 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ba:b4:64:5f:82:21:ae:19:f4:81:64:a0:f2:6e:3a: e2:84:f5:2c:6d:40:31:af:cc:1e:b5:cd:6d:0f:8f:75: 8a:ce:c2:17:01:3f:a6:c0:7d:c6:ab:35:35:9f:92:7e: e6:be:f4:a7:fa:03:88:12:ef:2f:68:01:95:bc:6d:94: 31:9e:60:ea:b2:de:16:11:2d:74:cf:ad:33:df:30:78: d2:3d:ef:35:f5:47:45:18:fe:fe:ac:0b:bc:4e:c5:7f: 39:30:bd:ed:8a:2f:b0:7f:37:0f:f0:50:91:4a:fe:01: 70:1b:aa:0c:d5:b7:c9:5b:19:23:f4:c6:52:5b:a7:02: fc:15:31:cb:97:48:85:f8:0b:14:a2:3d:e4:24:8c:bb: ad:ea:ec:40:93:84:41:80:40:d3:27:d8:2e:da:7d:43: 59:89:cc:6d:23:14:af:c3:c3:b5:72:3b:ea:d6:6b:0f: 2f:9d:a3:2f:06:55:c6:ec:9a:ca:f7:18:58:c7:77:c5: e7:b7:12:8e:81:85:7d:cb:34:89:65:76:b6:20:f1:30: 37:b9:92:8e:b4:e7:70:9e:3a:fd:24:4c:c5:c0:9a:8d: 7c:1b:96:ad:da:b8:68:6d:1b:e0:e6:13:18:e5:04:df: cd:c4:f2:93:2c:f4:db:ed:47:69:11:ab:43:5b:9b:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:b7:31:06:04:78:a3:fd:59:4a:7a:73:df:6c:44:0d: 5a:f4:3f:d4:c7:39:de:17:76:c3:83:54:71:07:54:e2: 70:4e:41:c0:ce:3e:8b:3c:0f:a5:2f:22:ae:f4:76:bd: 22:e1:90:1b:29:ac:a4:d9:2c:16:0b:ae:bb:d8:f7:36: 4d:ca:e7:ea:09:bd:53:4a:ce:c6:03:4d:83:8b:bd:af: d3:c0:df:6c:21:8f:96:f8:47:f5:33:03:3d:37:9b:a8: aa:20:ed:17:8d:07:f3:84:34:90:12:f3:54:a6:b6:9f: 09:96:ee:42:f4:3c:f9:5b:cf:16:4d:2b:b7:49:87:34: 98:ec:71:05:98:5f:74:3b:8d:04:a0:f7:e2:85:71:21: 9a:e4:96:97:8b:18:0b:a8:5e:5d:79:7d:6d:f9:e8:30: 8b:c1:e0:73:f6:99:fb:0d:fb:63:54:48:7c:46:98:28: 36:9f:22:25:77:01:8b:a0:e7:c9:f6:26:1a:80:a9:19: 9b:d1:67:9b:fa:2e:5a:0f:6b:e2:02:ec:85:b5:2a:da: 4b:96:a4:4b:4c:72:d8:ab:56:ac:3d:9c:f5:cd:d0:19: d1:45:68:48:93:7e:a6:6e:67:17:df:a1:9d:fe:9e:ba: 78:de:95:86:0a:23:9f:a8:53:4d:5f:72:6f:f9:87:69 Fingerprint (SHA-256): C8:3F:C6:AE:79:6D:27:E7:4A:7A:3A:6C:FB:27:8E:B1:C1:00:33:27:C1:5B:22:CD:86:3F:C3:1A:2E:32:B1:6B Fingerprint (SHA1): A5:98:79:87:3E:2D:A8:21:C7:B2:F4:7F:A0:B7:E8:7C:DB:C9:DD:52 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201842 (0x1315e472) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:19:33 2023 Not After : Mon Mar 20 20:19:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:23:35:a0:ed:ff:5c:5b:df:f2:f1:10:2c:8e:dc:0e: 02:7e:e7:d3:9f:71:8e:f0:f5:4b:22:61:39:c6:06:25: 9c:7b:2f:32:b0:15:4d:df:a8:b4:1c:2b:9c:0a:05:d3: df:03:68:54:81:df:94:ee:83:2f:4a:48:4b:13:ff:1d: b0:80:c2:3b:45:a5:19:be:58:d7:58:af:65:b2:ff:74: 77:b2:f8:11:c3:50:1c:16:43:60:80:d0:2b:fe:33:2d: 43:fb:04:6b:d7:60:c7:13:03:6e:3a:fe:5e:dc:30:73: 6a:00:05:d4:31:36:1a:24:c8:9e:19:a1:55:0c:5a:3b: 85:57:61:28:5c:10:0b:7e:ce:3d:24:b3:0b:2d:fa:ba: e5:b8:b0:62:f6:db:09:9b:91:af:b9:bd:d3:4a:4e:74: c5:fd:aa:9b:c7:7d:b3:04:2f:dd:fc:f7:3c:c9:7f:49: 7e:d7:0c:45:a1:ec:92:6d:42:48:c2:dc:f5:9d:ba:65: 48:32:8d:be:22:16:da:1d:ea:7b:84:cf:c7:f3:95:38: c6:90:21:36:14:e5:99:80:75:c8:08:a3:b3:1c:e8:42: 58:87:57:d1:59:4c:7d:fd:93:28:0f:62:91:00:e8:55: db:6c:9a:86:b2:e7:88:b7:0e:44:27:ad:52:98:bc:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:1b:89:56:c7:cb:f9:59:4f:53:6c:9c:8b:28:9e:8c: fb:b7:05:96:6f:1c:01:09:19:99:3b:3b:cf:a4:ba:0a: c8:47:f3:d7:c8:95:75:b5:82:94:7e:56:49:68:53:cf: 81:66:9a:3b:21:3c:f0:4d:21:8e:92:9b:96:14:f6:9d: fa:61:42:64:bc:84:ae:c5:8b:bf:46:05:a5:ff:a1:c3: 75:bc:ad:ab:da:c7:17:7d:b2:f4:9e:dc:d9:4e:41:e8: da:7b:a3:a7:90:49:e0:8e:e2:2c:97:21:3b:e9:53:c2: 36:bb:36:d3:b2:a1:dd:6c:9f:34:32:18:bd:58:1b:0d: 7f:32:ac:a8:17:cc:f3:16:d2:bf:e8:d3:19:c5:05:3a: ef:50:7d:2a:5f:21:75:98:99:82:4f:6b:34:34:5f:d8: 84:90:72:58:bd:b9:5a:2e:de:75:3c:91:15:f6:6f:83: cb:5f:ea:12:03:80:71:53:b3:2c:2f:50:a1:ee:73:6d: df:dc:bb:fc:e4:f5:cf:41:ea:40:f2:10:4a:06:30:40: 43:27:75:f6:69:4d:9f:bb:66:ea:f4:6d:79:2d:68:40: af:e8:01:5a:83:a6:13:a0:c3:ac:56:27:16:58:63:6a: 17:ff:5e:47:f1:66:8b:0f:df:4f:de:b6:54:12:f4:cd Fingerprint (SHA-256): 21:33:34:75:1D:93:DC:3A:C8:B0:76:29:35:12:E1:86:E3:FD:09:4D:60:DF:8A:77:2C:89:B0:B5:80:6D:80:28 Fingerprint (SHA1): 26:58:D9:BA:CC:1B:4F:4D:4B:C6:06:70:28:4E:5F:A7:6C:5D:EA:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201851 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201852 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201853 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 320201854 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320201855 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 320201856 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 320201857 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 320201858 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 320201859 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201851 (0x1315e47b) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:42 2023 Not After : Mon Mar 20 20:19:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b7:d6:90:3a:0a:14:cc:0a:e0:fb:a5:45:fe:9d:5c:98: d0:d8:dc:05:4b:73:23:a3:3e:7d:9c:a3:ad:ef:7c:24: 75:97:3b:77:34:88:fc:80:9d:a8:fb:1d:29:20:09:82: c6:ef:bd:99:fd:5e:ce:bd:36:8c:66:3e:60:52:f7:68: 58:e9:2e:ff:6b:8d:9e:28:c2:f0:33:f4:36:4e:0d:08: 70:6f:4a:42:bd:7b:44:9c:63:68:54:ff:f9:6a:28:e1: b6:1d:d3:da:e0:af:b8:c8:ac:90:04:23:c9:54:d6:07: 46:cb:e5:85:1b:f4:c8:fe:d7:b1:f3:fa:c0:74:25:7f: a1:86:25:bc:5f:97:42:66:59:a5:27:97:5a:79:5f:4c: 4e:94:73:f3:27:7b:08:a6:fc:9f:b4:27:45:a4:4d:cc: 58:b0:00:89:07:ab:d4:ae:b2:df:7b:97:8c:14:65:d9: 74:96:ba:41:27:0f:8b:dc:8e:a4:6e:90:7f:12:7a:46: 57:88:44:f2:cc:93:97:23:b2:55:1e:8f:a0:0f:48:97: 60:52:bd:94:19:bd:95:70:7c:ef:a7:0f:ab:d7:61:56: f1:10:7c:ee:ef:7e:7b:d3:2c:c7:6a:45:cc:d5:20:2b: aa:1d:6b:dd:79:c9:58:ad:ab:10:41:07:bf:1a:fa:2b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:76:fe:b7:e6:59:6e:61:ce:16:ca:5a:3d: 45:b8:8e:f1:87:05:8a:35:d7:15:64:78:fa:85:87:93: 02:1d:00:89:ca:89:01:8d:03:16:fd:2f:38:a3:b6:fd: 61:5a:5d:f0:43:a0:10:cf:02:0a:06:43:a4:1f:e2 Fingerprint (SHA-256): 02:78:4B:13:4C:55:6E:8C:F3:5F:51:3F:57:C0:9A:DC:AD:A2:50:58:5D:D7:7B:A0:F5:6E:0C:99:53:B2:9F:80 Fingerprint (SHA1): D8:8E:E9:2A:3D:5A:01:61:57:E3:D1:D9:01:5F:7C:B8:5A:62:92:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201851 (0x1315e47b) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:42 2023 Not After : Mon Mar 20 20:19:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b7:d6:90:3a:0a:14:cc:0a:e0:fb:a5:45:fe:9d:5c:98: d0:d8:dc:05:4b:73:23:a3:3e:7d:9c:a3:ad:ef:7c:24: 75:97:3b:77:34:88:fc:80:9d:a8:fb:1d:29:20:09:82: c6:ef:bd:99:fd:5e:ce:bd:36:8c:66:3e:60:52:f7:68: 58:e9:2e:ff:6b:8d:9e:28:c2:f0:33:f4:36:4e:0d:08: 70:6f:4a:42:bd:7b:44:9c:63:68:54:ff:f9:6a:28:e1: b6:1d:d3:da:e0:af:b8:c8:ac:90:04:23:c9:54:d6:07: 46:cb:e5:85:1b:f4:c8:fe:d7:b1:f3:fa:c0:74:25:7f: a1:86:25:bc:5f:97:42:66:59:a5:27:97:5a:79:5f:4c: 4e:94:73:f3:27:7b:08:a6:fc:9f:b4:27:45:a4:4d:cc: 58:b0:00:89:07:ab:d4:ae:b2:df:7b:97:8c:14:65:d9: 74:96:ba:41:27:0f:8b:dc:8e:a4:6e:90:7f:12:7a:46: 57:88:44:f2:cc:93:97:23:b2:55:1e:8f:a0:0f:48:97: 60:52:bd:94:19:bd:95:70:7c:ef:a7:0f:ab:d7:61:56: f1:10:7c:ee:ef:7e:7b:d3:2c:c7:6a:45:cc:d5:20:2b: aa:1d:6b:dd:79:c9:58:ad:ab:10:41:07:bf:1a:fa:2b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:76:fe:b7:e6:59:6e:61:ce:16:ca:5a:3d: 45:b8:8e:f1:87:05:8a:35:d7:15:64:78:fa:85:87:93: 02:1d:00:89:ca:89:01:8d:03:16:fd:2f:38:a3:b6:fd: 61:5a:5d:f0:43:a0:10:cf:02:0a:06:43:a4:1f:e2 Fingerprint (SHA-256): 02:78:4B:13:4C:55:6E:8C:F3:5F:51:3F:57:C0:9A:DC:AD:A2:50:58:5D:D7:7B:A0:F5:6E:0C:99:53:B2:9F:80 Fingerprint (SHA1): D8:8E:E9:2A:3D:5A:01:61:57:E3:D1:D9:01:5F:7C:B8:5A:62:92:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201851 (0x1315e47b) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:42 2023 Not After : Mon Mar 20 20:19:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b7:d6:90:3a:0a:14:cc:0a:e0:fb:a5:45:fe:9d:5c:98: d0:d8:dc:05:4b:73:23:a3:3e:7d:9c:a3:ad:ef:7c:24: 75:97:3b:77:34:88:fc:80:9d:a8:fb:1d:29:20:09:82: c6:ef:bd:99:fd:5e:ce:bd:36:8c:66:3e:60:52:f7:68: 58:e9:2e:ff:6b:8d:9e:28:c2:f0:33:f4:36:4e:0d:08: 70:6f:4a:42:bd:7b:44:9c:63:68:54:ff:f9:6a:28:e1: b6:1d:d3:da:e0:af:b8:c8:ac:90:04:23:c9:54:d6:07: 46:cb:e5:85:1b:f4:c8:fe:d7:b1:f3:fa:c0:74:25:7f: a1:86:25:bc:5f:97:42:66:59:a5:27:97:5a:79:5f:4c: 4e:94:73:f3:27:7b:08:a6:fc:9f:b4:27:45:a4:4d:cc: 58:b0:00:89:07:ab:d4:ae:b2:df:7b:97:8c:14:65:d9: 74:96:ba:41:27:0f:8b:dc:8e:a4:6e:90:7f:12:7a:46: 57:88:44:f2:cc:93:97:23:b2:55:1e:8f:a0:0f:48:97: 60:52:bd:94:19:bd:95:70:7c:ef:a7:0f:ab:d7:61:56: f1:10:7c:ee:ef:7e:7b:d3:2c:c7:6a:45:cc:d5:20:2b: aa:1d:6b:dd:79:c9:58:ad:ab:10:41:07:bf:1a:fa:2b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:76:fe:b7:e6:59:6e:61:ce:16:ca:5a:3d: 45:b8:8e:f1:87:05:8a:35:d7:15:64:78:fa:85:87:93: 02:1d:00:89:ca:89:01:8d:03:16:fd:2f:38:a3:b6:fd: 61:5a:5d:f0:43:a0:10:cf:02:0a:06:43:a4:1f:e2 Fingerprint (SHA-256): 02:78:4B:13:4C:55:6E:8C:F3:5F:51:3F:57:C0:9A:DC:AD:A2:50:58:5D:D7:7B:A0:F5:6E:0C:99:53:B2:9F:80 Fingerprint (SHA1): D8:8E:E9:2A:3D:5A:01:61:57:E3:D1:D9:01:5F:7C:B8:5A:62:92:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201851 (0x1315e47b) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:42 2023 Not After : Mon Mar 20 20:19:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b7:d6:90:3a:0a:14:cc:0a:e0:fb:a5:45:fe:9d:5c:98: d0:d8:dc:05:4b:73:23:a3:3e:7d:9c:a3:ad:ef:7c:24: 75:97:3b:77:34:88:fc:80:9d:a8:fb:1d:29:20:09:82: c6:ef:bd:99:fd:5e:ce:bd:36:8c:66:3e:60:52:f7:68: 58:e9:2e:ff:6b:8d:9e:28:c2:f0:33:f4:36:4e:0d:08: 70:6f:4a:42:bd:7b:44:9c:63:68:54:ff:f9:6a:28:e1: b6:1d:d3:da:e0:af:b8:c8:ac:90:04:23:c9:54:d6:07: 46:cb:e5:85:1b:f4:c8:fe:d7:b1:f3:fa:c0:74:25:7f: a1:86:25:bc:5f:97:42:66:59:a5:27:97:5a:79:5f:4c: 4e:94:73:f3:27:7b:08:a6:fc:9f:b4:27:45:a4:4d:cc: 58:b0:00:89:07:ab:d4:ae:b2:df:7b:97:8c:14:65:d9: 74:96:ba:41:27:0f:8b:dc:8e:a4:6e:90:7f:12:7a:46: 57:88:44:f2:cc:93:97:23:b2:55:1e:8f:a0:0f:48:97: 60:52:bd:94:19:bd:95:70:7c:ef:a7:0f:ab:d7:61:56: f1:10:7c:ee:ef:7e:7b:d3:2c:c7:6a:45:cc:d5:20:2b: aa:1d:6b:dd:79:c9:58:ad:ab:10:41:07:bf:1a:fa:2b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:76:fe:b7:e6:59:6e:61:ce:16:ca:5a:3d: 45:b8:8e:f1:87:05:8a:35:d7:15:64:78:fa:85:87:93: 02:1d:00:89:ca:89:01:8d:03:16:fd:2f:38:a3:b6:fd: 61:5a:5d:f0:43:a0:10:cf:02:0a:06:43:a4:1f:e2 Fingerprint (SHA-256): 02:78:4B:13:4C:55:6E:8C:F3:5F:51:3F:57:C0:9A:DC:AD:A2:50:58:5D:D7:7B:A0:F5:6E:0C:99:53:B2:9F:80 Fingerprint (SHA1): D8:8E:E9:2A:3D:5A:01:61:57:E3:D1:D9:01:5F:7C:B8:5A:62:92:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320201951Z nextupdate=20240320201951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 20:19:51 2023 Next Update: Wed Mar 20 20:19:51 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320201951Z nextupdate=20240320201951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:19:51 2023 Next Update: Wed Mar 20 20:19:51 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320201951Z nextupdate=20240320201951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 20:19:51 2023 Next Update: Wed Mar 20 20:19:51 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320201951Z nextupdate=20240320201951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 20:19:51 2023 Next Update: Wed Mar 20 20:19:51 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320201952Z addcert 14 20230320201952Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 20:19:52 2023 Next Update: Wed Mar 20 20:19:51 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 20 20:19:52 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320201953Z addcert 15 20230320201953Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:19:53 2023 Next Update: Wed Mar 20 20:19:51 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 20 20:19:53 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:47 2023 Not After : Mon Mar 20 20:19:47 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:55:58:16:b3:7e:25:96:22:92:94:44:02:69:fd:e5: 55:d6:c5:66:fe:4c:cb:8a:39:5b:03:da:72:29:81:3e: d3:39:21:4f:a1:27:c8:1d:b0:5a:f6:32:71:11:4d:9f: 12:bc:1a:d3:15:a6:a6:85:30:00:71:b6:76:8f:6a:0c: 69:81:d6:07:e4:36:7c:8d:6b:05:bb:7c:b3:fa:72:03: 4b:47:3e:56:fd:dc:fc:cc:c6:df:6d:c0:9d:c8:d1:37: 2c:83:1c:be:19:be:bc:1c:27:12:91:b3:59:66:e7:e6: f8:88:b4:20:e3:d5:bf:9f:7d:3f:f6:b3:be:46:43:25: 25:d2:30:d3:c7:c8:59:89:e4:72:a9:82:af:b0:2e:85: 93:83:43:58:dc:87:df:79:54:12:ce:a5:ef:78:28:62: 8b:42:a5:84:5f:b5:cc:d4:0a:01:62:c6:c7:79:e6:94: ed:6a:da:32:ab:1f:39:6e:a5:b7:a4:8c:ec:c1:8d:4c: b5:eb:77:c3:83:89:f6:70:96:a7:56:38:d3:80:73:80: c9:a8:53:67:e7:95:2f:aa:95:29:d5:7c:2c:47:a4:02: 41:06:2e:41:43:0f:97:35:b3:f2:42:5d:21:2a:02:ee: 7b:9e:6d:e4:e8:8a:5a:33:48:64:5b:3f:cb:8e:ac:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:e6:93:7b:59:da:e4:df:d3:f3:4d:db:c1:88:2e:34: 81:fe:67:64:cd:77:e7:c8:40:c9:51:9a:b9:8d:e3:bc: 70:a9:eb:8c:f3:fa:b1:e3:f4:36:75:80:33:ce:3d:c2: d5:7a:7b:d0:3e:ac:cd:30:36:f3:9e:be:68:c6:13:a3: f0:65:ca:9f:b7:62:85:9e:12:00:34:92:3f:48:a8:ea: 63:34:ad:7a:20:40:f6:7a:fc:54:da:f6:6a:4b:9d:cd: f1:79:1d:f3:27:03:34:ef:dc:f7:3e:6a:ee:8e:9d:c6: b1:17:11:ad:7b:c2:f6:28:9f:60:e0:85:02:de:3a:2d: 94:4e:18:fb:08:f0:6b:04:39:8d:e3:cc:26:7f:81:4c: b4:02:79:af:e3:b9:87:c6:60:ff:0b:c5:c2:c2:c1:00: 5f:ba:dc:a4:84:dd:75:6b:0e:b8:a4:27:64:a7:99:f2: 9c:6c:8f:f2:cc:ee:26:9b:4a:84:24:26:04:6e:1c:e2: 54:d8:7f:b6:d6:ba:4a:f4:53:55:13:cf:d0:a7:1b:b6: 56:60:d2:22:9d:a8:a7:6c:46:0b:8d:30:02:4a:8c:50: 58:21:3f:ed:79:ea:30:c4:74:24:ce:bb:d5:6a:8c:15: f0:cc:ca:49:e7:39:aa:65:b8:3c:41:80:31:27:99:1e Fingerprint (SHA-256): 79:19:59:84:BE:A9:7E:00:8C:5F:AC:2F:79:6F:71:7D:F0:D4:4F:77:C5:A9:B1:40:F8:6E:8C:73:C8:0A:0B:E0 Fingerprint (SHA1): 9C:90:0C:CB:9A:77:D1:D2:FC:CA:4F:C5:56:12:20:69:03:7A:1A:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:47 2023 Not After : Mon Mar 20 20:19:47 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:55:58:16:b3:7e:25:96:22:92:94:44:02:69:fd:e5: 55:d6:c5:66:fe:4c:cb:8a:39:5b:03:da:72:29:81:3e: d3:39:21:4f:a1:27:c8:1d:b0:5a:f6:32:71:11:4d:9f: 12:bc:1a:d3:15:a6:a6:85:30:00:71:b6:76:8f:6a:0c: 69:81:d6:07:e4:36:7c:8d:6b:05:bb:7c:b3:fa:72:03: 4b:47:3e:56:fd:dc:fc:cc:c6:df:6d:c0:9d:c8:d1:37: 2c:83:1c:be:19:be:bc:1c:27:12:91:b3:59:66:e7:e6: f8:88:b4:20:e3:d5:bf:9f:7d:3f:f6:b3:be:46:43:25: 25:d2:30:d3:c7:c8:59:89:e4:72:a9:82:af:b0:2e:85: 93:83:43:58:dc:87:df:79:54:12:ce:a5:ef:78:28:62: 8b:42:a5:84:5f:b5:cc:d4:0a:01:62:c6:c7:79:e6:94: ed:6a:da:32:ab:1f:39:6e:a5:b7:a4:8c:ec:c1:8d:4c: b5:eb:77:c3:83:89:f6:70:96:a7:56:38:d3:80:73:80: c9:a8:53:67:e7:95:2f:aa:95:29:d5:7c:2c:47:a4:02: 41:06:2e:41:43:0f:97:35:b3:f2:42:5d:21:2a:02:ee: 7b:9e:6d:e4:e8:8a:5a:33:48:64:5b:3f:cb:8e:ac:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:e6:93:7b:59:da:e4:df:d3:f3:4d:db:c1:88:2e:34: 81:fe:67:64:cd:77:e7:c8:40:c9:51:9a:b9:8d:e3:bc: 70:a9:eb:8c:f3:fa:b1:e3:f4:36:75:80:33:ce:3d:c2: d5:7a:7b:d0:3e:ac:cd:30:36:f3:9e:be:68:c6:13:a3: f0:65:ca:9f:b7:62:85:9e:12:00:34:92:3f:48:a8:ea: 63:34:ad:7a:20:40:f6:7a:fc:54:da:f6:6a:4b:9d:cd: f1:79:1d:f3:27:03:34:ef:dc:f7:3e:6a:ee:8e:9d:c6: b1:17:11:ad:7b:c2:f6:28:9f:60:e0:85:02:de:3a:2d: 94:4e:18:fb:08:f0:6b:04:39:8d:e3:cc:26:7f:81:4c: b4:02:79:af:e3:b9:87:c6:60:ff:0b:c5:c2:c2:c1:00: 5f:ba:dc:a4:84:dd:75:6b:0e:b8:a4:27:64:a7:99:f2: 9c:6c:8f:f2:cc:ee:26:9b:4a:84:24:26:04:6e:1c:e2: 54:d8:7f:b6:d6:ba:4a:f4:53:55:13:cf:d0:a7:1b:b6: 56:60:d2:22:9d:a8:a7:6c:46:0b:8d:30:02:4a:8c:50: 58:21:3f:ed:79:ea:30:c4:74:24:ce:bb:d5:6a:8c:15: f0:cc:ca:49:e7:39:aa:65:b8:3c:41:80:31:27:99:1e Fingerprint (SHA-256): 79:19:59:84:BE:A9:7E:00:8C:5F:AC:2F:79:6F:71:7D:F0:D4:4F:77:C5:A9:B1:40:F8:6E:8C:73:C8:0A:0B:E0 Fingerprint (SHA1): 9C:90:0C:CB:9A:77:D1:D2:FC:CA:4F:C5:56:12:20:69:03:7A:1A:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201860 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 320201861 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201736.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201720.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201736.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 320201862 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201736.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201721.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 320201863 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201736.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201722.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201736.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201723.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320202000Z nextupdate=20240320202000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 20:20:00 2023 Next Update: Wed Mar 20 20:20:00 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202000Z nextupdate=20240320202000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:20:00 2023 Next Update: Wed Mar 20 20:20:00 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320202000Z nextupdate=20240320202000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 20:20:00 2023 Next Update: Wed Mar 20 20:20:00 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320202000Z nextupdate=20240320202000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 20:20:00 2023 Next Update: Wed Mar 20 20:20:00 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202001Z addcert 20 20230320202001Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:20:01 2023 Next Update: Wed Mar 20 20:20:00 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 20:20:01 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202002Z addcert 40 20230320202002Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:20:02 2023 Next Update: Wed Mar 20 20:20:00 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 20:20:01 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 20:20:02 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201860 (0x1315e484) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:54 2023 Not After : Mon Mar 20 20:19:54 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:0f:ce:6a:eb:35:e2:96:fd:17:b8:4b:33:1f:a0:a0: fa:a9:15:b6:19:05:64:8f:ee:eb:95:f6:d3:1c:88:7c: 2c:bc:9e:b1:55:97:80:de:00:46:8b:88:cf:63:c9:80: d5:84:a9:6d:c9:9e:6f:4f:38:52:ab:e7:90:91:b2:4e: 30:5e:4c:5c:00:de:5f:06:8e:66:cc:7a:f2:04:5b:d6: a7:3f:72:ea:b1:7b:6d:02:60:4b:21:91:14:56:fd:22: af:2f:7a:3a:91:3f:1c:0b:16:b9:ef:7a:18:d8:2c:bd: bf:6e:04:4e:a6:cc:e8:fd:f7:67:8c:35:ae:16:1b:92: ed:3d:21:b5:aa:15:11:24:14:00:37:21:46:01:b1:9e: f0:3b:c6:73:1e:46:04:8e:56:c2:e5:dd:d4:75:bb:55: 3d:a1:bb:10:45:a2:03:2d:69:54:42:90:27:01:32:94: da:83:a2:77:a9:3a:94:82:5a:f3:7e:79:38:03:0b:13: 69:d5:30:54:e9:1b:02:8b:76:56:3e:e0:e0:48:f8:1e: e0:c8:b8:ec:98:34:19:76:0f:e1:f3:70:64:a2:c5:7b: 18:21:77:91:9c:b3:fc:68:ab:09:70:19:06:28:57:10: 70:92:8e:86:68:6c:ed:0f:a7:1a:2b:8e:64:af:5e:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:32:cb:57:a1:c5:c5:b1:2a:d5:51:69:3d:ef:2f:d7: 91:61:1c:b0:07:62:45:5a:88:93:2e:a2:45:bb:1c:42: cf:da:24:2f:93:83:96:06:95:3a:45:07:de:4d:7b:fc: a3:70:9b:ce:3b:19:c7:12:a8:58:f7:d3:a7:b1:08:82: 68:89:f8:23:27:d4:8e:1d:92:b5:84:e6:40:03:52:49: bd:b9:aa:55:bf:22:d7:e7:51:26:da:40:ba:72:3f:e9: b0:bc:7e:c8:d0:a8:9d:f3:b2:50:b9:d5:37:d6:2e:48: d1:8e:d8:36:d7:58:43:4a:8a:b6:3b:2f:9c:07:8c:2c: cf:39:b7:c3:8f:00:c5:80:bd:af:a7:e1:98:c6:62:8d: 94:91:2b:36:ab:74:2e:8b:7b:e3:27:9f:8e:da:18:b5: 19:e1:7a:38:d8:d0:73:a2:7c:c8:77:9d:7c:aa:6f:d0: 02:4c:8f:99:4f:79:08:2d:d4:f9:56:a8:42:86:1d:10: 18:97:63:92:4f:7e:4d:28:94:a9:8d:6a:a6:a7:f2:ce: d6:98:39:62:41:21:d0:c8:3a:97:aa:55:12:77:d4:1f: 23:c4:de:5b:5b:d9:8d:8f:3b:c3:ac:6d:6b:c2:2e:57: 13:73:24:71:5b:b9:b9:5e:44:9d:54:29:3a:e1:38:63 Fingerprint (SHA-256): EC:F7:8B:3C:12:B2:B9:82:68:41:DA:AD:D6:A9:E1:3A:E2:8A:33:0D:22:BE:9B:24:56:73:4F:52:B4:60:1E:D0 Fingerprint (SHA1): 4C:91:8D:85:12:F4:5A:7D:3F:1F:A8:8F:A3:4A:FA:F8:45:E3:98:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201860 (0x1315e484) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:19:54 2023 Not After : Mon Mar 20 20:19:54 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:0f:ce:6a:eb:35:e2:96:fd:17:b8:4b:33:1f:a0:a0: fa:a9:15:b6:19:05:64:8f:ee:eb:95:f6:d3:1c:88:7c: 2c:bc:9e:b1:55:97:80:de:00:46:8b:88:cf:63:c9:80: d5:84:a9:6d:c9:9e:6f:4f:38:52:ab:e7:90:91:b2:4e: 30:5e:4c:5c:00:de:5f:06:8e:66:cc:7a:f2:04:5b:d6: a7:3f:72:ea:b1:7b:6d:02:60:4b:21:91:14:56:fd:22: af:2f:7a:3a:91:3f:1c:0b:16:b9:ef:7a:18:d8:2c:bd: bf:6e:04:4e:a6:cc:e8:fd:f7:67:8c:35:ae:16:1b:92: ed:3d:21:b5:aa:15:11:24:14:00:37:21:46:01:b1:9e: f0:3b:c6:73:1e:46:04:8e:56:c2:e5:dd:d4:75:bb:55: 3d:a1:bb:10:45:a2:03:2d:69:54:42:90:27:01:32:94: da:83:a2:77:a9:3a:94:82:5a:f3:7e:79:38:03:0b:13: 69:d5:30:54:e9:1b:02:8b:76:56:3e:e0:e0:48:f8:1e: e0:c8:b8:ec:98:34:19:76:0f:e1:f3:70:64:a2:c5:7b: 18:21:77:91:9c:b3:fc:68:ab:09:70:19:06:28:57:10: 70:92:8e:86:68:6c:ed:0f:a7:1a:2b:8e:64:af:5e:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:32:cb:57:a1:c5:c5:b1:2a:d5:51:69:3d:ef:2f:d7: 91:61:1c:b0:07:62:45:5a:88:93:2e:a2:45:bb:1c:42: cf:da:24:2f:93:83:96:06:95:3a:45:07:de:4d:7b:fc: a3:70:9b:ce:3b:19:c7:12:a8:58:f7:d3:a7:b1:08:82: 68:89:f8:23:27:d4:8e:1d:92:b5:84:e6:40:03:52:49: bd:b9:aa:55:bf:22:d7:e7:51:26:da:40:ba:72:3f:e9: b0:bc:7e:c8:d0:a8:9d:f3:b2:50:b9:d5:37:d6:2e:48: d1:8e:d8:36:d7:58:43:4a:8a:b6:3b:2f:9c:07:8c:2c: cf:39:b7:c3:8f:00:c5:80:bd:af:a7:e1:98:c6:62:8d: 94:91:2b:36:ab:74:2e:8b:7b:e3:27:9f:8e:da:18:b5: 19:e1:7a:38:d8:d0:73:a2:7c:c8:77:9d:7c:aa:6f:d0: 02:4c:8f:99:4f:79:08:2d:d4:f9:56:a8:42:86:1d:10: 18:97:63:92:4f:7e:4d:28:94:a9:8d:6a:a6:a7:f2:ce: d6:98:39:62:41:21:d0:c8:3a:97:aa:55:12:77:d4:1f: 23:c4:de:5b:5b:d9:8d:8f:3b:c3:ac:6d:6b:c2:2e:57: 13:73:24:71:5b:b9:b9:5e:44:9d:54:29:3a:e1:38:63 Fingerprint (SHA-256): EC:F7:8B:3C:12:B2:B9:82:68:41:DA:AD:D6:A9:E1:3A:E2:8A:33:0D:22:BE:9B:24:56:73:4F:52:B4:60:1E:D0 Fingerprint (SHA1): 4C:91:8D:85:12:F4:5A:7D:3F:1F:A8:8F:A3:4A:FA:F8:45:E3:98:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201864 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320201865 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201866 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 320201867 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201868 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 320201869 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 320201870 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201864 (0x1315e488) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:03 2023 Not After : Mon Mar 20 20:20:03 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e8:00:e3:e2:b8:be:b6:fe:f1:01:d1:f8:a6:62:f5: 37:e7:d9:76:42:19:6f:13:ef:66:33:e1:86:9d:80:1d: d0:d0:66:95:ea:23:f3:85:52:51:93:ce:4c:df:bb:a7: 3c:69:6a:01:c8:6c:94:c6:fc:6a:4d:23:76:90:9d:b4: 59:21:9c:3b:88:ba:a4:01:37:cb:b9:2d:c8:f0:2b:a3: 95:ef:a4:35:20:b9:9b:73:3b:81:a8:c7:7e:01:a1:44: 1e:05:fa:35:c0:aa:54:81:4d:54:6a:9b:65:34:6c:0d: 24:cb:54:f3:f5:a5:55:7d:81:8e:39:53:5a:db:04:ec: 54:9f:4c:1e:00:01:9f:79:51:7e:90:37:d1:52:d3:27: 2f:ca:17:cc:9a:99:4d:c7:72:77:27:3b:fb:ce:99:00: 03:49:3f:42:1b:6b:c9:c6:18:c2:d8:c6:31:78:f8:44: f0:db:02:23:53:b5:84:f0:36:53:c2:68:2b:f2:bb:b4: ee:cc:31:63:00:de:e4:74:d8:9b:04:b5:52:39:71:74: 64:dd:47:ce:4a:2a:fc:dd:49:90:b0:ee:ea:ca:35:3d: 61:29:d3:5f:fc:cf:13:94:59:26:cd:83:fc:5f:18:3d: cc:50:7e:6f:86:cd:0c:71:01:d6:2d:9f:9b:6b:d6:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:52:32:35:ed:8d:46:cd:96:aa:24:e3:11:54:f0:13: 08:c7:a3:b9:16:a4:ee:3a:6e:81:3e:8d:64:0c:07:ab: 04:7d:0e:8f:bb:3d:36:03:6c:6e:95:b4:23:00:ea:4c: 1d:94:14:ee:ed:6a:e8:23:2c:aa:75:8f:e3:f4:69:c6: dd:57:1d:ad:50:e4:e7:ec:d0:e1:8a:d1:ff:8e:1a:e8: ad:2e:2d:ab:31:f5:13:23:93:5d:53:a0:6b:7d:0f:5f: 79:0b:88:79:2d:e8:58:7f:bf:ca:2f:98:14:3a:98:e9: 30:65:aa:f2:5a:5f:eb:e9:e7:64:9d:f9:4e:0f:c4:f7: b9:d6:f9:a4:b6:1a:e3:d0:ef:14:ce:66:bd:63:d8:70: e1:02:ac:4f:e6:f4:5c:76:f0:e2:34:21:8d:af:9a:b7: bf:16:0c:23:b5:4c:36:04:3d:11:a3:67:78:95:fc:21: e6:26:22:9d:58:2c:0a:19:7d:01:cc:9e:e6:b5:aa:37: 47:5d:49:d6:64:21:1e:8c:1b:04:cb:86:a1:d5:0a:25: 03:63:0a:f5:61:1c:e9:14:aa:89:b1:1d:87:77:57:ec: c7:63:9a:40:37:5d:05:86:24:86:ff:75:bf:94:9b:90: c0:a0:15:c0:19:af:d1:18:3b:79:d0:d4:db:68:05:89 Fingerprint (SHA-256): 14:7E:F8:B9:70:2F:32:F1:BC:0D:1A:5D:87:4E:B0:F3:AE:8B:F5:61:D3:4E:D2:04:58:E0:4D:3D:1B:E9:12:CE Fingerprint (SHA1): D0:88:A1:87:28:38:93:A2:9C:B3:8F:77:C0:16:C3:3E:11:7F:1E:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201866 (0x1315e48a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:04 2023 Not After : Mon Mar 20 20:20:04 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b0:da:f1:bf:2e:7a:db:00:3e:ba:42:4f:a7:01:cf: e5:60:c0:83:10:27:05:dc:25:d9:ff:14:9f:18:33:ee: 0c:55:d5:7f:e4:52:14:8e:6c:fb:73:87:5f:b9:5a:b5: 19:0e:0e:2d:bd:a0:bb:35:29:5e:ba:87:82:36:d7:1a: 76:1e:04:f6:83:73:27:14:dc:cf:32:4f:d9:63:3b:45: 98:2e:96:d1:10:fc:71:ef:39:22:5f:b4:be:d1:4b:19: 3c:bc:4c:19:86:0f:09:d5:ad:13:b5:85:d4:bc:45:06: 6c:6d:64:11:78:0c:22:eb:19:a0:86:7d:f1:6b:11:f2: 3b:e9:e7:fb:35:26:a9:be:66:9f:d9:69:cc:2e:6b:5b: 53:5f:8a:7c:5e:b3:c2:41:4e:a7:e3:e4:28:eb:f1:38: aa:44:dc:f8:4e:7c:fe:0f:a1:8d:37:7c:28:dc:fe:61: 6b:b9:a3:fd:d4:b9:2b:6f:b7:87:7a:80:97:15:87:aa: 50:25:5d:bf:d1:e6:8b:ea:f2:f0:66:89:3a:e7:4d:db: 4f:b4:c3:39:ee:df:fd:cc:00:c1:3e:fa:61:4b:82:b0: 6d:21:fc:df:3c:8b:57:67:6e:26:7e:7c:47:e8:1e:45: 75:a7:6c:3d:93:f1:cf:a3:3e:69:19:8b:ac:23:f6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:51:54:2c:32:60:48:ea:75:b8:e6:6d:cd:f5:35:5b: bc:6c:03:6c:22:e8:5e:d8:0a:09:c9:56:11:aa:09:60: 4f:ca:0e:80:55:d9:27:8a:2f:7d:5f:45:f8:ea:28:f9: 99:3c:08:02:8c:7f:85:ba:05:ea:f5:66:cd:b2:44:46: d2:55:84:46:42:b6:56:3b:c8:c5:71:b2:36:cd:88:cd: e4:7c:ec:a6:d8:d4:e4:5e:3d:a2:e7:cd:f4:4c:82:e6: 22:d4:05:b6:69:44:a9:3a:aa:ed:eb:c1:c0:3d:cd:86: f2:bd:ba:39:c7:e0:6c:c0:48:67:8a:94:8a:ff:4f:c3: a6:88:ca:e6:35:9e:47:0e:0b:b3:fd:48:ff:f5:49:12: a3:38:1c:31:0b:bc:72:10:57:63:16:39:23:4f:9a:54: 42:ed:90:2f:79:59:ef:0f:d9:d5:b4:73:e8:b5:e0:73: f3:fc:53:8f:9c:2f:44:df:f5:e9:8c:f0:26:0f:ce:cc: 08:0f:a0:2f:77:b2:89:1a:3a:f9:b2:63:7e:3c:d7:79: 4f:fd:ea:14:5e:c5:4a:7b:ee:31:8c:d9:ff:6b:84:40: b5:a9:92:7c:ac:28:2f:3b:e3:fc:1c:52:fb:bc:78:78: 16:d9:ab:df:71:12:87:18:dd:16:f1:d2:3b:05:97:e0 Fingerprint (SHA-256): CE:79:59:A6:CA:65:F2:5F:BF:D6:25:3B:7C:35:D2:0E:A9:85:9C:4A:8D:E3:22:22:B5:69:46:75:0E:2B:F3:3D Fingerprint (SHA1): EE:5E:58:D1:E6:D9:0A:71:AB:80:51:12:3A:74:42:03:6F:8A:5C:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201864 (0x1315e488) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:03 2023 Not After : Mon Mar 20 20:20:03 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e8:00:e3:e2:b8:be:b6:fe:f1:01:d1:f8:a6:62:f5: 37:e7:d9:76:42:19:6f:13:ef:66:33:e1:86:9d:80:1d: d0:d0:66:95:ea:23:f3:85:52:51:93:ce:4c:df:bb:a7: 3c:69:6a:01:c8:6c:94:c6:fc:6a:4d:23:76:90:9d:b4: 59:21:9c:3b:88:ba:a4:01:37:cb:b9:2d:c8:f0:2b:a3: 95:ef:a4:35:20:b9:9b:73:3b:81:a8:c7:7e:01:a1:44: 1e:05:fa:35:c0:aa:54:81:4d:54:6a:9b:65:34:6c:0d: 24:cb:54:f3:f5:a5:55:7d:81:8e:39:53:5a:db:04:ec: 54:9f:4c:1e:00:01:9f:79:51:7e:90:37:d1:52:d3:27: 2f:ca:17:cc:9a:99:4d:c7:72:77:27:3b:fb:ce:99:00: 03:49:3f:42:1b:6b:c9:c6:18:c2:d8:c6:31:78:f8:44: f0:db:02:23:53:b5:84:f0:36:53:c2:68:2b:f2:bb:b4: ee:cc:31:63:00:de:e4:74:d8:9b:04:b5:52:39:71:74: 64:dd:47:ce:4a:2a:fc:dd:49:90:b0:ee:ea:ca:35:3d: 61:29:d3:5f:fc:cf:13:94:59:26:cd:83:fc:5f:18:3d: cc:50:7e:6f:86:cd:0c:71:01:d6:2d:9f:9b:6b:d6:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:52:32:35:ed:8d:46:cd:96:aa:24:e3:11:54:f0:13: 08:c7:a3:b9:16:a4:ee:3a:6e:81:3e:8d:64:0c:07:ab: 04:7d:0e:8f:bb:3d:36:03:6c:6e:95:b4:23:00:ea:4c: 1d:94:14:ee:ed:6a:e8:23:2c:aa:75:8f:e3:f4:69:c6: dd:57:1d:ad:50:e4:e7:ec:d0:e1:8a:d1:ff:8e:1a:e8: ad:2e:2d:ab:31:f5:13:23:93:5d:53:a0:6b:7d:0f:5f: 79:0b:88:79:2d:e8:58:7f:bf:ca:2f:98:14:3a:98:e9: 30:65:aa:f2:5a:5f:eb:e9:e7:64:9d:f9:4e:0f:c4:f7: b9:d6:f9:a4:b6:1a:e3:d0:ef:14:ce:66:bd:63:d8:70: e1:02:ac:4f:e6:f4:5c:76:f0:e2:34:21:8d:af:9a:b7: bf:16:0c:23:b5:4c:36:04:3d:11:a3:67:78:95:fc:21: e6:26:22:9d:58:2c:0a:19:7d:01:cc:9e:e6:b5:aa:37: 47:5d:49:d6:64:21:1e:8c:1b:04:cb:86:a1:d5:0a:25: 03:63:0a:f5:61:1c:e9:14:aa:89:b1:1d:87:77:57:ec: c7:63:9a:40:37:5d:05:86:24:86:ff:75:bf:94:9b:90: c0:a0:15:c0:19:af:d1:18:3b:79:d0:d4:db:68:05:89 Fingerprint (SHA-256): 14:7E:F8:B9:70:2F:32:F1:BC:0D:1A:5D:87:4E:B0:F3:AE:8B:F5:61:D3:4E:D2:04:58:E0:4D:3D:1B:E9:12:CE Fingerprint (SHA1): D0:88:A1:87:28:38:93:A2:9C:B3:8F:77:C0:16:C3:3E:11:7F:1E:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201864 (0x1315e488) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:03 2023 Not After : Mon Mar 20 20:20:03 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e8:00:e3:e2:b8:be:b6:fe:f1:01:d1:f8:a6:62:f5: 37:e7:d9:76:42:19:6f:13:ef:66:33:e1:86:9d:80:1d: d0:d0:66:95:ea:23:f3:85:52:51:93:ce:4c:df:bb:a7: 3c:69:6a:01:c8:6c:94:c6:fc:6a:4d:23:76:90:9d:b4: 59:21:9c:3b:88:ba:a4:01:37:cb:b9:2d:c8:f0:2b:a3: 95:ef:a4:35:20:b9:9b:73:3b:81:a8:c7:7e:01:a1:44: 1e:05:fa:35:c0:aa:54:81:4d:54:6a:9b:65:34:6c:0d: 24:cb:54:f3:f5:a5:55:7d:81:8e:39:53:5a:db:04:ec: 54:9f:4c:1e:00:01:9f:79:51:7e:90:37:d1:52:d3:27: 2f:ca:17:cc:9a:99:4d:c7:72:77:27:3b:fb:ce:99:00: 03:49:3f:42:1b:6b:c9:c6:18:c2:d8:c6:31:78:f8:44: f0:db:02:23:53:b5:84:f0:36:53:c2:68:2b:f2:bb:b4: ee:cc:31:63:00:de:e4:74:d8:9b:04:b5:52:39:71:74: 64:dd:47:ce:4a:2a:fc:dd:49:90:b0:ee:ea:ca:35:3d: 61:29:d3:5f:fc:cf:13:94:59:26:cd:83:fc:5f:18:3d: cc:50:7e:6f:86:cd:0c:71:01:d6:2d:9f:9b:6b:d6:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:52:32:35:ed:8d:46:cd:96:aa:24:e3:11:54:f0:13: 08:c7:a3:b9:16:a4:ee:3a:6e:81:3e:8d:64:0c:07:ab: 04:7d:0e:8f:bb:3d:36:03:6c:6e:95:b4:23:00:ea:4c: 1d:94:14:ee:ed:6a:e8:23:2c:aa:75:8f:e3:f4:69:c6: dd:57:1d:ad:50:e4:e7:ec:d0:e1:8a:d1:ff:8e:1a:e8: ad:2e:2d:ab:31:f5:13:23:93:5d:53:a0:6b:7d:0f:5f: 79:0b:88:79:2d:e8:58:7f:bf:ca:2f:98:14:3a:98:e9: 30:65:aa:f2:5a:5f:eb:e9:e7:64:9d:f9:4e:0f:c4:f7: b9:d6:f9:a4:b6:1a:e3:d0:ef:14:ce:66:bd:63:d8:70: e1:02:ac:4f:e6:f4:5c:76:f0:e2:34:21:8d:af:9a:b7: bf:16:0c:23:b5:4c:36:04:3d:11:a3:67:78:95:fc:21: e6:26:22:9d:58:2c:0a:19:7d:01:cc:9e:e6:b5:aa:37: 47:5d:49:d6:64:21:1e:8c:1b:04:cb:86:a1:d5:0a:25: 03:63:0a:f5:61:1c:e9:14:aa:89:b1:1d:87:77:57:ec: c7:63:9a:40:37:5d:05:86:24:86:ff:75:bf:94:9b:90: c0:a0:15:c0:19:af:d1:18:3b:79:d0:d4:db:68:05:89 Fingerprint (SHA-256): 14:7E:F8:B9:70:2F:32:F1:BC:0D:1A:5D:87:4E:B0:F3:AE:8B:F5:61:D3:4E:D2:04:58:E0:4D:3D:1B:E9:12:CE Fingerprint (SHA1): D0:88:A1:87:28:38:93:A2:9C:B3:8F:77:C0:16:C3:3E:11:7F:1E:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201866 (0x1315e48a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:04 2023 Not After : Mon Mar 20 20:20:04 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b0:da:f1:bf:2e:7a:db:00:3e:ba:42:4f:a7:01:cf: e5:60:c0:83:10:27:05:dc:25:d9:ff:14:9f:18:33:ee: 0c:55:d5:7f:e4:52:14:8e:6c:fb:73:87:5f:b9:5a:b5: 19:0e:0e:2d:bd:a0:bb:35:29:5e:ba:87:82:36:d7:1a: 76:1e:04:f6:83:73:27:14:dc:cf:32:4f:d9:63:3b:45: 98:2e:96:d1:10:fc:71:ef:39:22:5f:b4:be:d1:4b:19: 3c:bc:4c:19:86:0f:09:d5:ad:13:b5:85:d4:bc:45:06: 6c:6d:64:11:78:0c:22:eb:19:a0:86:7d:f1:6b:11:f2: 3b:e9:e7:fb:35:26:a9:be:66:9f:d9:69:cc:2e:6b:5b: 53:5f:8a:7c:5e:b3:c2:41:4e:a7:e3:e4:28:eb:f1:38: aa:44:dc:f8:4e:7c:fe:0f:a1:8d:37:7c:28:dc:fe:61: 6b:b9:a3:fd:d4:b9:2b:6f:b7:87:7a:80:97:15:87:aa: 50:25:5d:bf:d1:e6:8b:ea:f2:f0:66:89:3a:e7:4d:db: 4f:b4:c3:39:ee:df:fd:cc:00:c1:3e:fa:61:4b:82:b0: 6d:21:fc:df:3c:8b:57:67:6e:26:7e:7c:47:e8:1e:45: 75:a7:6c:3d:93:f1:cf:a3:3e:69:19:8b:ac:23:f6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:51:54:2c:32:60:48:ea:75:b8:e6:6d:cd:f5:35:5b: bc:6c:03:6c:22:e8:5e:d8:0a:09:c9:56:11:aa:09:60: 4f:ca:0e:80:55:d9:27:8a:2f:7d:5f:45:f8:ea:28:f9: 99:3c:08:02:8c:7f:85:ba:05:ea:f5:66:cd:b2:44:46: d2:55:84:46:42:b6:56:3b:c8:c5:71:b2:36:cd:88:cd: e4:7c:ec:a6:d8:d4:e4:5e:3d:a2:e7:cd:f4:4c:82:e6: 22:d4:05:b6:69:44:a9:3a:aa:ed:eb:c1:c0:3d:cd:86: f2:bd:ba:39:c7:e0:6c:c0:48:67:8a:94:8a:ff:4f:c3: a6:88:ca:e6:35:9e:47:0e:0b:b3:fd:48:ff:f5:49:12: a3:38:1c:31:0b:bc:72:10:57:63:16:39:23:4f:9a:54: 42:ed:90:2f:79:59:ef:0f:d9:d5:b4:73:e8:b5:e0:73: f3:fc:53:8f:9c:2f:44:df:f5:e9:8c:f0:26:0f:ce:cc: 08:0f:a0:2f:77:b2:89:1a:3a:f9:b2:63:7e:3c:d7:79: 4f:fd:ea:14:5e:c5:4a:7b:ee:31:8c:d9:ff:6b:84:40: b5:a9:92:7c:ac:28:2f:3b:e3:fc:1c:52:fb:bc:78:78: 16:d9:ab:df:71:12:87:18:dd:16:f1:d2:3b:05:97:e0 Fingerprint (SHA-256): CE:79:59:A6:CA:65:F2:5F:BF:D6:25:3B:7C:35:D2:0E:A9:85:9C:4A:8D:E3:22:22:B5:69:46:75:0E:2B:F3:3D Fingerprint (SHA1): EE:5E:58:D1:E6:D9:0A:71:AB:80:51:12:3A:74:42:03:6F:8A:5C:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201864 (0x1315e488) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:03 2023 Not After : Mon Mar 20 20:20:03 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e8:00:e3:e2:b8:be:b6:fe:f1:01:d1:f8:a6:62:f5: 37:e7:d9:76:42:19:6f:13:ef:66:33:e1:86:9d:80:1d: d0:d0:66:95:ea:23:f3:85:52:51:93:ce:4c:df:bb:a7: 3c:69:6a:01:c8:6c:94:c6:fc:6a:4d:23:76:90:9d:b4: 59:21:9c:3b:88:ba:a4:01:37:cb:b9:2d:c8:f0:2b:a3: 95:ef:a4:35:20:b9:9b:73:3b:81:a8:c7:7e:01:a1:44: 1e:05:fa:35:c0:aa:54:81:4d:54:6a:9b:65:34:6c:0d: 24:cb:54:f3:f5:a5:55:7d:81:8e:39:53:5a:db:04:ec: 54:9f:4c:1e:00:01:9f:79:51:7e:90:37:d1:52:d3:27: 2f:ca:17:cc:9a:99:4d:c7:72:77:27:3b:fb:ce:99:00: 03:49:3f:42:1b:6b:c9:c6:18:c2:d8:c6:31:78:f8:44: f0:db:02:23:53:b5:84:f0:36:53:c2:68:2b:f2:bb:b4: ee:cc:31:63:00:de:e4:74:d8:9b:04:b5:52:39:71:74: 64:dd:47:ce:4a:2a:fc:dd:49:90:b0:ee:ea:ca:35:3d: 61:29:d3:5f:fc:cf:13:94:59:26:cd:83:fc:5f:18:3d: cc:50:7e:6f:86:cd:0c:71:01:d6:2d:9f:9b:6b:d6:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:52:32:35:ed:8d:46:cd:96:aa:24:e3:11:54:f0:13: 08:c7:a3:b9:16:a4:ee:3a:6e:81:3e:8d:64:0c:07:ab: 04:7d:0e:8f:bb:3d:36:03:6c:6e:95:b4:23:00:ea:4c: 1d:94:14:ee:ed:6a:e8:23:2c:aa:75:8f:e3:f4:69:c6: dd:57:1d:ad:50:e4:e7:ec:d0:e1:8a:d1:ff:8e:1a:e8: ad:2e:2d:ab:31:f5:13:23:93:5d:53:a0:6b:7d:0f:5f: 79:0b:88:79:2d:e8:58:7f:bf:ca:2f:98:14:3a:98:e9: 30:65:aa:f2:5a:5f:eb:e9:e7:64:9d:f9:4e:0f:c4:f7: b9:d6:f9:a4:b6:1a:e3:d0:ef:14:ce:66:bd:63:d8:70: e1:02:ac:4f:e6:f4:5c:76:f0:e2:34:21:8d:af:9a:b7: bf:16:0c:23:b5:4c:36:04:3d:11:a3:67:78:95:fc:21: e6:26:22:9d:58:2c:0a:19:7d:01:cc:9e:e6:b5:aa:37: 47:5d:49:d6:64:21:1e:8c:1b:04:cb:86:a1:d5:0a:25: 03:63:0a:f5:61:1c:e9:14:aa:89:b1:1d:87:77:57:ec: c7:63:9a:40:37:5d:05:86:24:86:ff:75:bf:94:9b:90: c0:a0:15:c0:19:af:d1:18:3b:79:d0:d4:db:68:05:89 Fingerprint (SHA-256): 14:7E:F8:B9:70:2F:32:F1:BC:0D:1A:5D:87:4E:B0:F3:AE:8B:F5:61:D3:4E:D2:04:58:E0:4D:3D:1B:E9:12:CE Fingerprint (SHA1): D0:88:A1:87:28:38:93:A2:9C:B3:8F:77:C0:16:C3:3E:11:7F:1E:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201868 (0x1315e48c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 20:20:05 2023 Not After : Mon Mar 20 20:20:05 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:ba:d6:aa:a3:0a:2e:db:5d:0b:8d:d9:d0:79:75:ed: d3:8f:53:79:6b:9e:8d:79:6b:a0:50:02:4b:69:e6:b4: e6:b3:36:f0:f1:8a:d2:d2:50:5c:fd:fb:c3:d6:f2:e8: 89:ee:bd:26:57:3a:05:36:3a:8d:5f:97:c0:7b:56:4c: 15:ed:ee:17:a4:04:33:d4:d8:ab:70:49:fe:2c:45:75: e1:72:2a:bb:52:21:59:30:b8:51:7d:52:c4:e0:67:71: ea:e4:04:2f:17:b4:eb:11:c7:9f:ce:1d:a6:b1:77:cd: 62:81:f0:e5:fe:a0:fc:ef:56:3c:76:81:d1:17:3d:7c: c2:3b:38:7c:57:4f:7a:52:04:b5:a8:55:f5:1a:55:16: 45:aa:92:36:e4:7b:da:37:97:40:18:73:37:3b:71:c2: c5:75:32:c7:23:3b:8b:f0:7f:bc:69:12:d7:38:21:41: 9a:94:e6:90:20:c6:cd:04:1e:c7:1c:2c:24:75:e5:28: b6:9a:cb:69:d3:c5:08:d9:fb:13:14:89:ed:6c:30:13: 3c:3d:26:b1:f2:d1:b9:a1:62:ee:64:5a:b6:f5:6e:f3: 2f:01:1a:c5:ed:23:8e:0e:18:4e:15:28:8e:b7:e0:1a: 4f:a3:47:19:cc:7b:ed:95:8d:e3:13:99:e9:b3:0f:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:4c:47:b3:a7:be:84:38:95:a6:c8:32:37:a9:df:3a: c4:67:e0:b1:5b:d6:b2:e3:35:c4:51:b1:df:af:32:5e: 64:fa:ca:01:8e:a2:41:89:3f:4e:43:cc:e9:72:36:df: 6f:36:36:1c:48:2f:1d:d8:ad:4f:35:e0:b5:70:d3:e1: 63:1e:54:fc:e9:dd:64:9d:62:04:8f:05:20:90:c3:10: a8:48:a3:a0:0a:23:16:af:d8:ef:8f:51:7b:de:7d:c5: 6c:a7:e0:d0:c0:b3:a6:aa:eb:37:b7:e8:d5:d5:8e:9a: fa:e7:d5:95:7d:22:d5:67:94:b0:65:09:6c:f2:6c:47: 2f:02:37:59:c7:1e:01:01:d0:73:e3:7e:d2:31:bc:ae: 30:e5:46:15:ec:94:f3:eb:99:0b:a3:22:39:22:62:4f: 88:5d:04:96:69:1b:27:91:b9:dc:5b:97:8b:76:7f:b0: 38:a3:a6:6a:16:21:ab:f5:7d:27:1b:85:60:cd:6b:45: ec:7f:71:c2:a6:74:4c:e0:b7:bc:55:b7:88:b9:07:95: 9c:d6:c5:ed:e2:17:f2:0b:3e:38:01:c5:89:1c:9e:b5: 17:21:96:39:db:e4:c1:f9:df:8e:6c:40:14:91:6e:ba: 01:36:9e:a0:f0:d0:f7:7f:c5:70:d3:8a:39:b5:13:34 Fingerprint (SHA-256): 33:3B:5F:93:FB:76:BE:8F:97:76:34:2F:31:EC:C5:BF:43:C9:D2:9A:81:EA:A4:B8:E7:0E:AD:31:A4:FF:67:A6 Fingerprint (SHA1): 57:C1:D5:04:35:34:09:6B:41:F3:EB:D4:D9:6C:83:7A:7E:65:5B:50 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201864 (0x1315e488) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:03 2023 Not After : Mon Mar 20 20:20:03 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e8:00:e3:e2:b8:be:b6:fe:f1:01:d1:f8:a6:62:f5: 37:e7:d9:76:42:19:6f:13:ef:66:33:e1:86:9d:80:1d: d0:d0:66:95:ea:23:f3:85:52:51:93:ce:4c:df:bb:a7: 3c:69:6a:01:c8:6c:94:c6:fc:6a:4d:23:76:90:9d:b4: 59:21:9c:3b:88:ba:a4:01:37:cb:b9:2d:c8:f0:2b:a3: 95:ef:a4:35:20:b9:9b:73:3b:81:a8:c7:7e:01:a1:44: 1e:05:fa:35:c0:aa:54:81:4d:54:6a:9b:65:34:6c:0d: 24:cb:54:f3:f5:a5:55:7d:81:8e:39:53:5a:db:04:ec: 54:9f:4c:1e:00:01:9f:79:51:7e:90:37:d1:52:d3:27: 2f:ca:17:cc:9a:99:4d:c7:72:77:27:3b:fb:ce:99:00: 03:49:3f:42:1b:6b:c9:c6:18:c2:d8:c6:31:78:f8:44: f0:db:02:23:53:b5:84:f0:36:53:c2:68:2b:f2:bb:b4: ee:cc:31:63:00:de:e4:74:d8:9b:04:b5:52:39:71:74: 64:dd:47:ce:4a:2a:fc:dd:49:90:b0:ee:ea:ca:35:3d: 61:29:d3:5f:fc:cf:13:94:59:26:cd:83:fc:5f:18:3d: cc:50:7e:6f:86:cd:0c:71:01:d6:2d:9f:9b:6b:d6:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:52:32:35:ed:8d:46:cd:96:aa:24:e3:11:54:f0:13: 08:c7:a3:b9:16:a4:ee:3a:6e:81:3e:8d:64:0c:07:ab: 04:7d:0e:8f:bb:3d:36:03:6c:6e:95:b4:23:00:ea:4c: 1d:94:14:ee:ed:6a:e8:23:2c:aa:75:8f:e3:f4:69:c6: dd:57:1d:ad:50:e4:e7:ec:d0:e1:8a:d1:ff:8e:1a:e8: ad:2e:2d:ab:31:f5:13:23:93:5d:53:a0:6b:7d:0f:5f: 79:0b:88:79:2d:e8:58:7f:bf:ca:2f:98:14:3a:98:e9: 30:65:aa:f2:5a:5f:eb:e9:e7:64:9d:f9:4e:0f:c4:f7: b9:d6:f9:a4:b6:1a:e3:d0:ef:14:ce:66:bd:63:d8:70: e1:02:ac:4f:e6:f4:5c:76:f0:e2:34:21:8d:af:9a:b7: bf:16:0c:23:b5:4c:36:04:3d:11:a3:67:78:95:fc:21: e6:26:22:9d:58:2c:0a:19:7d:01:cc:9e:e6:b5:aa:37: 47:5d:49:d6:64:21:1e:8c:1b:04:cb:86:a1:d5:0a:25: 03:63:0a:f5:61:1c:e9:14:aa:89:b1:1d:87:77:57:ec: c7:63:9a:40:37:5d:05:86:24:86:ff:75:bf:94:9b:90: c0:a0:15:c0:19:af:d1:18:3b:79:d0:d4:db:68:05:89 Fingerprint (SHA-256): 14:7E:F8:B9:70:2F:32:F1:BC:0D:1A:5D:87:4E:B0:F3:AE:8B:F5:61:D3:4E:D2:04:58:E0:4D:3D:1B:E9:12:CE Fingerprint (SHA1): D0:88:A1:87:28:38:93:A2:9C:B3:8F:77:C0:16:C3:3E:11:7F:1E:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201869 (0x1315e48d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 20:20:06 2023 Not After : Mon Mar 20 20:20:06 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:3d:db:ed:bc:e3:4d:8a:45:95:b7:8b:99:c0:10:00: 77:31:07:e0:eb:68:34:4e:77:b6:29:db:1b:c3:65:64: 45:c7:2e:50:28:3b:68:1e:2c:c1:c2:3c:ea:53:dd:bc: 1f:3d:c8:e9:bd:f9:ac:15:7d:1b:3c:26:b3:49:bf:13: 3b:be:44:3f:62:c3:45:cc:8b:ad:b3:3f:42:41:24:b3: 16:c6:a9:17:48:b6:d5:ae:fa:98:c9:5a:96:17:cb:33: 24:3a:03:8d:21:25:f9:6e:bf:d7:f6:dd:03:ad:09:ed: d2:23:62:82:da:b3:92:f7:66:5e:67:4f:6b:95:fe:e0: 75:02:55:bb:7d:da:5a:75:3f:1b:e2:fc:1a:c8:8f:f0: 0f:d2:16:9c:f7:8f:5e:35:f6:e7:7a:d7:5a:9c:b6:10: 76:4a:ba:df:5e:3d:70:50:ad:37:db:e2:43:6a:8a:42: eb:41:9b:5e:a3:da:a6:56:7d:f6:4f:b8:ed:b2:0e:76: e6:12:69:bf:82:aa:45:51:ca:1f:0f:8d:89:3d:65:da: 96:ed:64:46:ea:f3:f1:a0:98:04:91:fb:a2:11:a1:06: 5b:c6:e4:f5:43:2f:c0:19:95:b2:6b:17:8e:88:f6:d9: 2c:8b:74:bc:c6:87:09:d8:b2:84:46:90:28:78:40:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:c1:a1:24:92:a5:c5:59:b0:4c:1b:54:d0:2e:d9:f1: 18:7e:36:90:5e:81:0f:6c:e4:0d:43:e2:bd:75:7c:7f: 2d:a5:c3:8f:95:dc:b4:83:20:6d:53:bd:e2:2b:f1:ab: 72:0f:5f:5f:76:24:9e:0c:54:ae:26:bb:ca:5b:b7:64: 29:29:b8:bd:7c:19:d3:ab:6e:6a:95:5a:3f:67:d8:98: b2:b1:2f:36:96:20:f4:64:7e:ae:70:17:cc:14:e8:3b: 4a:53:84:46:09:b5:c6:ad:32:b5:b4:83:2d:10:12:03: e5:79:f4:22:38:51:db:4d:61:32:b2:5c:c6:74:86:a8: b4:1e:1a:27:2b:3d:28:ec:c0:94:72:82:67:d5:0b:49: 25:c3:fd:23:d9:ee:85:aa:52:3f:43:50:07:93:26:6a: 4f:c2:6f:16:ba:7c:2d:b0:db:77:55:ed:62:77:64:1b: 6f:ff:b2:9e:af:fb:49:76:f0:eb:d7:2b:b9:e0:e0:52: 08:99:11:63:2b:02:e5:17:66:cc:a1:e2:0a:d4:8f:95: 4a:bd:46:d7:85:e2:40:4f:e7:84:8a:32:8e:91:f6:eb: 47:0c:22:69:b5:c4:4c:f4:37:6f:89:d6:fb:2d:22:a9: a9:ca:78:e4:82:d8:74:a9:22:a6:d3:0b:3a:3c:ee:8c Fingerprint (SHA-256): 0D:1E:73:38:04:83:5A:FA:2C:FF:AA:92:D7:EA:12:BC:7B:37:CD:2D:40:BA:CA:24:C3:95:FB:6F:93:F6:60:8E Fingerprint (SHA1): 06:AE:9D:20:64:A5:6D:87:9B:43:D7:D5:ED:34:3C:FF:64:29:68:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 5422 at Mon Mar 20 20:20:11 UTC 2023 kill -USR1 5422 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 5422 killed at Mon Mar 20 20:20:11 UTC 2023 httpserv starting at Mon Mar 20 20:20:11 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 20:20:11 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 17777 >/dev/null 2>/dev/null httpserv with PID 17777 found at Mon Mar 20 20:20:11 UTC 2023 httpserv with PID 17777 started at Mon Mar 20 20:20:11 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201871 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201872 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320201873 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320201874 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 320201875 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201872 (0x1315e490) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:20:13 2023 Not After : Mon Mar 20 20:20:13 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:8e:d8:80:66:e5:9d:cd:70:64:5e:8a:48:25:2f:91: 8f:2b:ca:19:db:29:29:1d:42:32:e9:75:d9:d5:3b:d6: 1f:50:ba:e7:4e:fb:9b:7b:94:45:de:ea:42:28:37:90: 6e:86:e1:45:16:35:3b:33:8a:f7:94:7d:1f:35:79:a7: d2:74:63:a2:46:34:52:a6:7e:1f:f1:d6:09:c4:12:24: 9e:6a:eb:5f:23:48:9f:21:81:14:47:69:d0:01:c0:b8: d5:ee:01:20:de:e6:1c:55:c0:d9:0f:9d:52:87:22:16: a0:48:be:60:f7:a6:61:89:af:ae:45:af:a7:10:f1:4b: 9a:d0:df:de:62:8f:8c:4e:4f:f9:5a:fa:37:4b:ac:89: 16:29:08:63:09:18:39:2b:51:40:24:d1:ba:ff:68:eb: c3:83:2d:50:e6:cb:50:0b:28:06:14:df:05:2f:8f:30: e7:1b:86:ef:b3:6e:ad:95:3b:81:26:45:d2:b8:4f:84: c9:b6:13:cf:ed:89:d1:28:f7:e3:11:51:c3:38:e5:eb: 88:d9:58:c7:89:80:a0:37:49:21:e0:b7:6c:13:f7:1c: f3:b2:a4:ea:89:32:99:b7:d2:29:cd:61:e9:9d:4b:9e: a1:7b:3f:e8:8c:cd:75:3f:dd:15:7a:a7:c9:d9:88:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:12:58:d7:48:54:66:cb:08:53:4e:fb:bb:9e:04:35: e8:79:07:83:6d:2e:86:30:bf:b4:88:d0:45:24:4c:c7: 90:27:6d:da:55:a5:18:21:4e:63:1c:55:16:5e:b3:f3: a2:65:88:a4:4a:e3:01:ce:7f:9c:41:a4:81:8e:6a:81: 3d:23:5f:d6:c5:ae:c1:be:e6:ba:f6:7f:dd:bf:b4:bd: 44:81:66:4d:62:b1:77:28:e6:df:8e:83:4e:d3:7e:ce: e3:29:85:2d:df:5b:25:13:dc:d8:1e:96:6f:2f:07:9c: 50:4d:c3:70:38:07:92:75:b9:bd:59:00:6a:01:4a:59: 41:99:03:16:8c:e8:39:a8:32:96:1f:1b:56:05:a4:1b: 8e:d7:e0:07:0c:68:e5:9a:49:69:37:58:77:3b:d9:ac: 97:1f:86:a8:a4:30:7e:11:c3:a4:cf:ea:a2:01:3e:ff: e4:3a:24:fb:ba:94:ce:62:ce:87:70:59:cc:7f:5e:6c: 23:da:a1:93:85:28:d6:74:a4:69:ee:c3:5e:c0:56:c0: b8:5a:55:71:a4:e1:51:39:6c:7e:aa:43:94:af:89:ed: 14:07:b4:cc:56:eb:26:97:a1:4e:94:fc:87:13:5f:14: 92:6f:17:71:14:42:ab:99:d3:66:d9:09:43:2b:4b:0b Fingerprint (SHA-256): F2:A7:CE:22:D4:7F:B0:50:7B:D5:E3:21:20:E2:22:26:CE:E5:8B:08:04:E0:FC:79:F3:9F:A8:4F:C1:4B:60:3E Fingerprint (SHA1): 43:A5:A2:40:68:AD:E1:16:3C:70:2E:F4:C7:B1:43:3D:91:D6:8E:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201871 (0x1315e48f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:20:12 2023 Not After : Mon Mar 20 20:20:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b8:e3:13:9e:34:4e:04:be:60:0d:93:1f:d7:e0:1b: 51:f7:ff:d5:4d:05:25:86:b0:37:ed:73:e1:0b:0c:d5: 69:1a:42:c2:2e:75:68:90:66:32:91:70:59:eb:18:2c: 4e:e0:eb:fe:b1:ac:00:3b:8d:59:76:42:1c:65:fe:24: 48:83:76:e4:be:34:3d:0a:37:fc:bb:c5:7b:cc:93:b6: 70:52:0c:f4:ab:75:13:f1:a0:02:15:18:09:67:0b:1b: ab:df:0e:00:89:ac:08:2b:72:90:e2:8f:e6:47:2f:b2: 16:93:aa:16:68:bf:28:67:7c:58:3b:98:6d:e7:64:38: b7:6f:40:8d:e4:20:fe:82:ca:c9:3f:1e:32:9e:38:f1: 21:f9:f0:04:48:59:d8:9f:5a:bd:b9:c9:bb:99:8b:f6: 2a:42:69:04:90:93:8d:4f:c0:93:c5:b3:79:82:8f:b0: fb:37:48:9f:f5:e8:87:d1:7d:8b:84:3b:d6:7e:ae:25: 13:68:29:dd:c5:08:3d:26:7f:43:60:35:23:f4:36:a6: 9e:b6:0d:d1:d4:7a:a1:97:ff:f1:84:d3:c9:ff:2b:af: e9:12:e8:69:d3:5d:7e:55:dc:e6:1b:fe:7b:35:29:d9: b6:00:32:2c:8e:bf:8a:02:71:12:99:b6:5a:8b:01:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:e2:69:b5:e2:31:ec:e3:13:a4:62:f0:07:81:4f:60: 07:3b:b6:ad:04:66:25:f4:11:12:3c:e5:da:8d:e3:1d: e6:e9:55:05:9b:2f:0e:32:e9:4d:ea:08:ac:17:3b:c4: 43:46:98:68:65:27:12:b3:fe:40:03:0c:38:28:0d:98: 6a:14:13:a3:18:22:c3:af:cc:63:5b:ec:a7:78:c1:b6: dc:09:ea:da:c7:a4:4f:cb:fd:be:fd:25:a0:60:c2:73: 70:18:f5:47:69:8d:36:a7:d1:39:37:50:eb:b7:6a:bc: 68:7e:cd:d8:28:28:6c:1d:14:6d:91:99:54:36:b1:48: 4d:15:a5:a9:9a:3e:2d:6e:84:84:f1:a5:0c:c6:f2:2a: 17:56:2b:5f:31:f8:52:fd:94:69:78:3f:71:77:d9:61: c9:45:eb:b8:e8:fd:01:fe:48:dc:6f:11:19:df:8b:f3: b1:8f:73:54:a3:21:b0:bd:b0:6d:21:11:f3:61:20:c7: 47:b7:b4:e0:b8:24:2b:a6:31:10:fd:46:82:88:c5:1c: f9:29:07:1e:e8:79:4e:02:c3:9f:ae:4b:34:1b:90:58: ca:3f:8d:48:e6:d0:13:01:ba:56:d6:ea:09:3c:43:f2: 60:9b:d1:07:71:c3:f6:48:15:72:55:d1:76:30:fe:de Fingerprint (SHA-256): 5B:9D:09:E4:F7:15:75:8A:5D:86:C2:8A:69:A7:25:E1:F8:12:14:7E:09:F0:D2:F9:52:1A:09:B4:BE:FA:22:E4 Fingerprint (SHA1): EB:FC:14:EF:24:1B:F9:11:82:07:DF:22:24:0D:0D:42:71:CD:AA:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201871 (0x1315e48f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:20:12 2023 Not After : Mon Mar 20 20:20:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b8:e3:13:9e:34:4e:04:be:60:0d:93:1f:d7:e0:1b: 51:f7:ff:d5:4d:05:25:86:b0:37:ed:73:e1:0b:0c:d5: 69:1a:42:c2:2e:75:68:90:66:32:91:70:59:eb:18:2c: 4e:e0:eb:fe:b1:ac:00:3b:8d:59:76:42:1c:65:fe:24: 48:83:76:e4:be:34:3d:0a:37:fc:bb:c5:7b:cc:93:b6: 70:52:0c:f4:ab:75:13:f1:a0:02:15:18:09:67:0b:1b: ab:df:0e:00:89:ac:08:2b:72:90:e2:8f:e6:47:2f:b2: 16:93:aa:16:68:bf:28:67:7c:58:3b:98:6d:e7:64:38: b7:6f:40:8d:e4:20:fe:82:ca:c9:3f:1e:32:9e:38:f1: 21:f9:f0:04:48:59:d8:9f:5a:bd:b9:c9:bb:99:8b:f6: 2a:42:69:04:90:93:8d:4f:c0:93:c5:b3:79:82:8f:b0: fb:37:48:9f:f5:e8:87:d1:7d:8b:84:3b:d6:7e:ae:25: 13:68:29:dd:c5:08:3d:26:7f:43:60:35:23:f4:36:a6: 9e:b6:0d:d1:d4:7a:a1:97:ff:f1:84:d3:c9:ff:2b:af: e9:12:e8:69:d3:5d:7e:55:dc:e6:1b:fe:7b:35:29:d9: b6:00:32:2c:8e:bf:8a:02:71:12:99:b6:5a:8b:01:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:e2:69:b5:e2:31:ec:e3:13:a4:62:f0:07:81:4f:60: 07:3b:b6:ad:04:66:25:f4:11:12:3c:e5:da:8d:e3:1d: e6:e9:55:05:9b:2f:0e:32:e9:4d:ea:08:ac:17:3b:c4: 43:46:98:68:65:27:12:b3:fe:40:03:0c:38:28:0d:98: 6a:14:13:a3:18:22:c3:af:cc:63:5b:ec:a7:78:c1:b6: dc:09:ea:da:c7:a4:4f:cb:fd:be:fd:25:a0:60:c2:73: 70:18:f5:47:69:8d:36:a7:d1:39:37:50:eb:b7:6a:bc: 68:7e:cd:d8:28:28:6c:1d:14:6d:91:99:54:36:b1:48: 4d:15:a5:a9:9a:3e:2d:6e:84:84:f1:a5:0c:c6:f2:2a: 17:56:2b:5f:31:f8:52:fd:94:69:78:3f:71:77:d9:61: c9:45:eb:b8:e8:fd:01:fe:48:dc:6f:11:19:df:8b:f3: b1:8f:73:54:a3:21:b0:bd:b0:6d:21:11:f3:61:20:c7: 47:b7:b4:e0:b8:24:2b:a6:31:10:fd:46:82:88:c5:1c: f9:29:07:1e:e8:79:4e:02:c3:9f:ae:4b:34:1b:90:58: ca:3f:8d:48:e6:d0:13:01:ba:56:d6:ea:09:3c:43:f2: 60:9b:d1:07:71:c3:f6:48:15:72:55:d1:76:30:fe:de Fingerprint (SHA-256): 5B:9D:09:E4:F7:15:75:8A:5D:86:C2:8A:69:A7:25:E1:F8:12:14:7E:09:F0:D2:F9:52:1A:09:B4:BE:FA:22:E4 Fingerprint (SHA1): EB:FC:14:EF:24:1B:F9:11:82:07:DF:22:24:0D:0D:42:71:CD:AA:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201872 (0x1315e490) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:20:13 2023 Not After : Mon Mar 20 20:20:13 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:8e:d8:80:66:e5:9d:cd:70:64:5e:8a:48:25:2f:91: 8f:2b:ca:19:db:29:29:1d:42:32:e9:75:d9:d5:3b:d6: 1f:50:ba:e7:4e:fb:9b:7b:94:45:de:ea:42:28:37:90: 6e:86:e1:45:16:35:3b:33:8a:f7:94:7d:1f:35:79:a7: d2:74:63:a2:46:34:52:a6:7e:1f:f1:d6:09:c4:12:24: 9e:6a:eb:5f:23:48:9f:21:81:14:47:69:d0:01:c0:b8: d5:ee:01:20:de:e6:1c:55:c0:d9:0f:9d:52:87:22:16: a0:48:be:60:f7:a6:61:89:af:ae:45:af:a7:10:f1:4b: 9a:d0:df:de:62:8f:8c:4e:4f:f9:5a:fa:37:4b:ac:89: 16:29:08:63:09:18:39:2b:51:40:24:d1:ba:ff:68:eb: c3:83:2d:50:e6:cb:50:0b:28:06:14:df:05:2f:8f:30: e7:1b:86:ef:b3:6e:ad:95:3b:81:26:45:d2:b8:4f:84: c9:b6:13:cf:ed:89:d1:28:f7:e3:11:51:c3:38:e5:eb: 88:d9:58:c7:89:80:a0:37:49:21:e0:b7:6c:13:f7:1c: f3:b2:a4:ea:89:32:99:b7:d2:29:cd:61:e9:9d:4b:9e: a1:7b:3f:e8:8c:cd:75:3f:dd:15:7a:a7:c9:d9:88:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:12:58:d7:48:54:66:cb:08:53:4e:fb:bb:9e:04:35: e8:79:07:83:6d:2e:86:30:bf:b4:88:d0:45:24:4c:c7: 90:27:6d:da:55:a5:18:21:4e:63:1c:55:16:5e:b3:f3: a2:65:88:a4:4a:e3:01:ce:7f:9c:41:a4:81:8e:6a:81: 3d:23:5f:d6:c5:ae:c1:be:e6:ba:f6:7f:dd:bf:b4:bd: 44:81:66:4d:62:b1:77:28:e6:df:8e:83:4e:d3:7e:ce: e3:29:85:2d:df:5b:25:13:dc:d8:1e:96:6f:2f:07:9c: 50:4d:c3:70:38:07:92:75:b9:bd:59:00:6a:01:4a:59: 41:99:03:16:8c:e8:39:a8:32:96:1f:1b:56:05:a4:1b: 8e:d7:e0:07:0c:68:e5:9a:49:69:37:58:77:3b:d9:ac: 97:1f:86:a8:a4:30:7e:11:c3:a4:cf:ea:a2:01:3e:ff: e4:3a:24:fb:ba:94:ce:62:ce:87:70:59:cc:7f:5e:6c: 23:da:a1:93:85:28:d6:74:a4:69:ee:c3:5e:c0:56:c0: b8:5a:55:71:a4:e1:51:39:6c:7e:aa:43:94:af:89:ed: 14:07:b4:cc:56:eb:26:97:a1:4e:94:fc:87:13:5f:14: 92:6f:17:71:14:42:ab:99:d3:66:d9:09:43:2b:4b:0b Fingerprint (SHA-256): F2:A7:CE:22:D4:7F:B0:50:7B:D5:E3:21:20:E2:22:26:CE:E5:8B:08:04:E0:FC:79:F3:9F:A8:4F:C1:4B:60:3E Fingerprint (SHA1): 43:A5:A2:40:68:AD:E1:16:3C:70:2E:F4:C7:B1:43:3D:91:D6:8E:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201872 (0x1315e490) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:20:13 2023 Not After : Mon Mar 20 20:20:13 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:8e:d8:80:66:e5:9d:cd:70:64:5e:8a:48:25:2f:91: 8f:2b:ca:19:db:29:29:1d:42:32:e9:75:d9:d5:3b:d6: 1f:50:ba:e7:4e:fb:9b:7b:94:45:de:ea:42:28:37:90: 6e:86:e1:45:16:35:3b:33:8a:f7:94:7d:1f:35:79:a7: d2:74:63:a2:46:34:52:a6:7e:1f:f1:d6:09:c4:12:24: 9e:6a:eb:5f:23:48:9f:21:81:14:47:69:d0:01:c0:b8: d5:ee:01:20:de:e6:1c:55:c0:d9:0f:9d:52:87:22:16: a0:48:be:60:f7:a6:61:89:af:ae:45:af:a7:10:f1:4b: 9a:d0:df:de:62:8f:8c:4e:4f:f9:5a:fa:37:4b:ac:89: 16:29:08:63:09:18:39:2b:51:40:24:d1:ba:ff:68:eb: c3:83:2d:50:e6:cb:50:0b:28:06:14:df:05:2f:8f:30: e7:1b:86:ef:b3:6e:ad:95:3b:81:26:45:d2:b8:4f:84: c9:b6:13:cf:ed:89:d1:28:f7:e3:11:51:c3:38:e5:eb: 88:d9:58:c7:89:80:a0:37:49:21:e0:b7:6c:13:f7:1c: f3:b2:a4:ea:89:32:99:b7:d2:29:cd:61:e9:9d:4b:9e: a1:7b:3f:e8:8c:cd:75:3f:dd:15:7a:a7:c9:d9:88:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:12:58:d7:48:54:66:cb:08:53:4e:fb:bb:9e:04:35: e8:79:07:83:6d:2e:86:30:bf:b4:88:d0:45:24:4c:c7: 90:27:6d:da:55:a5:18:21:4e:63:1c:55:16:5e:b3:f3: a2:65:88:a4:4a:e3:01:ce:7f:9c:41:a4:81:8e:6a:81: 3d:23:5f:d6:c5:ae:c1:be:e6:ba:f6:7f:dd:bf:b4:bd: 44:81:66:4d:62:b1:77:28:e6:df:8e:83:4e:d3:7e:ce: e3:29:85:2d:df:5b:25:13:dc:d8:1e:96:6f:2f:07:9c: 50:4d:c3:70:38:07:92:75:b9:bd:59:00:6a:01:4a:59: 41:99:03:16:8c:e8:39:a8:32:96:1f:1b:56:05:a4:1b: 8e:d7:e0:07:0c:68:e5:9a:49:69:37:58:77:3b:d9:ac: 97:1f:86:a8:a4:30:7e:11:c3:a4:cf:ea:a2:01:3e:ff: e4:3a:24:fb:ba:94:ce:62:ce:87:70:59:cc:7f:5e:6c: 23:da:a1:93:85:28:d6:74:a4:69:ee:c3:5e:c0:56:c0: b8:5a:55:71:a4:e1:51:39:6c:7e:aa:43:94:af:89:ed: 14:07:b4:cc:56:eb:26:97:a1:4e:94:fc:87:13:5f:14: 92:6f:17:71:14:42:ab:99:d3:66:d9:09:43:2b:4b:0b Fingerprint (SHA-256): F2:A7:CE:22:D4:7F:B0:50:7B:D5:E3:21:20:E2:22:26:CE:E5:8B:08:04:E0:FC:79:F3:9F:A8:4F:C1:4B:60:3E Fingerprint (SHA1): 43:A5:A2:40:68:AD:E1:16:3C:70:2E:F4:C7:B1:43:3D:91:D6:8E:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201872 (0x1315e490) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:20:13 2023 Not After : Mon Mar 20 20:20:13 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:8e:d8:80:66:e5:9d:cd:70:64:5e:8a:48:25:2f:91: 8f:2b:ca:19:db:29:29:1d:42:32:e9:75:d9:d5:3b:d6: 1f:50:ba:e7:4e:fb:9b:7b:94:45:de:ea:42:28:37:90: 6e:86:e1:45:16:35:3b:33:8a:f7:94:7d:1f:35:79:a7: d2:74:63:a2:46:34:52:a6:7e:1f:f1:d6:09:c4:12:24: 9e:6a:eb:5f:23:48:9f:21:81:14:47:69:d0:01:c0:b8: d5:ee:01:20:de:e6:1c:55:c0:d9:0f:9d:52:87:22:16: a0:48:be:60:f7:a6:61:89:af:ae:45:af:a7:10:f1:4b: 9a:d0:df:de:62:8f:8c:4e:4f:f9:5a:fa:37:4b:ac:89: 16:29:08:63:09:18:39:2b:51:40:24:d1:ba:ff:68:eb: c3:83:2d:50:e6:cb:50:0b:28:06:14:df:05:2f:8f:30: e7:1b:86:ef:b3:6e:ad:95:3b:81:26:45:d2:b8:4f:84: c9:b6:13:cf:ed:89:d1:28:f7:e3:11:51:c3:38:e5:eb: 88:d9:58:c7:89:80:a0:37:49:21:e0:b7:6c:13:f7:1c: f3:b2:a4:ea:89:32:99:b7:d2:29:cd:61:e9:9d:4b:9e: a1:7b:3f:e8:8c:cd:75:3f:dd:15:7a:a7:c9:d9:88:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:12:58:d7:48:54:66:cb:08:53:4e:fb:bb:9e:04:35: e8:79:07:83:6d:2e:86:30:bf:b4:88:d0:45:24:4c:c7: 90:27:6d:da:55:a5:18:21:4e:63:1c:55:16:5e:b3:f3: a2:65:88:a4:4a:e3:01:ce:7f:9c:41:a4:81:8e:6a:81: 3d:23:5f:d6:c5:ae:c1:be:e6:ba:f6:7f:dd:bf:b4:bd: 44:81:66:4d:62:b1:77:28:e6:df:8e:83:4e:d3:7e:ce: e3:29:85:2d:df:5b:25:13:dc:d8:1e:96:6f:2f:07:9c: 50:4d:c3:70:38:07:92:75:b9:bd:59:00:6a:01:4a:59: 41:99:03:16:8c:e8:39:a8:32:96:1f:1b:56:05:a4:1b: 8e:d7:e0:07:0c:68:e5:9a:49:69:37:58:77:3b:d9:ac: 97:1f:86:a8:a4:30:7e:11:c3:a4:cf:ea:a2:01:3e:ff: e4:3a:24:fb:ba:94:ce:62:ce:87:70:59:cc:7f:5e:6c: 23:da:a1:93:85:28:d6:74:a4:69:ee:c3:5e:c0:56:c0: b8:5a:55:71:a4:e1:51:39:6c:7e:aa:43:94:af:89:ed: 14:07:b4:cc:56:eb:26:97:a1:4e:94:fc:87:13:5f:14: 92:6f:17:71:14:42:ab:99:d3:66:d9:09:43:2b:4b:0b Fingerprint (SHA-256): F2:A7:CE:22:D4:7F:B0:50:7B:D5:E3:21:20:E2:22:26:CE:E5:8B:08:04:E0:FC:79:F3:9F:A8:4F:C1:4B:60:3E Fingerprint (SHA1): 43:A5:A2:40:68:AD:E1:16:3C:70:2E:F4:C7:B1:43:3D:91:D6:8E:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201871 (0x1315e48f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:20:12 2023 Not After : Mon Mar 20 20:20:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b8:e3:13:9e:34:4e:04:be:60:0d:93:1f:d7:e0:1b: 51:f7:ff:d5:4d:05:25:86:b0:37:ed:73:e1:0b:0c:d5: 69:1a:42:c2:2e:75:68:90:66:32:91:70:59:eb:18:2c: 4e:e0:eb:fe:b1:ac:00:3b:8d:59:76:42:1c:65:fe:24: 48:83:76:e4:be:34:3d:0a:37:fc:bb:c5:7b:cc:93:b6: 70:52:0c:f4:ab:75:13:f1:a0:02:15:18:09:67:0b:1b: ab:df:0e:00:89:ac:08:2b:72:90:e2:8f:e6:47:2f:b2: 16:93:aa:16:68:bf:28:67:7c:58:3b:98:6d:e7:64:38: b7:6f:40:8d:e4:20:fe:82:ca:c9:3f:1e:32:9e:38:f1: 21:f9:f0:04:48:59:d8:9f:5a:bd:b9:c9:bb:99:8b:f6: 2a:42:69:04:90:93:8d:4f:c0:93:c5:b3:79:82:8f:b0: fb:37:48:9f:f5:e8:87:d1:7d:8b:84:3b:d6:7e:ae:25: 13:68:29:dd:c5:08:3d:26:7f:43:60:35:23:f4:36:a6: 9e:b6:0d:d1:d4:7a:a1:97:ff:f1:84:d3:c9:ff:2b:af: e9:12:e8:69:d3:5d:7e:55:dc:e6:1b:fe:7b:35:29:d9: b6:00:32:2c:8e:bf:8a:02:71:12:99:b6:5a:8b:01:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:e2:69:b5:e2:31:ec:e3:13:a4:62:f0:07:81:4f:60: 07:3b:b6:ad:04:66:25:f4:11:12:3c:e5:da:8d:e3:1d: e6:e9:55:05:9b:2f:0e:32:e9:4d:ea:08:ac:17:3b:c4: 43:46:98:68:65:27:12:b3:fe:40:03:0c:38:28:0d:98: 6a:14:13:a3:18:22:c3:af:cc:63:5b:ec:a7:78:c1:b6: dc:09:ea:da:c7:a4:4f:cb:fd:be:fd:25:a0:60:c2:73: 70:18:f5:47:69:8d:36:a7:d1:39:37:50:eb:b7:6a:bc: 68:7e:cd:d8:28:28:6c:1d:14:6d:91:99:54:36:b1:48: 4d:15:a5:a9:9a:3e:2d:6e:84:84:f1:a5:0c:c6:f2:2a: 17:56:2b:5f:31:f8:52:fd:94:69:78:3f:71:77:d9:61: c9:45:eb:b8:e8:fd:01:fe:48:dc:6f:11:19:df:8b:f3: b1:8f:73:54:a3:21:b0:bd:b0:6d:21:11:f3:61:20:c7: 47:b7:b4:e0:b8:24:2b:a6:31:10:fd:46:82:88:c5:1c: f9:29:07:1e:e8:79:4e:02:c3:9f:ae:4b:34:1b:90:58: ca:3f:8d:48:e6:d0:13:01:ba:56:d6:ea:09:3c:43:f2: 60:9b:d1:07:71:c3:f6:48:15:72:55:d1:76:30:fe:de Fingerprint (SHA-256): 5B:9D:09:E4:F7:15:75:8A:5D:86:C2:8A:69:A7:25:E1:F8:12:14:7E:09:F0:D2:F9:52:1A:09:B4:BE:FA:22:E4 Fingerprint (SHA1): EB:FC:14:EF:24:1B:F9:11:82:07:DF:22:24:0D:0D:42:71:CD:AA:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201871 (0x1315e48f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:20:12 2023 Not After : Mon Mar 20 20:20:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b8:e3:13:9e:34:4e:04:be:60:0d:93:1f:d7:e0:1b: 51:f7:ff:d5:4d:05:25:86:b0:37:ed:73:e1:0b:0c:d5: 69:1a:42:c2:2e:75:68:90:66:32:91:70:59:eb:18:2c: 4e:e0:eb:fe:b1:ac:00:3b:8d:59:76:42:1c:65:fe:24: 48:83:76:e4:be:34:3d:0a:37:fc:bb:c5:7b:cc:93:b6: 70:52:0c:f4:ab:75:13:f1:a0:02:15:18:09:67:0b:1b: ab:df:0e:00:89:ac:08:2b:72:90:e2:8f:e6:47:2f:b2: 16:93:aa:16:68:bf:28:67:7c:58:3b:98:6d:e7:64:38: b7:6f:40:8d:e4:20:fe:82:ca:c9:3f:1e:32:9e:38:f1: 21:f9:f0:04:48:59:d8:9f:5a:bd:b9:c9:bb:99:8b:f6: 2a:42:69:04:90:93:8d:4f:c0:93:c5:b3:79:82:8f:b0: fb:37:48:9f:f5:e8:87:d1:7d:8b:84:3b:d6:7e:ae:25: 13:68:29:dd:c5:08:3d:26:7f:43:60:35:23:f4:36:a6: 9e:b6:0d:d1:d4:7a:a1:97:ff:f1:84:d3:c9:ff:2b:af: e9:12:e8:69:d3:5d:7e:55:dc:e6:1b:fe:7b:35:29:d9: b6:00:32:2c:8e:bf:8a:02:71:12:99:b6:5a:8b:01:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:e2:69:b5:e2:31:ec:e3:13:a4:62:f0:07:81:4f:60: 07:3b:b6:ad:04:66:25:f4:11:12:3c:e5:da:8d:e3:1d: e6:e9:55:05:9b:2f:0e:32:e9:4d:ea:08:ac:17:3b:c4: 43:46:98:68:65:27:12:b3:fe:40:03:0c:38:28:0d:98: 6a:14:13:a3:18:22:c3:af:cc:63:5b:ec:a7:78:c1:b6: dc:09:ea:da:c7:a4:4f:cb:fd:be:fd:25:a0:60:c2:73: 70:18:f5:47:69:8d:36:a7:d1:39:37:50:eb:b7:6a:bc: 68:7e:cd:d8:28:28:6c:1d:14:6d:91:99:54:36:b1:48: 4d:15:a5:a9:9a:3e:2d:6e:84:84:f1:a5:0c:c6:f2:2a: 17:56:2b:5f:31:f8:52:fd:94:69:78:3f:71:77:d9:61: c9:45:eb:b8:e8:fd:01:fe:48:dc:6f:11:19:df:8b:f3: b1:8f:73:54:a3:21:b0:bd:b0:6d:21:11:f3:61:20:c7: 47:b7:b4:e0:b8:24:2b:a6:31:10:fd:46:82:88:c5:1c: f9:29:07:1e:e8:79:4e:02:c3:9f:ae:4b:34:1b:90:58: ca:3f:8d:48:e6:d0:13:01:ba:56:d6:ea:09:3c:43:f2: 60:9b:d1:07:71:c3:f6:48:15:72:55:d1:76:30:fe:de Fingerprint (SHA-256): 5B:9D:09:E4:F7:15:75:8A:5D:86:C2:8A:69:A7:25:E1:F8:12:14:7E:09:F0:D2:F9:52:1A:09:B4:BE:FA:22:E4 Fingerprint (SHA1): EB:FC:14:EF:24:1B:F9:11:82:07:DF:22:24:0D:0D:42:71:CD:AA:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201876 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201877 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201878 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201879 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201880 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201881 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201882 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201883 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201884 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 320201885 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 320201886 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 320201887 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 320201888 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 320201889 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 320201890 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 320201891 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 320201892 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 320201893 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 320201894 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 320201895 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 320201896 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 320201897 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201898 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201876 (0x1315e494) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 20 20:20:17 2023 Not After : Mon Mar 20 20:20:17 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:5f:85:db:24:b7:e6:17:e1:57:4b:f0:29:af:c9:1c: 49:7f:d8:23:ff:3b:96:d4:ec:11:fc:d3:a6:10:a2:33: f4:27:bc:ed:6e:3a:b1:3c:f0:84:60:c9:e2:41:7a:3f: f7:3f:15:7b:81:c8:bc:20:02:f5:66:af:06:4d:bd:99: e2:a0:02:7f:98:ce:96:c3:31:3f:ba:07:e3:1b:d1:11: 9c:21:a1:19:dc:3a:a7:14:6e:28:e1:f0:7a:09:49:98: 53:b5:6e:b7:f1:3a:c5:89:25:db:34:93:5c:7f:a1:2e: 75:37:13:e4:f4:b3:a0:35:50:f8:64:08:f3:8e:02:29: c5:9f:88:95:5b:c9:83:b8:94:21:66:c4:f7:da:78:50: 5a:1b:74:5b:8a:1b:14:3d:d3:fe:4a:00:70:3d:a1:83: e7:9f:72:7c:f8:fe:7d:2e:a8:52:23:70:07:53:65:e8: 3c:9a:91:0e:1f:ea:9c:ec:57:3a:0a:89:03:c6:75:ab: aa:95:56:87:e9:02:04:1d:e5:d0:80:b4:33:2c:9d:85: 1a:0b:5b:a0:52:06:7f:73:66:b1:dd:97:59:cc:eb:a3: 51:d0:cd:4a:8d:3c:df:ec:83:d4:c4:a6:39:ab:3c:d3: a4:eb:c7:15:3c:ba:3e:b3:5e:2b:a6:20:4c:b0:9b:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:6d:18:6a:56:df:c3:7a:61:64:0a:8f:af:c7:3d:a2: 39:cd:33:24:34:aa:40:66:68:ef:51:56:a5:1d:46:34: c8:5b:7e:1c:e0:14:d0:83:9a:93:6c:9a:59:c8:2c:0a: cb:6a:6d:ca:19:d3:93:74:31:15:52:36:49:35:e0:ef: 91:d2:04:c1:7a:ef:0c:d0:cd:1c:45:45:7b:2e:26:10: 38:90:2d:8e:99:34:5d:cf:e6:90:f5:d8:18:d0:96:18: ab:c2:92:24:c9:51:ab:68:69:1c:4f:4e:5c:d6:ff:65: b2:29:4a:0b:8d:fa:5d:ae:53:5e:f9:66:9f:51:79:fc: c2:cb:29:3b:ba:2d:c5:a4:39:5d:59:f6:3e:1f:d1:ac: 89:fd:21:2c:bd:a9:4a:e6:e6:43:c2:2a:cb:bb:be:9e: 32:7c:85:ce:7a:21:6c:e6:33:45:d3:cb:7a:4f:3f:46: f1:bd:76:8f:9f:10:06:6d:1a:76:7c:8e:ca:44:35:86: b3:06:1d:67:46:27:f6:47:ef:99:44:d4:f8:b1:9a:c6: 35:04:de:c0:6f:c1:0d:8f:73:75:55:bd:fb:59:e1:b5: e9:69:00:55:01:ff:3d:9d:40:95:2e:ce:aa:6d:9d:b0: f0:33:5b:17:56:f1:cd:35:a5:eb:d2:23:4a:d8:28:fa Fingerprint (SHA-256): 95:E4:D5:87:B0:4F:1A:B0:1B:07:7F:8F:13:E2:AF:41:25:4C:AC:F3:29:2F:86:E9:62:02:41:80:D6:9B:A8:77 Fingerprint (SHA1): 8C:F1:53:F2:2F:E4:E9:4F:0B:BE:64:F0:6B:1C:AD:7D:50:CC:00:68 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201877 (0x1315e495) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 20 20:20:18 2023 Not After : Mon Mar 20 20:20:18 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:f6:c6:58:b4:6a:14:8d:e3:39:70:e4:f5:79:53:0d: 5a:85:7b:22:e1:8e:7a:df:c9:7c:19:2a:66:20:bb:37: 8e:b2:1d:a0:28:41:9f:5e:7f:2b:90:3a:28:66:6a:af: 23:3a:cc:30:53:ed:e2:ae:27:ee:7f:a4:99:94:49:d0: 70:1b:41:16:51:48:4c:94:c2:a5:53:db:44:f7:6b:f5: 56:8e:8b:b6:3d:f3:25:5b:87:4b:7f:d3:ab:37:8f:06: 94:63:2e:a2:f2:77:5a:b6:5f:1f:0c:7d:22:5d:90:5d: 51:f8:a6:62:fc:55:41:9e:a7:6c:1d:a3:47:d8:93:58: 2e:a4:2d:3d:b2:df:18:0b:cb:dc:a9:7b:e7:e9:07:7b: b4:96:15:df:f4:61:ec:0b:02:4a:7f:86:de:a6:4e:d2: 91:13:ec:eb:a0:da:66:9a:6a:54:ec:4c:78:90:49:92: da:cd:af:3c:f2:8f:33:09:f3:85:88:3a:cc:f4:6c:5f: cf:80:1d:1b:85:c4:6a:4d:69:06:ad:ee:2b:a2:cf:7f: 01:4b:d0:01:ab:6c:35:63:d6:96:58:a5:7a:67:79:0c: 46:ae:88:47:47:45:fe:49:8c:25:47:06:89:09:5b:df: a0:11:c7:73:0a:3d:11:3f:88:06:74:00:05:b4:45:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:94:c3:6b:e0:6d:73:a0:85:34:a6:57:99:39:ce:92: 68:a8:09:d6:b9:ce:15:93:76:95:4a:ab:06:bc:e0:d2: 6d:40:bf:1c:2d:2b:90:b0:30:d5:32:8b:08:fd:b7:e7: 0f:48:a1:86:dd:b3:1b:2e:69:95:82:17:8c:cf:56:b5: ef:2c:a9:97:d8:11:b7:18:7a:e9:a6:ad:db:48:c6:71: 59:98:fc:4a:62:c7:bc:70:23:ed:b6:4a:ef:4f:cc:eb: 79:0b:40:03:05:94:e9:e4:a5:3c:da:27:16:7a:ec:fa: c9:91:c7:9f:32:1d:f9:a8:7b:ed:19:9d:4f:3c:0f:d3: 26:91:21:fb:35:7f:6f:62:d5:4b:ef:8e:f4:30:64:d5: 6e:c2:8a:71:7b:fc:26:99:03:ff:67:5a:6f:b7:88:b2: 94:51:8f:ee:5a:f5:e8:46:15:58:f7:12:07:af:13:99: 41:53:50:f6:9e:47:74:4e:4f:31:d2:78:4c:21:4d:03: 63:40:9f:3a:8f:78:20:37:16:17:0f:c6:8e:b2:37:8c: 80:27:cb:5a:5f:14:c6:8a:cb:c6:76:18:37:39:60:aa: 2f:b0:86:73:49:6f:51:2f:32:a8:19:5d:51:8d:79:b3: 0c:26:89:a7:44:b8:a3:90:5a:cc:28:be:04:46:23:7c Fingerprint (SHA-256): 35:71:76:0A:2B:4D:27:88:A7:8E:6F:F3:08:E5:B4:BF:10:EF:9C:21:ED:B9:9C:CF:AD:B4:CC:B2:30:A9:A2:EA Fingerprint (SHA1): 90:FB:2E:D3:0E:90:88:89:B3:20:D8:3B:50:6D:9F:0B:FE:61:D7:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201878 (0x1315e496) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 20 20:20:18 2023 Not After : Mon Mar 20 20:20:18 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:5e:78:61:c7:8f:b0:45:96:70:58:72:e4:ef:b8:06: cb:3f:4e:28:75:6d:61:14:fc:3b:fc:79:87:a0:d7:31: c6:25:1e:f1:0d:a5:10:b0:94:23:6b:9f:69:e2:44:f2: 96:46:fa:ac:6a:8d:2e:8a:37:53:f8:42:f6:20:51:aa: 7c:3d:4d:f0:58:26:78:cc:78:8b:ce:bf:16:7b:16:86: a5:38:16:b0:67:7d:2a:7e:e8:d1:2a:30:52:a4:30:16: c0:59:9e:bd:3f:94:1c:11:ad:fb:cc:9f:4d:e7:f4:84: fd:21:df:b2:69:03:b7:bd:aa:de:de:81:ea:27:8d:1f: d6:bb:e1:2e:eb:83:92:fb:a3:8c:2b:0a:7d:04:b1:3d: c9:c8:c1:84:f3:c2:39:1f:11:bd:98:21:10:17:74:e6: 66:51:2b:a5:3c:e4:14:2e:b4:28:1b:74:d2:80:cf:bd: d1:dc:39:87:81:8d:95:ba:cb:80:1b:6f:99:0e:87:cf: 8a:57:b0:8a:e3:b3:84:09:e2:05:33:ec:9f:65:17:33: b0:ec:89:e3:22:ca:07:1c:d6:57:a4:b4:fc:e3:ea:91: 03:79:66:65:8a:44:c6:d5:a3:56:df:ff:e0:30:52:ed: 21:28:d6:6c:01:de:b1:92:09:a0:0d:87:b5:68:62:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:50:af:3a:42:71:71:d1:ea:4d:06:f9:42:73:aa:3b: ce:c5:02:ee:b3:ca:c9:05:7c:a1:2e:25:71:90:78:95: e4:d1:f5:e5:c8:de:24:d9:5e:ce:33:82:a0:f0:f5:56: 7a:ab:d7:7d:23:41:08:0a:10:0f:12:77:02:13:76:8a: df:3c:64:c3:f5:31:32:63:e0:13:07:dd:21:9c:9c:5c: 5e:41:d7:9d:f8:84:ce:61:53:9f:48:04:a0:d2:7e:39: ef:94:f2:63:bc:ab:a3:ab:f7:07:1e:5a:04:a8:a0:8c: e0:49:e3:b9:37:3e:b3:a8:72:dd:88:16:59:4d:1a:54: 22:2e:77:3e:e2:c9:cd:04:3b:fc:01:da:b3:a3:53:f2: 74:e1:51:61:98:d7:fa:7e:2e:06:40:0f:8b:10:0c:91: 0a:b8:7e:4c:5a:1c:4f:2f:eb:a2:dc:9d:67:1d:bc:f1: 98:89:78:db:bb:28:95:bc:8f:3b:f1:a9:1b:39:96:bc: e1:04:e8:7f:5a:91:7d:11:88:f0:c5:6c:44:56:ee:ae: 69:ab:88:a5:f1:85:67:f1:5d:b6:27:57:d8:f7:88:b3: 3c:f4:7e:50:22:f2:be:c5:fe:0b:04:4a:a3:78:3d:b5: fc:fc:2d:a0:9f:d4:de:37:62:60:80:5d:68:58:0f:9e Fingerprint (SHA-256): 27:F0:A7:45:F6:A5:33:DB:37:6F:55:A2:7D:D4:28:1C:78:D7:FB:53:45:FC:E1:2B:21:34:AF:DF:ED:F3:68:96 Fingerprint (SHA1): CF:F7:91:3E:DA:8C:34:84:F4:C6:60:EA:94:2F:0E:6B:24:BF:E2:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201879 (0x1315e497) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 20 20:20:19 2023 Not After : Mon Mar 20 20:20:19 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:69:8d:db:4d:db:f8:b2:12:dc:b7:a1:53:db:45:f2: d6:9e:7e:a0:45:ec:eb:73:f7:27:e6:6b:41:59:89:f8: b2:31:e8:57:31:71:d1:73:94:4a:90:cf:e3:6a:d1:04: 73:7f:8b:e3:b9:8f:c5:b8:bc:a7:9c:43:2a:08:ba:04: 9c:c2:a7:fa:79:80:8f:26:52:f2:f6:53:d9:b2:3b:2f: 5c:e7:4e:be:6b:d2:68:4b:a5:21:94:50:7f:bf:ec:75: db:95:55:45:9b:a6:59:7e:1d:b6:34:be:2e:ee:07:e1: b8:8c:29:41:3c:40:88:18:c2:d9:18:9b:69:18:bf:e7: 56:76:19:cc:b5:6a:58:77:54:d5:75:76:0b:34:3c:24: c3:85:1c:47:8a:bd:74:e0:c9:7e:79:b2:28:ef:e0:31: e9:1f:83:b3:8b:c9:9a:e3:00:e4:3b:b7:c2:cb:6b:18: 68:e0:55:56:d1:b4:d8:e3:66:94:64:b3:60:82:d6:1f: 55:c1:85:46:f2:8c:5d:ca:f2:1f:9e:e5:4d:12:38:d7: d5:2e:b3:8f:75:d6:a6:42:d2:91:94:b9:aa:58:a9:f3: 54:69:4f:e7:24:a2:fc:35:59:98:8c:1c:7c:59:cb:8d: d2:bd:1c:0e:13:f6:8f:e7:a6:41:0a:ab:e9:75:75:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:8f:eb:3c:62:6e:eb:cf:f8:cb:b8:d0:7c:02:df:ee: 40:18:c4:ea:fc:69:dc:2b:82:aa:66:4a:94:0e:80:fd: 0a:89:df:b8:81:f3:f5:ff:16:aa:a5:19:41:8c:41:63: da:d7:b0:fa:9a:5a:f8:38:e3:47:ac:16:25:b4:a2:b9: ca:ee:74:6c:07:b9:d1:b2:06:09:8c:79:cc:2b:a7:9b: e1:d8:19:ed:da:76:f2:63:1d:63:85:76:4f:e9:e5:d8: 94:cc:31:79:ea:20:04:00:7d:a8:87:0e:a5:53:d4:f4: 9b:0d:74:9f:21:41:89:48:82:a0:7f:2e:6d:fe:1d:56: 5a:25:a7:0c:6e:4c:02:e9:e6:b7:70:1e:3e:61:b4:be: a2:de:6e:8d:62:f4:7d:8a:32:9d:bb:ef:15:01:d2:bb: 4d:57:e1:09:e6:4e:3c:00:70:20:69:7e:fc:83:16:45: c0:92:ba:7b:21:0b:b3:4b:6d:a8:77:58:cd:5a:80:e5: 2a:5f:d1:92:08:30:3c:7c:cc:e0:d0:02:1b:21:91:5c: 5a:f1:3d:1d:54:08:ac:72:c9:28:a6:98:96:df:85:10: ac:28:d9:47:cc:5f:92:28:6d:b1:e9:5b:7e:ec:bd:e0: 23:2e:c2:d7:d5:11:cd:57:d4:49:2b:fd:3e:c9:5b:2b Fingerprint (SHA-256): E4:9A:49:A5:F3:2A:01:F2:CA:81:91:28:47:60:66:EC:AC:7E:E1:0F:BD:A5:41:A5:C3:F2:B6:1C:28:EC:65:6D Fingerprint (SHA1): 9C:12:76:A7:B7:1D:B0:B7:14:54:41:36:2B:B0:8D:E1:E0:37:A4:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201880 (0x1315e498) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 20 20:20:19 2023 Not After : Mon Mar 20 20:20:19 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:93:42:55:74:d6:d3:50:3f:cb:6e:82:b8:6b:e8:40: 23:b3:79:29:eb:61:c7:5c:49:8f:c0:1a:b5:45:4f:4a: 40:bf:b1:74:9c:94:c6:bf:0b:71:69:0e:d1:35:46:0c: 44:a7:e3:6a:bb:b0:6c:87:b6:20:c6:29:ab:e7:a9:c4: e8:81:3c:e4:2a:01:86:93:dd:41:f4:e5:a9:ac:b1:57: 15:f0:27:bc:92:9c:69:e9:58:eb:0a:78:06:40:0a:64: 30:34:5d:ef:e2:78:94:af:d9:f2:45:9f:7b:fc:e8:bc: 98:87:ab:e0:ae:0a:d4:07:11:58:81:98:10:b6:d4:6a: 37:bd:6b:1b:ef:82:fe:da:f9:38:9a:92:0b:d7:0a:9f: 2f:01:dd:97:38:40:35:82:35:75:b6:0e:1c:17:55:03: 17:be:f8:f7:cc:63:ac:d7:19:c3:e6:27:b3:e0:e8:94: 11:3b:dd:ab:e5:25:66:42:7f:61:f4:18:df:f1:02:5e: 2c:04:d9:8a:43:82:4c:ea:44:97:2a:af:ca:88:63:18: 49:56:4a:02:b2:9a:b6:8e:1f:fc:9e:36:08:6f:b5:17: b0:d2:0c:65:f4:5f:fa:e9:fa:91:81:6c:fc:01:95:f0: 54:4c:21:b0:3b:24:f8:70:48:40:68:10:ce:ca:aa:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:35:45:38:75:d5:2b:ae:7f:b7:e2:5c:15:bb:7a:47: 79:5f:21:29:89:44:a9:21:a6:c5:37:9d:f9:9c:b9:5f: ea:95:91:e1:97:1f:46:3a:5a:60:96:17:fa:d2:12:6c: 0e:38:92:dc:ca:a8:ab:d6:fd:e1:20:72:19:68:81:f7: c9:05:1c:4c:01:fc:55:2d:54:1a:f5:ff:a4:d3:24:9d: 53:4d:f3:ad:09:66:f3:b5:e1:b6:d9:f2:b2:91:f8:e6: 7f:4c:f9:34:48:43:e4:a1:0b:00:f9:47:43:8b:f5:5a: 2a:82:f1:bb:b5:b9:88:d1:f7:b3:cd:ca:ac:99:b7:77: dc:bf:49:91:e5:a8:90:59:61:8f:14:83:59:d4:93:f5: 32:a2:40:58:cd:fe:b6:36:38:52:5b:2f:e4:7c:f7:af: e4:1c:0d:b5:a9:4e:bc:47:39:1b:49:60:ce:e7:8e:15: ba:5f:9d:94:10:3d:a0:fd:f8:c3:ac:ce:d2:7c:64:74: e0:72:c6:7f:43:0e:f7:95:a2:1d:33:dd:e1:bb:3f:6f: 50:ce:44:3f:4f:f7:c3:77:a9:ff:83:68:2c:a8:12:82: 19:79:97:81:8d:7e:ec:8a:26:d5:52:1a:c8:4e:b8:2f: cf:9a:91:3e:25:e7:f7:a5:94:e8:dd:07:d0:f1:f3:ca Fingerprint (SHA-256): 66:E8:59:52:B3:BD:DD:FA:34:4F:7D:37:9E:0A:9E:2C:1C:93:F6:55:07:F6:42:02:F6:3D:21:CA:D4:B2:A1:4C Fingerprint (SHA1): F5:D0:5E:38:C9:55:E3:C9:81:06:9E:77:64:79:E3:FE:74:28:3A:9E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201881 (0x1315e499) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 20 20:20:20 2023 Not After : Mon Mar 20 20:20:20 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e0:1c:b8:b2:65:a6:97:66:a6:86:00:17:af:a5:2e: d1:32:30:db:a8:8c:af:01:58:2a:8c:09:ca:c0:8a:14: 29:1b:f4:a5:3a:c6:67:5f:9b:94:38:f6:83:06:80:6a: 67:d6:60:a1:84:a2:de:86:6e:1c:e6:1e:9f:3b:b7:dd: 5a:2b:3d:c7:b3:8a:88:cd:a1:a3:db:74:8f:88:22:01: 58:cd:5b:47:ad:c1:c2:20:47:f0:33:d3:d0:16:dd:87: a4:e2:ca:3f:79:cf:5e:c1:43:3d:09:78:62:cd:20:fb: e1:89:79:d5:76:a8:47:73:d9:18:1c:29:6e:89:2b:47: d7:02:ff:b2:88:73:3a:4e:93:8d:79:6a:bd:30:4a:2d: c1:36:1e:0f:45:d1:cc:54:7e:d7:ca:e5:2e:bb:49:c2: ef:ca:4f:cc:85:19:dd:33:78:39:63:8e:69:0c:1a:c9: 25:82:bf:8d:18:4b:c7:01:f9:1b:0f:75:81:d3:0c:80: a6:a4:cf:c2:cb:a3:54:2f:58:70:59:28:8b:1b:07:28: 27:0d:50:6a:4e:d7:c3:c5:03:3c:6f:f4:46:c3:d9:cd: 3d:3e:b9:6f:8a:df:4c:f9:f3:71:af:39:24:54:35:2c: d2:8b:78:89:23:ee:c0:41:84:72:ea:31:2b:d8:bc:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:72:66:7e:4a:56:fe:a6:42:34:c8:04:39:70:4d:ed: 63:e7:a8:68:a3:8d:96:1d:38:e5:68:fe:95:a8:cf:98: ce:36:6a:55:df:2b:8e:73:b0:0b:6e:0f:e3:66:a6:1c: 2b:51:e1:c0:12:a5:13:d4:da:23:f2:7a:e8:0a:05:82: cf:3b:96:7e:c2:7b:06:fd:58:83:4a:17:1d:54:2a:71: 87:ea:c8:55:14:be:57:4f:72:a0:58:9f:07:64:5c:f9: 66:ea:58:d3:94:62:f1:04:d3:d8:4d:6b:90:d8:9d:83: fd:7e:24:2c:66:2f:a4:d5:26:38:31:f4:39:16:f6:26: ee:0c:5c:4e:fd:82:4f:cd:37:b8:25:43:63:0c:64:88: cb:a4:1a:4a:86:74:55:6a:ba:01:81:30:f3:6e:1f:62: 59:e6:c8:7c:83:0f:ac:3c:ef:f1:45:f3:44:e4:f0:9b: ad:0f:80:da:45:c8:07:ec:2e:85:92:3d:c5:44:2b:98: d9:ea:cd:ee:55:88:b2:08:c6:09:38:3b:80:94:3a:e7: a9:1c:88:54:68:b0:c9:e0:bb:47:22:64:56:59:cc:f2: de:9d:9f:c0:f2:4a:bd:02:27:ff:bf:ab:98:b0:d4:64: c6:18:19:68:f4:a4:21:fc:b8:f1:2f:9e:8a:d4:aa:a1 Fingerprint (SHA-256): 69:01:64:18:38:13:EF:54:67:14:38:8F:3E:BC:B3:D4:A8:11:3B:14:4B:74:8A:0B:C6:5F:7F:62:48:23:51:59 Fingerprint (SHA1): 3D:FC:6C:B9:76:13:A4:1F:F6:B2:3A:4E:31:90:40:37:5D:63:39:4A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201882 (0x1315e49a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 20 20:20:20 2023 Not After : Mon Mar 20 20:20:20 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:37:53:8c:28:51:56:da:b1:e5:92:78:00:2f:cb:fa: 9a:04:b0:af:6a:7c:0c:76:5b:42:d3:8a:10:ad:24:4a: 09:b8:03:6c:b5:7c:32:ae:ee:a2:af:aa:2e:c4:7d:81: 97:83:de:33:80:4b:d0:45:66:e7:3d:01:ad:8f:46:24: 0e:f7:af:0e:07:ff:fb:9e:2b:64:a5:63:81:e9:e2:79: 09:0f:52:a5:50:6a:b6:62:67:23:51:47:dd:7b:17:e7: 4f:4b:b5:cf:2f:76:bb:96:21:cc:28:9e:45:38:a4:58: c7:38:f3:4f:6f:39:9e:6b:5f:21:44:ab:a4:b9:58:a5: 4a:60:b7:d2:78:43:c4:2e:d2:67:5a:2a:c2:90:7a:ca: 55:14:41:39:23:94:3f:54:53:8d:6d:4d:0c:1e:d2:b3: 78:90:d5:19:e6:76:97:2f:d6:a6:65:fc:ba:fd:2e:b1: a2:40:9b:92:bd:09:80:53:c7:a2:33:04:cb:35:ce:15: b2:07:37:3d:dd:3b:84:0a:ba:4c:e1:f1:bf:24:d9:d2: 38:7a:69:d2:a3:f7:43:cb:28:cf:a2:ea:99:ad:18:b4: 23:8d:2d:1c:a0:8b:b0:4a:05:7e:89:98:f8:a0:24:b3: c4:69:5a:be:90:09:0b:d4:04:91:e3:65:13:0b:77:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:d6:cf:28:94:f4:b7:4c:e7:fd:d5:12:c5:3a:8d:07: 89:39:e0:bf:14:87:dc:b7:88:ab:25:37:80:a7:6e:05: 45:cb:c2:2d:7f:75:e8:89:53:2a:54:d8:f0:4d:bc:1b: 53:79:e7:58:22:49:bb:d3:67:93:eb:11:3a:f3:d2:a3: 81:96:f4:8f:b4:23:4c:2d:64:21:a1:75:e9:c4:68:ec: 80:ee:9b:5e:54:ff:3a:87:fc:ae:7e:c7:94:1d:bf:f9: e8:2d:ff:50:a6:de:14:df:8b:c9:ac:00:f5:5f:2d:eb: 5f:5c:24:27:f5:c9:d6:45:02:f6:b6:2f:fc:46:1e:b2: c3:f9:b3:a3:fd:9c:5d:09:44:59:c3:9c:4f:65:c8:1e: a5:ce:40:54:e0:42:41:7e:7a:e7:a2:05:d0:ab:8b:3e: 2f:ce:29:d0:b1:6a:ad:12:e1:1a:0c:29:7d:b7:dc:8e: a7:24:ac:bb:26:9f:5d:c9:51:80:81:10:ba:90:ad:39: 23:74:17:a4:8b:c6:11:48:65:ca:4d:0b:fb:8e:bf:5f: fe:1a:8c:1d:da:81:8a:a2:11:06:f9:8d:4b:bd:32:40: 1f:e3:c7:71:16:2f:38:1d:68:e6:23:25:10:99:dd:17: d7:ad:ab:cf:53:d9:0f:fa:09:d3:de:db:aa:61:ab:9a Fingerprint (SHA-256): BB:45:5F:16:09:EF:49:53:70:BE:EE:8B:7A:F1:8D:D7:BE:16:6B:FF:85:13:B6:CC:ED:45:3D:82:6E:B8:00:4B Fingerprint (SHA1): 7E:40:2E:B5:09:CA:AF:7B:7A:BB:53:1C:29:79:39:B4:0A:D1:C8:B8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201883 (0x1315e49b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 20 20:20:21 2023 Not After : Mon Mar 20 20:20:21 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:16:82:7f:98:13:61:a7:94:90:39:bd:1c:a5:bd:6b: 2d:e4:c2:e7:63:c3:56:6e:08:4b:9e:56:06:32:d3:12: 1a:e4:46:de:eb:64:1c:c7:1f:e8:8f:9e:ca:09:bc:bb: 48:16:75:80:93:78:c3:ee:57:88:20:49:8e:b6:a0:3b: a9:d5:5a:49:bb:25:d5:8c:2f:e1:d7:8d:c5:b1:f0:54: 42:47:97:30:a1:8c:10:50:ac:75:47:f9:26:19:e6:fe: 6f:7a:23:9f:37:2b:62:c8:e4:34:30:e4:16:e7:d5:e4: e2:be:a1:e1:d0:72:dc:7a:2a:59:d0:77:bb:c2:72:a3: 11:1e:29:d6:85:69:c1:29:11:c2:a6:5f:46:e1:2e:91: 29:99:7d:53:db:0e:b3:eb:52:b6:05:d3:1c:dc:4a:b1: 03:75:0d:60:ac:66:77:86:33:d6:97:89:cb:7b:70:3d: 70:52:19:6f:e6:4e:fe:56:ea:8d:4b:19:d8:b8:ae:03: 9d:a7:a8:0a:90:8d:b1:f0:1f:30:f6:14:19:82:80:7f: 8f:7a:cb:15:47:0b:3d:d0:da:c8:d5:46:99:41:cc:32: 0a:92:e4:c1:ba:5d:b6:78:d1:82:43:b1:51:2c:7c:4a: 0e:af:84:ab:60:b1:e2:9f:f7:16:aa:f3:e3:9f:14:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:21:94:77:57:cd:4c:3a:4f:72:33:9e:25:e0:87:76: 5b:58:dd:fb:f0:79:d2:03:e9:3f:fa:89:41:b8:d6:1b: cc:a1:47:2e:8e:fe:bb:61:7a:de:fd:0f:fd:79:e1:33: a2:89:04:78:a1:5c:ae:24:ef:fb:60:3c:f4:dc:0d:31: d3:10:60:89:d1:a5:4e:1c:c7:59:66:8d:36:47:c8:e4: b8:da:59:c3:71:fe:ba:4a:d6:24:89:5e:d7:d9:df:de: d7:78:e8:85:d5:1b:b9:40:57:6b:85:bf:a3:dc:a9:b5: 91:22:ce:50:68:11:16:96:bb:33:4f:46:37:0c:5e:ee: e5:db:b9:7c:27:c4:a9:26:a4:a5:af:2a:47:af:99:bd: 65:34:fc:6f:67:8a:c3:3d:e2:f2:b3:bf:3f:74:cc:32: 51:1b:be:c2:4a:25:25:bf:fd:61:73:b8:c9:c0:a9:12: 80:ed:42:e3:12:aa:80:09:5a:12:55:05:37:e0:e1:d9: 12:0f:9d:a3:7f:88:26:cb:c5:45:18:39:01:64:76:38: 06:b0:5c:c9:c0:a4:40:1f:cd:7a:17:a6:17:9e:65:a9: f1:62:fe:f8:b3:47:e3:7f:cf:34:ed:64:53:35:4b:59: 05:37:ca:cb:03:02:5c:95:5c:7c:48:f3:01:62:86:0c Fingerprint (SHA-256): DF:44:24:DC:A2:E1:59:AD:65:EC:BA:72:F0:C9:BA:09:20:4E:4E:DA:B9:4A:7F:55:83:41:5D:11:BC:66:42:5E Fingerprint (SHA1): 12:0F:6F:33:93:B8:A4:63:69:82:DE:C9:72:96:C1:96:82:1E:8D:5B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201884 (0x1315e49c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 20 20:20:21 2023 Not After : Mon Mar 20 20:20:21 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:da:08:40:50:3b:09:92:31:72:d5:e7:42:ec:06:9f: 66:06:c7:c5:6d:ed:d6:d3:85:88:04:78:a3:13:65:5b: fd:42:36:36:16:70:c9:b4:ee:2c:73:5e:e8:d0:a5:88: d2:34:5d:6f:04:f9:03:70:6b:dd:73:5d:d6:b3:b9:29: 7c:95:73:d5:4c:09:2c:63:e1:54:f8:23:5d:94:6c:b4: 24:bd:b9:5d:dd:bf:9e:08:aa:6b:08:19:00:64:2a:7d: de:76:91:af:df:80:2f:1a:d8:75:dd:28:f7:ec:c3:e6: 37:4a:bf:3e:ae:9c:c7:55:5f:4e:2f:5d:5c:79:46:df: 33:f2:2e:db:7e:52:32:4c:08:05:b5:0c:cc:5f:84:7e: 4b:17:32:a3:02:a7:e2:2b:b8:9d:a4:9d:89:af:28:9b: 54:ee:2e:6d:38:a1:68:91:f1:76:11:32:7e:10:a0:0a: c9:71:8a:59:f1:86:41:b1:54:0a:73:4d:ba:eb:03:4c: 09:75:b3:17:72:67:79:34:a0:7c:fd:34:ed:ea:84:86: d8:16:1e:45:c5:33:28:1e:94:77:33:dc:06:e7:87:e6: 07:9d:5e:80:6b:1a:b3:33:67:ac:f8:bd:3e:b8:aa:a6: 67:ac:af:a7:f2:87:38:25:5c:bc:9d:95:65:0a:f9:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:18:f7:8b:cd:ea:0d:65:71:bb:64:9b:96:97:b6:52: c5:1e:22:22:f3:1e:17:42:e2:0e:42:e0:e1:d1:12:41: a2:8a:03:c8:ef:79:84:ee:9f:2c:7a:29:63:6c:12:ea: 8c:88:e3:c7:5d:c0:4d:1a:b3:d1:a4:58:a3:39:ae:1d: 97:e9:a7:fe:c2:52:0a:4e:41:c3:52:58:b8:bb:ba:b5: b9:05:48:a6:7f:7b:44:f5:1a:eb:b7:1a:3a:99:eb:28: 71:dd:dc:73:d9:f7:1b:78:f8:b6:34:58:33:66:c6:3d: 6a:9a:9f:7f:aa:9d:97:7a:2e:d9:bd:5b:d3:c1:a7:1a: 1a:cd:99:60:53:3e:98:6c:65:e9:32:68:08:b8:c6:81: b5:fb:27:62:8a:08:dc:a9:3f:01:11:f5:c6:70:a1:ca: 18:3e:3e:8a:6c:9d:f1:54:78:10:41:13:e6:50:bd:da: 84:01:29:42:38:70:40:ee:d7:0d:ef:9b:0f:6d:28:34: 60:da:a3:d1:f5:f1:78:5a:1f:7c:a4:f0:df:60:1e:c1: 95:b5:32:ee:5f:ca:2b:e1:24:86:b8:77:fe:62:e0:38: 17:dd:c5:6b:d9:79:1f:81:ef:ea:1b:11:2b:de:33:3f: f3:ec:b8:dc:98:63:65:1b:cb:0f:c1:4b:0b:01:58:55 Fingerprint (SHA-256): C4:31:4A:A4:47:E9:E1:40:52:80:5A:B9:B4:6B:84:8D:4A:4E:EE:56:30:21:42:F9:92:9D:E6:71:3E:9E:EA:F0 Fingerprint (SHA1): CB:57:AD:7C:E3:56:87:AE:85:9D:AE:85:54:07:5C:6B:37:88:25:24 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201899 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201900 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201901 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320201902 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201899 (0x1315e4ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:29 2023 Not After : Mon Mar 20 20:20:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:de:8d:0c:91:87:0c:ee:cf:9d:26:81:f6:6d:85:9d: 03:05:10:ef:2e:e4:5d:ed:88:dd:58:b4:02:10:14:8e: ea:ff:8d:93:be:de:77:02:e7:8e:99:df:02:56:b1:5c: 13:d0:82:f8:58:2f:07:5d:3b:e9:49:46:20:ab:55:da: 31:63:cd:3a:3d:97:17:7c:9c:16:93:f7:01:37:7c:e5: ae:e1:24:4d:68:b9:41:09:f3:e3:3b:90:c4:47:cf:12: 20:4d:ab:7e:7a:da:e5:7c:b6:74:ca:4b:a1:08:57:fe: 71:23:09:9a:79:ae:74:25:3b:8d:37:df:09:2a:97:20: 15:af:24:e9:f1:34:07:50:80:0b:46:20:ea:3d:93:18: 8e:8a:4f:a7:a1:d6:5c:17:3f:9a:e6:fe:16:c4:55:a5: 68:0d:2e:7b:f4:40:34:4d:cd:22:5b:84:ef:8b:28:8b: 69:71:8d:ab:50:c6:72:8f:b3:38:62:cd:41:67:4a:52: da:ef:aa:53:31:9f:c7:f2:57:3e:d6:5b:59:0a:4c:b9: 86:9a:2e:c1:35:b4:b4:db:fe:f0:4e:3c:93:8e:df:f4: d8:0f:68:35:6a:a6:53:c3:ea:bf:3e:46:59:28:39:2b: 4a:6e:55:17:08:1a:f9:dc:b2:bb:4e:bf:2b:45:f7:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:a4:b7:aa:50:83:fb:57:ef:d9:86:9d:68:b9:4b:a1: 34:b3:b3:02:f8:45:53:49:54:d9:5c:05:ca:81:76:2e: 07:01:fc:5d:5c:c3:78:9e:e9:e3:34:66:52:77:7d:a7: d7:c2:6c:a0:ab:df:c8:86:a2:54:cb:e2:a5:94:11:66: 60:52:e1:ac:63:21:0a:8e:a9:35:b2:41:1f:58:35:d5: 58:1e:b7:ba:96:36:59:60:6f:bf:57:b0:ea:21:da:20: 41:0b:a6:02:8c:36:4e:00:7a:94:96:4d:ca:4b:af:db: 7d:f1:a4:12:34:ca:89:67:7f:39:81:6b:6b:75:ff:63: b1:9d:d2:52:a8:a8:d1:9c:10:77:de:e5:7c:f6:eb:bf: 6c:9a:ab:4b:0c:72:a3:94:d1:21:e6:e5:e9:5d:9e:e5: a2:0d:c4:a2:13:66:97:65:c4:19:6e:fc:8a:f9:30:30: 1a:2b:fa:e9:42:33:df:fd:53:a1:0a:9a:38:98:b8:75: 9a:bc:d0:7d:89:10:8a:21:ca:60:e8:9b:aa:24:e0:e6: 6d:44:f9:35:a5:0a:74:a4:65:fb:9b:f3:fb:77:10:9c: 2e:92:44:1d:c8:55:75:66:80:6a:08:21:03:f9:6b:d6: 2c:d2:a5:97:76:de:e2:95:86:eb:55:9d:57:0a:0a:cb Fingerprint (SHA-256): A9:45:A1:40:6D:32:C5:AC:4C:C9:DC:7C:7B:A1:41:92:0D:B4:1E:55:D5:D5:6A:7A:0E:EB:46:C8:2A:3E:AB:4D Fingerprint (SHA1): B3:8D:4F:6D:BD:29:DE:45:6D:6D:93:7A:2C:72:C9:E3:51:91:AD:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201900 (0x1315e4ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:30 2023 Not After : Mon Mar 20 20:20:30 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:14:ca:5c:13:70:af:49:6c:8b:7b:39:db:b1:19: 06:87:51:f1:1b:d4:cb:58:88:a8:30:b8:e1:48:ed:84: b8:d6:b4:6a:b3:3d:09:5a:c6:4c:66:23:9a:8a:e5:6f: 0d:8b:94:9a:90:be:ba:7c:c7:9c:f9:53:72:85:0e:7f: 23:b7:d2:d4:33:5e:02:d7:4d:eb:ff:02:e4:0c:43:85: ec:cf:ec:34:00:5a:2d:09:06:41:c7:e3:59:b8:4c:1b: be:cd:8b:b2:f9:51:89:ce:d7:56:6e:37:35:5c:e1:e0: 2b:14:ca:55:98:2e:7b:92:5a:42:4b:5b:4f:5a:f1:2a: 98:c1:e0:ad:f5:63:88:11:ce:14:a6:91:41:57:69:48: 4c:1e:bf:0c:3e:26:f6:e9:30:c7:c1:05:4d:f5:9b:4b: cd:43:1b:d7:ac:22:00:bb:82:9f:d8:5f:c9:b7:92:1e: 52:aa:45:1a:d4:21:24:af:7a:09:68:bc:36:3d:d0:86: 3a:8f:0f:b1:d2:b1:73:41:fb:8d:10:db:a1:d8:4c:de: fb:42:48:85:a3:53:db:dc:3d:f2:1b:a9:07:d7:bc:e3: 4a:98:64:cc:bb:61:e0:04:7c:20:14:54:07:5f:3c:e7: bd:24:a2:92:99:8f:9b:5f:ad:68:39:bb:bf:1f:53:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:1d:cd:af:62:43:c5:e6:36:26:5a:c6:08:2c:c4:61: eb:42:fa:ee:44:8e:68:f7:44:12:f1:b3:67:b9:70:a5: 90:07:ce:65:70:47:83:aa:ba:9c:68:cd:76:84:0d:47: 76:49:a1:4b:31:ae:e1:cb:01:fd:f5:40:b3:69:dd:cf: 67:40:44:55:ea:60:8e:17:30:da:0a:7a:73:7e:f6:cf: 5d:7c:b3:e5:cc:8d:eb:58:2e:4b:87:4b:e7:26:87:9c: ba:38:70:5a:fd:e5:ec:a1:ef:09:34:b8:3f:97:74:03: 74:95:eb:76:ca:f0:e6:77:ee:79:db:4f:bd:8a:52:1e: 9a:71:24:fb:0d:30:f4:a3:79:12:1b:9b:bb:68:f9:35: 2c:17:14:03:14:92:a3:3b:b2:75:4b:32:7c:68:f6:fd: 99:fb:2a:d1:f7:71:2d:bf:60:12:41:9f:d2:00:97:58: 1f:15:be:3e:e5:fa:41:f4:12:3a:b0:ad:1d:23:4f:ff: 08:80:5e:54:34:a6:e6:27:fe:a0:ae:cf:fa:d6:72:4f: 4b:5e:ca:4c:99:96:b1:a9:0d:de:d3:a4:67:9f:7d:f0: 20:3a:61:2c:fd:9c:74:2b:78:35:8f:57:e8:b3:f0:0b: b5:f8:e5:b0:b5:77:a9:0a:c9:d7:2d:09:93:dc:04:fd Fingerprint (SHA-256): 87:03:1E:64:B5:19:79:DA:E9:B0:97:0F:41:03:D4:06:92:1D:FA:3E:95:7F:54:85:49:76:7A:90:BD:E4:F6:D6 Fingerprint (SHA1): 30:74:DE:3B:0B:B1:5E:4A:D4:F7:C2:2B:FE:41:0D:86:4A:B3:6B:BD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201901 (0x1315e4ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:30 2023 Not After : Mon Mar 20 20:20:30 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:73:2f:76:1e:65:0b:d3:4f:46:d1:01:ad:22:dc:11: de:a8:90:f3:ed:bd:20:b8:87:78:c6:85:e7:49:dd:f9: 4b:1a:59:a1:7e:b3:12:18:39:68:94:4c:83:68:0e:51: b3:9b:32:f0:b2:1b:c0:4b:e6:d3:b6:2d:32:6f:12:88: 5a:ca:4d:85:4a:94:bd:da:75:73:13:e6:7b:08:e4:03: 5b:ef:b4:7e:33:f4:d4:c8:2b:0a:19:38:89:0d:7f:88: b6:17:7a:68:71:02:19:c2:a8:3c:f6:6a:1a:fb:87:4f: 77:46:fe:0c:5d:6c:c5:75:b6:20:cf:4f:3b:e6:41:6f: 6d:38:db:24:28:38:a4:2c:55:ac:af:4a:2e:63:82:f3: ac:94:ea:dd:02:b1:4a:04:84:b5:e6:b0:1c:45:3a:38: 5d:17:b4:98:9d:5f:2e:63:d2:61:7d:3a:12:56:b7:e7: 85:42:7e:63:df:67:59:4b:a1:9a:43:ba:82:e5:b7:a8: 1e:21:6f:32:81:a2:cc:bc:b2:b7:dc:d8:87:4a:28:78: 49:45:17:7e:32:3e:2b:80:11:b9:e3:ab:93:54:e9:29: de:74:be:54:ff:71:e7:9b:6f:e1:dc:7f:13:0a:14:e9: 43:7c:6b:43:91:ea:4a:a4:4d:04:e2:01:89:4e:25:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:12:bf:64:15:d5:da:e0:dc:3b:f9:da:7b:c7:4b:da: 93:c2:95:d3:1d:25:5b:ab:2b:c4:29:76:66:8f:d7:bf: 81:70:54:b7:9c:1e:cf:0e:52:88:74:7a:b1:48:0e:a4: 82:c5:64:66:4b:01:5b:7c:d6:2f:71:d3:bc:05:fe:ea: 8a:5d:1e:50:79:8b:32:a1:60:dd:17:57:0c:80:45:89: c0:d1:a1:88:6a:d1:87:72:01:1b:23:a2:02:10:20:ab: 2b:af:c0:de:10:8e:3e:f4:77:a8:f6:c4:f8:a4:d9:6e: 8c:48:9c:cc:64:7b:17:38:96:1a:02:7b:ed:40:35:99: 96:a5:91:97:8e:bc:f8:c8:43:13:3d:92:b0:21:4b:f2: ca:79:76:64:5f:79:5c:ac:6d:c7:46:65:03:56:e9:bd: 7e:1a:49:16:37:8a:af:5c:f5:fe:9e:2e:d6:06:89:3b: 9d:f4:5b:2a:cb:f8:6e:39:2e:70:f8:3b:be:aa:12:70: 69:fc:cd:77:ab:b0:7e:fc:f2:b0:ac:84:f6:e7:43:a9: b3:2d:ca:da:d7:8f:fa:f9:58:26:30:fc:89:00:89:e4: 16:80:30:44:9a:b2:df:c5:af:82:5a:f6:f5:7c:e5:78: b1:79:cb:32:62:22:f4:58:05:f5:fc:e1:42:6a:6d:3b Fingerprint (SHA-256): CB:2F:CC:CB:EA:24:91:FE:B3:E7:2A:7C:D7:CB:85:1A:90:C7:3C:67:32:0E:4F:4B:2A:2D:8C:87:07:DC:B2:C6 Fingerprint (SHA1): D1:E4:E9:28:22:2D:AF:CB:31:52:6F:5F:B5:D0:A3:C0:D1:48:3B:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201899 (0x1315e4ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:29 2023 Not After : Mon Mar 20 20:20:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:de:8d:0c:91:87:0c:ee:cf:9d:26:81:f6:6d:85:9d: 03:05:10:ef:2e:e4:5d:ed:88:dd:58:b4:02:10:14:8e: ea:ff:8d:93:be:de:77:02:e7:8e:99:df:02:56:b1:5c: 13:d0:82:f8:58:2f:07:5d:3b:e9:49:46:20:ab:55:da: 31:63:cd:3a:3d:97:17:7c:9c:16:93:f7:01:37:7c:e5: ae:e1:24:4d:68:b9:41:09:f3:e3:3b:90:c4:47:cf:12: 20:4d:ab:7e:7a:da:e5:7c:b6:74:ca:4b:a1:08:57:fe: 71:23:09:9a:79:ae:74:25:3b:8d:37:df:09:2a:97:20: 15:af:24:e9:f1:34:07:50:80:0b:46:20:ea:3d:93:18: 8e:8a:4f:a7:a1:d6:5c:17:3f:9a:e6:fe:16:c4:55:a5: 68:0d:2e:7b:f4:40:34:4d:cd:22:5b:84:ef:8b:28:8b: 69:71:8d:ab:50:c6:72:8f:b3:38:62:cd:41:67:4a:52: da:ef:aa:53:31:9f:c7:f2:57:3e:d6:5b:59:0a:4c:b9: 86:9a:2e:c1:35:b4:b4:db:fe:f0:4e:3c:93:8e:df:f4: d8:0f:68:35:6a:a6:53:c3:ea:bf:3e:46:59:28:39:2b: 4a:6e:55:17:08:1a:f9:dc:b2:bb:4e:bf:2b:45:f7:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:a4:b7:aa:50:83:fb:57:ef:d9:86:9d:68:b9:4b:a1: 34:b3:b3:02:f8:45:53:49:54:d9:5c:05:ca:81:76:2e: 07:01:fc:5d:5c:c3:78:9e:e9:e3:34:66:52:77:7d:a7: d7:c2:6c:a0:ab:df:c8:86:a2:54:cb:e2:a5:94:11:66: 60:52:e1:ac:63:21:0a:8e:a9:35:b2:41:1f:58:35:d5: 58:1e:b7:ba:96:36:59:60:6f:bf:57:b0:ea:21:da:20: 41:0b:a6:02:8c:36:4e:00:7a:94:96:4d:ca:4b:af:db: 7d:f1:a4:12:34:ca:89:67:7f:39:81:6b:6b:75:ff:63: b1:9d:d2:52:a8:a8:d1:9c:10:77:de:e5:7c:f6:eb:bf: 6c:9a:ab:4b:0c:72:a3:94:d1:21:e6:e5:e9:5d:9e:e5: a2:0d:c4:a2:13:66:97:65:c4:19:6e:fc:8a:f9:30:30: 1a:2b:fa:e9:42:33:df:fd:53:a1:0a:9a:38:98:b8:75: 9a:bc:d0:7d:89:10:8a:21:ca:60:e8:9b:aa:24:e0:e6: 6d:44:f9:35:a5:0a:74:a4:65:fb:9b:f3:fb:77:10:9c: 2e:92:44:1d:c8:55:75:66:80:6a:08:21:03:f9:6b:d6: 2c:d2:a5:97:76:de:e2:95:86:eb:55:9d:57:0a:0a:cb Fingerprint (SHA-256): A9:45:A1:40:6D:32:C5:AC:4C:C9:DC:7C:7B:A1:41:92:0D:B4:1E:55:D5:D5:6A:7A:0E:EB:46:C8:2A:3E:AB:4D Fingerprint (SHA1): B3:8D:4F:6D:BD:29:DE:45:6D:6D:93:7A:2C:72:C9:E3:51:91:AD:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201900 (0x1315e4ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:30 2023 Not After : Mon Mar 20 20:20:30 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:14:ca:5c:13:70:af:49:6c:8b:7b:39:db:b1:19: 06:87:51:f1:1b:d4:cb:58:88:a8:30:b8:e1:48:ed:84: b8:d6:b4:6a:b3:3d:09:5a:c6:4c:66:23:9a:8a:e5:6f: 0d:8b:94:9a:90:be:ba:7c:c7:9c:f9:53:72:85:0e:7f: 23:b7:d2:d4:33:5e:02:d7:4d:eb:ff:02:e4:0c:43:85: ec:cf:ec:34:00:5a:2d:09:06:41:c7:e3:59:b8:4c:1b: be:cd:8b:b2:f9:51:89:ce:d7:56:6e:37:35:5c:e1:e0: 2b:14:ca:55:98:2e:7b:92:5a:42:4b:5b:4f:5a:f1:2a: 98:c1:e0:ad:f5:63:88:11:ce:14:a6:91:41:57:69:48: 4c:1e:bf:0c:3e:26:f6:e9:30:c7:c1:05:4d:f5:9b:4b: cd:43:1b:d7:ac:22:00:bb:82:9f:d8:5f:c9:b7:92:1e: 52:aa:45:1a:d4:21:24:af:7a:09:68:bc:36:3d:d0:86: 3a:8f:0f:b1:d2:b1:73:41:fb:8d:10:db:a1:d8:4c:de: fb:42:48:85:a3:53:db:dc:3d:f2:1b:a9:07:d7:bc:e3: 4a:98:64:cc:bb:61:e0:04:7c:20:14:54:07:5f:3c:e7: bd:24:a2:92:99:8f:9b:5f:ad:68:39:bb:bf:1f:53:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:1d:cd:af:62:43:c5:e6:36:26:5a:c6:08:2c:c4:61: eb:42:fa:ee:44:8e:68:f7:44:12:f1:b3:67:b9:70:a5: 90:07:ce:65:70:47:83:aa:ba:9c:68:cd:76:84:0d:47: 76:49:a1:4b:31:ae:e1:cb:01:fd:f5:40:b3:69:dd:cf: 67:40:44:55:ea:60:8e:17:30:da:0a:7a:73:7e:f6:cf: 5d:7c:b3:e5:cc:8d:eb:58:2e:4b:87:4b:e7:26:87:9c: ba:38:70:5a:fd:e5:ec:a1:ef:09:34:b8:3f:97:74:03: 74:95:eb:76:ca:f0:e6:77:ee:79:db:4f:bd:8a:52:1e: 9a:71:24:fb:0d:30:f4:a3:79:12:1b:9b:bb:68:f9:35: 2c:17:14:03:14:92:a3:3b:b2:75:4b:32:7c:68:f6:fd: 99:fb:2a:d1:f7:71:2d:bf:60:12:41:9f:d2:00:97:58: 1f:15:be:3e:e5:fa:41:f4:12:3a:b0:ad:1d:23:4f:ff: 08:80:5e:54:34:a6:e6:27:fe:a0:ae:cf:fa:d6:72:4f: 4b:5e:ca:4c:99:96:b1:a9:0d:de:d3:a4:67:9f:7d:f0: 20:3a:61:2c:fd:9c:74:2b:78:35:8f:57:e8:b3:f0:0b: b5:f8:e5:b0:b5:77:a9:0a:c9:d7:2d:09:93:dc:04:fd Fingerprint (SHA-256): 87:03:1E:64:B5:19:79:DA:E9:B0:97:0F:41:03:D4:06:92:1D:FA:3E:95:7F:54:85:49:76:7A:90:BD:E4:F6:D6 Fingerprint (SHA1): 30:74:DE:3B:0B:B1:5E:4A:D4:F7:C2:2B:FE:41:0D:86:4A:B3:6B:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201901 (0x1315e4ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:30 2023 Not After : Mon Mar 20 20:20:30 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:73:2f:76:1e:65:0b:d3:4f:46:d1:01:ad:22:dc:11: de:a8:90:f3:ed:bd:20:b8:87:78:c6:85:e7:49:dd:f9: 4b:1a:59:a1:7e:b3:12:18:39:68:94:4c:83:68:0e:51: b3:9b:32:f0:b2:1b:c0:4b:e6:d3:b6:2d:32:6f:12:88: 5a:ca:4d:85:4a:94:bd:da:75:73:13:e6:7b:08:e4:03: 5b:ef:b4:7e:33:f4:d4:c8:2b:0a:19:38:89:0d:7f:88: b6:17:7a:68:71:02:19:c2:a8:3c:f6:6a:1a:fb:87:4f: 77:46:fe:0c:5d:6c:c5:75:b6:20:cf:4f:3b:e6:41:6f: 6d:38:db:24:28:38:a4:2c:55:ac:af:4a:2e:63:82:f3: ac:94:ea:dd:02:b1:4a:04:84:b5:e6:b0:1c:45:3a:38: 5d:17:b4:98:9d:5f:2e:63:d2:61:7d:3a:12:56:b7:e7: 85:42:7e:63:df:67:59:4b:a1:9a:43:ba:82:e5:b7:a8: 1e:21:6f:32:81:a2:cc:bc:b2:b7:dc:d8:87:4a:28:78: 49:45:17:7e:32:3e:2b:80:11:b9:e3:ab:93:54:e9:29: de:74:be:54:ff:71:e7:9b:6f:e1:dc:7f:13:0a:14:e9: 43:7c:6b:43:91:ea:4a:a4:4d:04:e2:01:89:4e:25:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:12:bf:64:15:d5:da:e0:dc:3b:f9:da:7b:c7:4b:da: 93:c2:95:d3:1d:25:5b:ab:2b:c4:29:76:66:8f:d7:bf: 81:70:54:b7:9c:1e:cf:0e:52:88:74:7a:b1:48:0e:a4: 82:c5:64:66:4b:01:5b:7c:d6:2f:71:d3:bc:05:fe:ea: 8a:5d:1e:50:79:8b:32:a1:60:dd:17:57:0c:80:45:89: c0:d1:a1:88:6a:d1:87:72:01:1b:23:a2:02:10:20:ab: 2b:af:c0:de:10:8e:3e:f4:77:a8:f6:c4:f8:a4:d9:6e: 8c:48:9c:cc:64:7b:17:38:96:1a:02:7b:ed:40:35:99: 96:a5:91:97:8e:bc:f8:c8:43:13:3d:92:b0:21:4b:f2: ca:79:76:64:5f:79:5c:ac:6d:c7:46:65:03:56:e9:bd: 7e:1a:49:16:37:8a:af:5c:f5:fe:9e:2e:d6:06:89:3b: 9d:f4:5b:2a:cb:f8:6e:39:2e:70:f8:3b:be:aa:12:70: 69:fc:cd:77:ab:b0:7e:fc:f2:b0:ac:84:f6:e7:43:a9: b3:2d:ca:da:d7:8f:fa:f9:58:26:30:fc:89:00:89:e4: 16:80:30:44:9a:b2:df:c5:af:82:5a:f6:f5:7c:e5:78: b1:79:cb:32:62:22:f4:58:05:f5:fc:e1:42:6a:6d:3b Fingerprint (SHA-256): CB:2F:CC:CB:EA:24:91:FE:B3:E7:2A:7C:D7:CB:85:1A:90:C7:3C:67:32:0E:4F:4B:2A:2D:8C:87:07:DC:B2:C6 Fingerprint (SHA1): D1:E4:E9:28:22:2D:AF:CB:31:52:6F:5F:B5:D0:A3:C0:D1:48:3B:21 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201903 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201904 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201905 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320201906 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320201907 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201903 (0x1315e4af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:33 2023 Not After : Mon Mar 20 20:20:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:88:1c:fb:6d:9c:85:d6:3d:18:ca:ec:80:ba:8b:3b: dd:62:a6:c7:f7:a4:8b:4c:4e:75:13:75:b6:3c:23:25: 7e:60:b8:fa:0b:94:01:59:30:3f:2a:fe:f7:9c:73:7f: 1f:5d:70:fc:0a:43:9e:ea:a1:56:2c:0e:2e:da:f2:6e: f0:bc:76:5b:e5:0e:2b:e9:26:0b:a7:3a:04:c6:66:cf: 21:94:e1:2d:36:2c:a8:c7:08:f8:99:12:e3:e6:9a:94: ea:ba:93:94:b5:63:3f:fc:c9:04:00:10:70:f2:5e:bf: 4f:9c:98:ac:ea:a2:c2:bc:b1:e8:f5:a8:89:e3:3b:24: fd:04:22:a7:d1:a9:bb:a3:04:1b:23:50:72:aa:02:f2: cc:13:d5:8a:58:f9:b5:da:1c:00:c5:2d:be:66:39:49: 39:a0:26:1f:ce:e5:81:5a:d9:04:39:cc:34:47:1c:23: c0:45:86:d0:8f:51:78:09:33:bc:f9:84:bb:4f:5c:29: 2b:5f:d4:bb:54:15:2d:db:ad:5a:4e:a6:81:1a:db:90: da:62:f8:75:bc:32:3c:a2:db:9f:49:7b:d6:54:4b:1a: 73:30:d6:0e:a4:17:41:43:f4:04:d6:21:9c:4a:a1:eb: f6:b9:3f:f4:57:50:b9:5b:ed:50:65:7f:1c:06:95:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:2a:09:18:2a:58:d3:e9:5f:86:8f:2f:eb:56:0e:94: 12:33:31:b0:94:f9:67:d6:67:16:8b:ab:fb:c3:7c:46: 7e:8f:aa:d0:16:96:04:c7:0d:39:92:38:12:f6:d3:73: 42:80:64:b8:9f:9a:c9:3c:40:01:e0:48:2d:39:0a:e5: 66:e6:55:01:a6:08:56:1c:b3:08:86:35:43:0d:ad:3c: 89:34:38:fd:cb:c4:2a:66:63:b0:9c:07:2a:38:b8:21: 8d:b2:98:e7:fe:8f:8a:0b:ad:47:15:26:1c:c6:ee:f5: ae:f1:ea:fc:cc:7c:ba:d9:ed:64:6c:70:09:a0:80:b9: d9:66:eb:92:50:c7:18:cd:f6:8d:1c:ac:e5:37:76:59: 29:ce:df:b3:c8:1d:eb:b6:ff:6d:0b:88:1b:be:95:8f: 99:3b:de:c0:78:17:1b:62:ee:6c:c2:65:73:e6:97:44: cb:6f:a3:64:1b:cc:52:9e:c0:78:a6:f7:5d:1e:06:aa: 6c:11:af:ce:24:9f:17:ba:4f:ad:d4:26:c5:51:36:14: bc:d1:1c:5f:0e:0f:50:9e:ec:ba:63:cb:4f:1d:d4:bc: fe:d6:03:df:a4:36:dc:07:2c:dc:92:45:9c:01:90:50: d6:73:b3:7e:e0:59:25:16:d4:e4:c5:b6:58:ba:6d:f1 Fingerprint (SHA-256): EF:57:86:44:B2:0A:60:F4:22:AC:BE:58:00:8E:D3:E1:6A:46:62:45:32:16:62:DD:1C:66:62:65:43:94:5D:90 Fingerprint (SHA1): 26:5B:C8:FD:C3:F7:9C:1C:95:C3:70:9E:39:5C:36:5D:F6:A4:9E:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201904 (0x1315e4b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:ae:c1:e7:01:f3:3f:4d:9a:9a:0f:38:31:db:52:fc: b2:2b:50:7f:48:f0:98:70:97:5b:0f:f8:8c:72:d1:0b: dd:99:d5:0a:9f:3c:1b:bd:ac:9a:e1:49:49:79:3c:43: 8a:a6:35:8e:a2:a3:b6:dc:7a:ad:70:63:cf:7f:e4:99: 07:29:ab:b8:c9:2c:0b:3f:b1:3e:f6:bf:4c:55:59:95: fc:a3:7b:df:d1:44:97:a9:9b:74:bb:6b:7e:5f:b5:ea: 0f:d0:b2:26:0d:e6:2b:9f:2d:fc:8f:c7:1a:dc:ae:a6: 89:20:54:53:3b:d6:de:c1:59:10:76:ce:a0:e0:e3:a4: 42:d5:59:07:26:81:15:1a:6b:eb:b8:33:82:26:bb:9e: 53:67:0f:a8:43:89:59:4e:e6:d5:ea:4c:6a:71:7d:f2: 6d:7a:38:96:fd:35:36:e6:30:01:49:2b:db:37:5a:c7: 5d:ec:7a:a0:af:3f:6b:da:43:55:7b:2f:9e:e7:8f:ad: 48:0f:a9:cf:52:f1:65:60:6c:f5:7d:0f:e1:95:6f:2a: 23:c8:6c:3e:e7:8f:57:0c:94:c1:7a:85:04:33:4e:56: 0a:cc:55:a6:5f:82:c7:31:86:2f:41:71:cb:38:dc:2e: 6d:67:60:dd:69:2c:f2:ec:10:f2:c1:f6:27:61:53:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:b3:47:7f:da:6f:95:91:7a:c0:1e:98:1c:49:ec:7d: 7f:18:d5:89:2b:92:41:74:27:23:b1:08:02:4d:46:1c: 3c:4b:51:9d:56:a0:f2:e7:1c:0b:5d:a3:32:a4:fc:0e: a2:bb:c3:99:5d:31:5d:62:79:0f:cb:3c:eb:c1:84:b1: 45:1c:50:dd:eb:91:66:14:ce:de:d4:f3:c9:80:be:a4: 92:d6:56:9d:47:43:27:4b:31:ce:bc:4c:53:1b:a4:33: 72:86:cd:65:85:9b:88:65:9f:fc:e0:88:b6:9d:24:0a: 26:5f:e9:f1:b1:5f:aa:6a:3b:55:40:a7:ae:f2:e5:43: d6:f0:df:a2:d1:e9:6d:9c:ea:1b:e8:69:85:67:91:d3: 61:14:6d:04:07:6a:3d:de:4c:2e:85:84:49:f3:cd:61: d4:20:a4:bf:83:79:5a:45:5f:e5:76:69:0f:3c:8e:c8: 8f:8f:b5:98:16:a2:60:71:ae:b4:f4:ea:55:23:0b:aa: 7f:02:a9:ff:3e:7a:c8:87:53:c9:4a:3a:66:dc:f1:45: da:57:b7:64:38:54:7c:28:e2:12:d0:81:d3:54:33:db: 93:da:fd:e5:81:a9:9f:c8:ad:11:9b:e7:df:78:12:c5: 09:71:84:7d:e2:c0:34:44:ef:f7:85:18:4a:04:46:92 Fingerprint (SHA-256): CE:AF:76:5E:8B:A3:1A:90:A5:8F:66:CD:6F:01:5C:5C:D9:8A:15:B6:DD:21:EB:07:C4:63:C9:A8:2E:D3:AA:2A Fingerprint (SHA1): A2:D9:5B:BC:C6:F1:57:75:A8:35:46:75:D9:CE:46:4F:35:D3:F8:F0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201905 (0x1315e4b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:2f:ad:86:ff:92:6c:40:21:fc:13:3b:1b:99:14:d3: bc:a9:fb:1c:88:ea:86:08:73:96:d3:80:8c:e4:32:1f: 42:ce:ac:bd:69:46:72:54:b0:33:f7:7e:e7:88:c0:92: 32:34:92:9b:f0:14:6d:49:85:d4:6a:af:c0:32:f2:9b: e4:69:18:70:99:97:68:99:a5:24:47:8b:1a:61:99:fa: 68:a9:76:35:4b:d9:0e:a6:cd:58:b4:7f:f1:f5:0c:c0: 2b:fe:a9:7e:78:5a:bd:4c:18:32:16:65:2b:87:c3:37: d3:40:e4:15:de:88:12:a7:3d:80:55:35:df:f1:7f:45: e8:f9:85:b0:c1:f2:50:a9:b1:68:eb:73:ba:fe:c9:b8: 82:fa:f3:bc:a0:66:ad:34:5d:9e:e3:f9:06:74:0b:77: 3f:1a:ab:62:07:db:11:6e:d9:95:c6:54:bf:a1:15:e2: 0d:d5:2e:37:79:a1:5c:3b:10:9b:77:62:72:01:66:7b: ca:58:2b:32:7f:ac:4e:67:97:85:95:91:04:3a:fc:00: a6:34:02:71:26:00:91:9f:cb:e9:27:cf:a5:2b:08:b3: f5:c8:01:50:c1:1d:76:9f:2d:75:8e:f2:e1:83:a1:b2: 95:60:2d:5a:61:56:9a:c3:d4:40:cf:5d:19:20:91:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:1e:9d:43:4f:18:a9:17:b0:d1:25:3c:16:0a:b0:26: 38:c9:30:c7:e8:58:b5:8d:f5:e7:ff:9d:89:5e:e8:87: 51:a7:2a:53:c9:76:11:d1:2a:ae:07:d1:04:ca:3a:42: d9:ba:3c:71:4c:80:31:6f:b2:25:47:c4:a8:02:7e:da: 80:6d:d3:32:79:87:f9:9f:06:22:69:1d:c3:bf:3e:4e: 11:9a:0c:54:fd:94:c1:0d:24:0b:26:62:b1:11:99:82: 53:12:95:d4:22:b7:c5:02:df:84:38:59:b4:7e:84:3f: d0:4d:13:63:d0:4a:24:29:54:c3:e7:ae:8e:c2:a7:55: 6b:7d:db:0c:8c:a0:cb:a9:ee:5d:55:ad:b0:7e:65:55: f0:d7:70:3c:50:29:fa:ac:67:46:29:a6:6a:88:40:12: 8c:c0:14:1b:a6:aa:e6:39:72:21:58:40:d4:fb:c0:79: f4:a7:46:44:9a:57:54:f7:6f:3c:21:4d:7e:ea:83:e7: c0:7a:dc:53:a6:75:3d:31:0c:a6:40:54:a9:21:bf:f1: e4:ff:2d:96:5b:18:99:a6:0d:32:2e:b9:96:10:a6:f0: 43:09:de:31:1b:35:9e:bd:70:4c:d7:84:cf:3e:07:df: 69:dd:b4:c7:0c:45:7a:31:72:d0:d6:40:b9:e7:57:07 Fingerprint (SHA-256): FA:81:9F:E7:E4:43:E3:08:BB:71:CB:A2:DC:BA:73:DA:85:A9:36:AD:A7:96:F5:E4:54:44:22:5C:D6:F2:ED:B0 Fingerprint (SHA1): 78:7C:96:94:8C:9C:16:98:97:01:14:E8:DC:AF:06:BB:6D:B6:E4:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201903 (0x1315e4af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:33 2023 Not After : Mon Mar 20 20:20:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:88:1c:fb:6d:9c:85:d6:3d:18:ca:ec:80:ba:8b:3b: dd:62:a6:c7:f7:a4:8b:4c:4e:75:13:75:b6:3c:23:25: 7e:60:b8:fa:0b:94:01:59:30:3f:2a:fe:f7:9c:73:7f: 1f:5d:70:fc:0a:43:9e:ea:a1:56:2c:0e:2e:da:f2:6e: f0:bc:76:5b:e5:0e:2b:e9:26:0b:a7:3a:04:c6:66:cf: 21:94:e1:2d:36:2c:a8:c7:08:f8:99:12:e3:e6:9a:94: ea:ba:93:94:b5:63:3f:fc:c9:04:00:10:70:f2:5e:bf: 4f:9c:98:ac:ea:a2:c2:bc:b1:e8:f5:a8:89:e3:3b:24: fd:04:22:a7:d1:a9:bb:a3:04:1b:23:50:72:aa:02:f2: cc:13:d5:8a:58:f9:b5:da:1c:00:c5:2d:be:66:39:49: 39:a0:26:1f:ce:e5:81:5a:d9:04:39:cc:34:47:1c:23: c0:45:86:d0:8f:51:78:09:33:bc:f9:84:bb:4f:5c:29: 2b:5f:d4:bb:54:15:2d:db:ad:5a:4e:a6:81:1a:db:90: da:62:f8:75:bc:32:3c:a2:db:9f:49:7b:d6:54:4b:1a: 73:30:d6:0e:a4:17:41:43:f4:04:d6:21:9c:4a:a1:eb: f6:b9:3f:f4:57:50:b9:5b:ed:50:65:7f:1c:06:95:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:2a:09:18:2a:58:d3:e9:5f:86:8f:2f:eb:56:0e:94: 12:33:31:b0:94:f9:67:d6:67:16:8b:ab:fb:c3:7c:46: 7e:8f:aa:d0:16:96:04:c7:0d:39:92:38:12:f6:d3:73: 42:80:64:b8:9f:9a:c9:3c:40:01:e0:48:2d:39:0a:e5: 66:e6:55:01:a6:08:56:1c:b3:08:86:35:43:0d:ad:3c: 89:34:38:fd:cb:c4:2a:66:63:b0:9c:07:2a:38:b8:21: 8d:b2:98:e7:fe:8f:8a:0b:ad:47:15:26:1c:c6:ee:f5: ae:f1:ea:fc:cc:7c:ba:d9:ed:64:6c:70:09:a0:80:b9: d9:66:eb:92:50:c7:18:cd:f6:8d:1c:ac:e5:37:76:59: 29:ce:df:b3:c8:1d:eb:b6:ff:6d:0b:88:1b:be:95:8f: 99:3b:de:c0:78:17:1b:62:ee:6c:c2:65:73:e6:97:44: cb:6f:a3:64:1b:cc:52:9e:c0:78:a6:f7:5d:1e:06:aa: 6c:11:af:ce:24:9f:17:ba:4f:ad:d4:26:c5:51:36:14: bc:d1:1c:5f:0e:0f:50:9e:ec:ba:63:cb:4f:1d:d4:bc: fe:d6:03:df:a4:36:dc:07:2c:dc:92:45:9c:01:90:50: d6:73:b3:7e:e0:59:25:16:d4:e4:c5:b6:58:ba:6d:f1 Fingerprint (SHA-256): EF:57:86:44:B2:0A:60:F4:22:AC:BE:58:00:8E:D3:E1:6A:46:62:45:32:16:62:DD:1C:66:62:65:43:94:5D:90 Fingerprint (SHA1): 26:5B:C8:FD:C3:F7:9C:1C:95:C3:70:9E:39:5C:36:5D:F6:A4:9E:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201904 (0x1315e4b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:ae:c1:e7:01:f3:3f:4d:9a:9a:0f:38:31:db:52:fc: b2:2b:50:7f:48:f0:98:70:97:5b:0f:f8:8c:72:d1:0b: dd:99:d5:0a:9f:3c:1b:bd:ac:9a:e1:49:49:79:3c:43: 8a:a6:35:8e:a2:a3:b6:dc:7a:ad:70:63:cf:7f:e4:99: 07:29:ab:b8:c9:2c:0b:3f:b1:3e:f6:bf:4c:55:59:95: fc:a3:7b:df:d1:44:97:a9:9b:74:bb:6b:7e:5f:b5:ea: 0f:d0:b2:26:0d:e6:2b:9f:2d:fc:8f:c7:1a:dc:ae:a6: 89:20:54:53:3b:d6:de:c1:59:10:76:ce:a0:e0:e3:a4: 42:d5:59:07:26:81:15:1a:6b:eb:b8:33:82:26:bb:9e: 53:67:0f:a8:43:89:59:4e:e6:d5:ea:4c:6a:71:7d:f2: 6d:7a:38:96:fd:35:36:e6:30:01:49:2b:db:37:5a:c7: 5d:ec:7a:a0:af:3f:6b:da:43:55:7b:2f:9e:e7:8f:ad: 48:0f:a9:cf:52:f1:65:60:6c:f5:7d:0f:e1:95:6f:2a: 23:c8:6c:3e:e7:8f:57:0c:94:c1:7a:85:04:33:4e:56: 0a:cc:55:a6:5f:82:c7:31:86:2f:41:71:cb:38:dc:2e: 6d:67:60:dd:69:2c:f2:ec:10:f2:c1:f6:27:61:53:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:b3:47:7f:da:6f:95:91:7a:c0:1e:98:1c:49:ec:7d: 7f:18:d5:89:2b:92:41:74:27:23:b1:08:02:4d:46:1c: 3c:4b:51:9d:56:a0:f2:e7:1c:0b:5d:a3:32:a4:fc:0e: a2:bb:c3:99:5d:31:5d:62:79:0f:cb:3c:eb:c1:84:b1: 45:1c:50:dd:eb:91:66:14:ce:de:d4:f3:c9:80:be:a4: 92:d6:56:9d:47:43:27:4b:31:ce:bc:4c:53:1b:a4:33: 72:86:cd:65:85:9b:88:65:9f:fc:e0:88:b6:9d:24:0a: 26:5f:e9:f1:b1:5f:aa:6a:3b:55:40:a7:ae:f2:e5:43: d6:f0:df:a2:d1:e9:6d:9c:ea:1b:e8:69:85:67:91:d3: 61:14:6d:04:07:6a:3d:de:4c:2e:85:84:49:f3:cd:61: d4:20:a4:bf:83:79:5a:45:5f:e5:76:69:0f:3c:8e:c8: 8f:8f:b5:98:16:a2:60:71:ae:b4:f4:ea:55:23:0b:aa: 7f:02:a9:ff:3e:7a:c8:87:53:c9:4a:3a:66:dc:f1:45: da:57:b7:64:38:54:7c:28:e2:12:d0:81:d3:54:33:db: 93:da:fd:e5:81:a9:9f:c8:ad:11:9b:e7:df:78:12:c5: 09:71:84:7d:e2:c0:34:44:ef:f7:85:18:4a:04:46:92 Fingerprint (SHA-256): CE:AF:76:5E:8B:A3:1A:90:A5:8F:66:CD:6F:01:5C:5C:D9:8A:15:B6:DD:21:EB:07:C4:63:C9:A8:2E:D3:AA:2A Fingerprint (SHA1): A2:D9:5B:BC:C6:F1:57:75:A8:35:46:75:D9:CE:46:4F:35:D3:F8:F0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201905 (0x1315e4b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:2f:ad:86:ff:92:6c:40:21:fc:13:3b:1b:99:14:d3: bc:a9:fb:1c:88:ea:86:08:73:96:d3:80:8c:e4:32:1f: 42:ce:ac:bd:69:46:72:54:b0:33:f7:7e:e7:88:c0:92: 32:34:92:9b:f0:14:6d:49:85:d4:6a:af:c0:32:f2:9b: e4:69:18:70:99:97:68:99:a5:24:47:8b:1a:61:99:fa: 68:a9:76:35:4b:d9:0e:a6:cd:58:b4:7f:f1:f5:0c:c0: 2b:fe:a9:7e:78:5a:bd:4c:18:32:16:65:2b:87:c3:37: d3:40:e4:15:de:88:12:a7:3d:80:55:35:df:f1:7f:45: e8:f9:85:b0:c1:f2:50:a9:b1:68:eb:73:ba:fe:c9:b8: 82:fa:f3:bc:a0:66:ad:34:5d:9e:e3:f9:06:74:0b:77: 3f:1a:ab:62:07:db:11:6e:d9:95:c6:54:bf:a1:15:e2: 0d:d5:2e:37:79:a1:5c:3b:10:9b:77:62:72:01:66:7b: ca:58:2b:32:7f:ac:4e:67:97:85:95:91:04:3a:fc:00: a6:34:02:71:26:00:91:9f:cb:e9:27:cf:a5:2b:08:b3: f5:c8:01:50:c1:1d:76:9f:2d:75:8e:f2:e1:83:a1:b2: 95:60:2d:5a:61:56:9a:c3:d4:40:cf:5d:19:20:91:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:1e:9d:43:4f:18:a9:17:b0:d1:25:3c:16:0a:b0:26: 38:c9:30:c7:e8:58:b5:8d:f5:e7:ff:9d:89:5e:e8:87: 51:a7:2a:53:c9:76:11:d1:2a:ae:07:d1:04:ca:3a:42: d9:ba:3c:71:4c:80:31:6f:b2:25:47:c4:a8:02:7e:da: 80:6d:d3:32:79:87:f9:9f:06:22:69:1d:c3:bf:3e:4e: 11:9a:0c:54:fd:94:c1:0d:24:0b:26:62:b1:11:99:82: 53:12:95:d4:22:b7:c5:02:df:84:38:59:b4:7e:84:3f: d0:4d:13:63:d0:4a:24:29:54:c3:e7:ae:8e:c2:a7:55: 6b:7d:db:0c:8c:a0:cb:a9:ee:5d:55:ad:b0:7e:65:55: f0:d7:70:3c:50:29:fa:ac:67:46:29:a6:6a:88:40:12: 8c:c0:14:1b:a6:aa:e6:39:72:21:58:40:d4:fb:c0:79: f4:a7:46:44:9a:57:54:f7:6f:3c:21:4d:7e:ea:83:e7: c0:7a:dc:53:a6:75:3d:31:0c:a6:40:54:a9:21:bf:f1: e4:ff:2d:96:5b:18:99:a6:0d:32:2e:b9:96:10:a6:f0: 43:09:de:31:1b:35:9e:bd:70:4c:d7:84:cf:3e:07:df: 69:dd:b4:c7:0c:45:7a:31:72:d0:d6:40:b9:e7:57:07 Fingerprint (SHA-256): FA:81:9F:E7:E4:43:E3:08:BB:71:CB:A2:DC:BA:73:DA:85:A9:36:AD:A7:96:F5:E4:54:44:22:5C:D6:F2:ED:B0 Fingerprint (SHA1): 78:7C:96:94:8C:9C:16:98:97:01:14:E8:DC:AF:06:BB:6D:B6:E4:4C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201903 (0x1315e4af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:33 2023 Not After : Mon Mar 20 20:20:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:88:1c:fb:6d:9c:85:d6:3d:18:ca:ec:80:ba:8b:3b: dd:62:a6:c7:f7:a4:8b:4c:4e:75:13:75:b6:3c:23:25: 7e:60:b8:fa:0b:94:01:59:30:3f:2a:fe:f7:9c:73:7f: 1f:5d:70:fc:0a:43:9e:ea:a1:56:2c:0e:2e:da:f2:6e: f0:bc:76:5b:e5:0e:2b:e9:26:0b:a7:3a:04:c6:66:cf: 21:94:e1:2d:36:2c:a8:c7:08:f8:99:12:e3:e6:9a:94: ea:ba:93:94:b5:63:3f:fc:c9:04:00:10:70:f2:5e:bf: 4f:9c:98:ac:ea:a2:c2:bc:b1:e8:f5:a8:89:e3:3b:24: fd:04:22:a7:d1:a9:bb:a3:04:1b:23:50:72:aa:02:f2: cc:13:d5:8a:58:f9:b5:da:1c:00:c5:2d:be:66:39:49: 39:a0:26:1f:ce:e5:81:5a:d9:04:39:cc:34:47:1c:23: c0:45:86:d0:8f:51:78:09:33:bc:f9:84:bb:4f:5c:29: 2b:5f:d4:bb:54:15:2d:db:ad:5a:4e:a6:81:1a:db:90: da:62:f8:75:bc:32:3c:a2:db:9f:49:7b:d6:54:4b:1a: 73:30:d6:0e:a4:17:41:43:f4:04:d6:21:9c:4a:a1:eb: f6:b9:3f:f4:57:50:b9:5b:ed:50:65:7f:1c:06:95:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:2a:09:18:2a:58:d3:e9:5f:86:8f:2f:eb:56:0e:94: 12:33:31:b0:94:f9:67:d6:67:16:8b:ab:fb:c3:7c:46: 7e:8f:aa:d0:16:96:04:c7:0d:39:92:38:12:f6:d3:73: 42:80:64:b8:9f:9a:c9:3c:40:01:e0:48:2d:39:0a:e5: 66:e6:55:01:a6:08:56:1c:b3:08:86:35:43:0d:ad:3c: 89:34:38:fd:cb:c4:2a:66:63:b0:9c:07:2a:38:b8:21: 8d:b2:98:e7:fe:8f:8a:0b:ad:47:15:26:1c:c6:ee:f5: ae:f1:ea:fc:cc:7c:ba:d9:ed:64:6c:70:09:a0:80:b9: d9:66:eb:92:50:c7:18:cd:f6:8d:1c:ac:e5:37:76:59: 29:ce:df:b3:c8:1d:eb:b6:ff:6d:0b:88:1b:be:95:8f: 99:3b:de:c0:78:17:1b:62:ee:6c:c2:65:73:e6:97:44: cb:6f:a3:64:1b:cc:52:9e:c0:78:a6:f7:5d:1e:06:aa: 6c:11:af:ce:24:9f:17:ba:4f:ad:d4:26:c5:51:36:14: bc:d1:1c:5f:0e:0f:50:9e:ec:ba:63:cb:4f:1d:d4:bc: fe:d6:03:df:a4:36:dc:07:2c:dc:92:45:9c:01:90:50: d6:73:b3:7e:e0:59:25:16:d4:e4:c5:b6:58:ba:6d:f1 Fingerprint (SHA-256): EF:57:86:44:B2:0A:60:F4:22:AC:BE:58:00:8E:D3:E1:6A:46:62:45:32:16:62:DD:1C:66:62:65:43:94:5D:90 Fingerprint (SHA1): 26:5B:C8:FD:C3:F7:9C:1C:95:C3:70:9E:39:5C:36:5D:F6:A4:9E:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201903 (0x1315e4af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:33 2023 Not After : Mon Mar 20 20:20:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:88:1c:fb:6d:9c:85:d6:3d:18:ca:ec:80:ba:8b:3b: dd:62:a6:c7:f7:a4:8b:4c:4e:75:13:75:b6:3c:23:25: 7e:60:b8:fa:0b:94:01:59:30:3f:2a:fe:f7:9c:73:7f: 1f:5d:70:fc:0a:43:9e:ea:a1:56:2c:0e:2e:da:f2:6e: f0:bc:76:5b:e5:0e:2b:e9:26:0b:a7:3a:04:c6:66:cf: 21:94:e1:2d:36:2c:a8:c7:08:f8:99:12:e3:e6:9a:94: ea:ba:93:94:b5:63:3f:fc:c9:04:00:10:70:f2:5e:bf: 4f:9c:98:ac:ea:a2:c2:bc:b1:e8:f5:a8:89:e3:3b:24: fd:04:22:a7:d1:a9:bb:a3:04:1b:23:50:72:aa:02:f2: cc:13:d5:8a:58:f9:b5:da:1c:00:c5:2d:be:66:39:49: 39:a0:26:1f:ce:e5:81:5a:d9:04:39:cc:34:47:1c:23: c0:45:86:d0:8f:51:78:09:33:bc:f9:84:bb:4f:5c:29: 2b:5f:d4:bb:54:15:2d:db:ad:5a:4e:a6:81:1a:db:90: da:62:f8:75:bc:32:3c:a2:db:9f:49:7b:d6:54:4b:1a: 73:30:d6:0e:a4:17:41:43:f4:04:d6:21:9c:4a:a1:eb: f6:b9:3f:f4:57:50:b9:5b:ed:50:65:7f:1c:06:95:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:2a:09:18:2a:58:d3:e9:5f:86:8f:2f:eb:56:0e:94: 12:33:31:b0:94:f9:67:d6:67:16:8b:ab:fb:c3:7c:46: 7e:8f:aa:d0:16:96:04:c7:0d:39:92:38:12:f6:d3:73: 42:80:64:b8:9f:9a:c9:3c:40:01:e0:48:2d:39:0a:e5: 66:e6:55:01:a6:08:56:1c:b3:08:86:35:43:0d:ad:3c: 89:34:38:fd:cb:c4:2a:66:63:b0:9c:07:2a:38:b8:21: 8d:b2:98:e7:fe:8f:8a:0b:ad:47:15:26:1c:c6:ee:f5: ae:f1:ea:fc:cc:7c:ba:d9:ed:64:6c:70:09:a0:80:b9: d9:66:eb:92:50:c7:18:cd:f6:8d:1c:ac:e5:37:76:59: 29:ce:df:b3:c8:1d:eb:b6:ff:6d:0b:88:1b:be:95:8f: 99:3b:de:c0:78:17:1b:62:ee:6c:c2:65:73:e6:97:44: cb:6f:a3:64:1b:cc:52:9e:c0:78:a6:f7:5d:1e:06:aa: 6c:11:af:ce:24:9f:17:ba:4f:ad:d4:26:c5:51:36:14: bc:d1:1c:5f:0e:0f:50:9e:ec:ba:63:cb:4f:1d:d4:bc: fe:d6:03:df:a4:36:dc:07:2c:dc:92:45:9c:01:90:50: d6:73:b3:7e:e0:59:25:16:d4:e4:c5:b6:58:ba:6d:f1 Fingerprint (SHA-256): EF:57:86:44:B2:0A:60:F4:22:AC:BE:58:00:8E:D3:E1:6A:46:62:45:32:16:62:DD:1C:66:62:65:43:94:5D:90 Fingerprint (SHA1): 26:5B:C8:FD:C3:F7:9C:1C:95:C3:70:9E:39:5C:36:5D:F6:A4:9E:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201904 (0x1315e4b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:ae:c1:e7:01:f3:3f:4d:9a:9a:0f:38:31:db:52:fc: b2:2b:50:7f:48:f0:98:70:97:5b:0f:f8:8c:72:d1:0b: dd:99:d5:0a:9f:3c:1b:bd:ac:9a:e1:49:49:79:3c:43: 8a:a6:35:8e:a2:a3:b6:dc:7a:ad:70:63:cf:7f:e4:99: 07:29:ab:b8:c9:2c:0b:3f:b1:3e:f6:bf:4c:55:59:95: fc:a3:7b:df:d1:44:97:a9:9b:74:bb:6b:7e:5f:b5:ea: 0f:d0:b2:26:0d:e6:2b:9f:2d:fc:8f:c7:1a:dc:ae:a6: 89:20:54:53:3b:d6:de:c1:59:10:76:ce:a0:e0:e3:a4: 42:d5:59:07:26:81:15:1a:6b:eb:b8:33:82:26:bb:9e: 53:67:0f:a8:43:89:59:4e:e6:d5:ea:4c:6a:71:7d:f2: 6d:7a:38:96:fd:35:36:e6:30:01:49:2b:db:37:5a:c7: 5d:ec:7a:a0:af:3f:6b:da:43:55:7b:2f:9e:e7:8f:ad: 48:0f:a9:cf:52:f1:65:60:6c:f5:7d:0f:e1:95:6f:2a: 23:c8:6c:3e:e7:8f:57:0c:94:c1:7a:85:04:33:4e:56: 0a:cc:55:a6:5f:82:c7:31:86:2f:41:71:cb:38:dc:2e: 6d:67:60:dd:69:2c:f2:ec:10:f2:c1:f6:27:61:53:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:b3:47:7f:da:6f:95:91:7a:c0:1e:98:1c:49:ec:7d: 7f:18:d5:89:2b:92:41:74:27:23:b1:08:02:4d:46:1c: 3c:4b:51:9d:56:a0:f2:e7:1c:0b:5d:a3:32:a4:fc:0e: a2:bb:c3:99:5d:31:5d:62:79:0f:cb:3c:eb:c1:84:b1: 45:1c:50:dd:eb:91:66:14:ce:de:d4:f3:c9:80:be:a4: 92:d6:56:9d:47:43:27:4b:31:ce:bc:4c:53:1b:a4:33: 72:86:cd:65:85:9b:88:65:9f:fc:e0:88:b6:9d:24:0a: 26:5f:e9:f1:b1:5f:aa:6a:3b:55:40:a7:ae:f2:e5:43: d6:f0:df:a2:d1:e9:6d:9c:ea:1b:e8:69:85:67:91:d3: 61:14:6d:04:07:6a:3d:de:4c:2e:85:84:49:f3:cd:61: d4:20:a4:bf:83:79:5a:45:5f:e5:76:69:0f:3c:8e:c8: 8f:8f:b5:98:16:a2:60:71:ae:b4:f4:ea:55:23:0b:aa: 7f:02:a9:ff:3e:7a:c8:87:53:c9:4a:3a:66:dc:f1:45: da:57:b7:64:38:54:7c:28:e2:12:d0:81:d3:54:33:db: 93:da:fd:e5:81:a9:9f:c8:ad:11:9b:e7:df:78:12:c5: 09:71:84:7d:e2:c0:34:44:ef:f7:85:18:4a:04:46:92 Fingerprint (SHA-256): CE:AF:76:5E:8B:A3:1A:90:A5:8F:66:CD:6F:01:5C:5C:D9:8A:15:B6:DD:21:EB:07:C4:63:C9:A8:2E:D3:AA:2A Fingerprint (SHA1): A2:D9:5B:BC:C6:F1:57:75:A8:35:46:75:D9:CE:46:4F:35:D3:F8:F0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201904 (0x1315e4b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:ae:c1:e7:01:f3:3f:4d:9a:9a:0f:38:31:db:52:fc: b2:2b:50:7f:48:f0:98:70:97:5b:0f:f8:8c:72:d1:0b: dd:99:d5:0a:9f:3c:1b:bd:ac:9a:e1:49:49:79:3c:43: 8a:a6:35:8e:a2:a3:b6:dc:7a:ad:70:63:cf:7f:e4:99: 07:29:ab:b8:c9:2c:0b:3f:b1:3e:f6:bf:4c:55:59:95: fc:a3:7b:df:d1:44:97:a9:9b:74:bb:6b:7e:5f:b5:ea: 0f:d0:b2:26:0d:e6:2b:9f:2d:fc:8f:c7:1a:dc:ae:a6: 89:20:54:53:3b:d6:de:c1:59:10:76:ce:a0:e0:e3:a4: 42:d5:59:07:26:81:15:1a:6b:eb:b8:33:82:26:bb:9e: 53:67:0f:a8:43:89:59:4e:e6:d5:ea:4c:6a:71:7d:f2: 6d:7a:38:96:fd:35:36:e6:30:01:49:2b:db:37:5a:c7: 5d:ec:7a:a0:af:3f:6b:da:43:55:7b:2f:9e:e7:8f:ad: 48:0f:a9:cf:52:f1:65:60:6c:f5:7d:0f:e1:95:6f:2a: 23:c8:6c:3e:e7:8f:57:0c:94:c1:7a:85:04:33:4e:56: 0a:cc:55:a6:5f:82:c7:31:86:2f:41:71:cb:38:dc:2e: 6d:67:60:dd:69:2c:f2:ec:10:f2:c1:f6:27:61:53:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:b3:47:7f:da:6f:95:91:7a:c0:1e:98:1c:49:ec:7d: 7f:18:d5:89:2b:92:41:74:27:23:b1:08:02:4d:46:1c: 3c:4b:51:9d:56:a0:f2:e7:1c:0b:5d:a3:32:a4:fc:0e: a2:bb:c3:99:5d:31:5d:62:79:0f:cb:3c:eb:c1:84:b1: 45:1c:50:dd:eb:91:66:14:ce:de:d4:f3:c9:80:be:a4: 92:d6:56:9d:47:43:27:4b:31:ce:bc:4c:53:1b:a4:33: 72:86:cd:65:85:9b:88:65:9f:fc:e0:88:b6:9d:24:0a: 26:5f:e9:f1:b1:5f:aa:6a:3b:55:40:a7:ae:f2:e5:43: d6:f0:df:a2:d1:e9:6d:9c:ea:1b:e8:69:85:67:91:d3: 61:14:6d:04:07:6a:3d:de:4c:2e:85:84:49:f3:cd:61: d4:20:a4:bf:83:79:5a:45:5f:e5:76:69:0f:3c:8e:c8: 8f:8f:b5:98:16:a2:60:71:ae:b4:f4:ea:55:23:0b:aa: 7f:02:a9:ff:3e:7a:c8:87:53:c9:4a:3a:66:dc:f1:45: da:57:b7:64:38:54:7c:28:e2:12:d0:81:d3:54:33:db: 93:da:fd:e5:81:a9:9f:c8:ad:11:9b:e7:df:78:12:c5: 09:71:84:7d:e2:c0:34:44:ef:f7:85:18:4a:04:46:92 Fingerprint (SHA-256): CE:AF:76:5E:8B:A3:1A:90:A5:8F:66:CD:6F:01:5C:5C:D9:8A:15:B6:DD:21:EB:07:C4:63:C9:A8:2E:D3:AA:2A Fingerprint (SHA1): A2:D9:5B:BC:C6:F1:57:75:A8:35:46:75:D9:CE:46:4F:35:D3:F8:F0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201905 (0x1315e4b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:2f:ad:86:ff:92:6c:40:21:fc:13:3b:1b:99:14:d3: bc:a9:fb:1c:88:ea:86:08:73:96:d3:80:8c:e4:32:1f: 42:ce:ac:bd:69:46:72:54:b0:33:f7:7e:e7:88:c0:92: 32:34:92:9b:f0:14:6d:49:85:d4:6a:af:c0:32:f2:9b: e4:69:18:70:99:97:68:99:a5:24:47:8b:1a:61:99:fa: 68:a9:76:35:4b:d9:0e:a6:cd:58:b4:7f:f1:f5:0c:c0: 2b:fe:a9:7e:78:5a:bd:4c:18:32:16:65:2b:87:c3:37: d3:40:e4:15:de:88:12:a7:3d:80:55:35:df:f1:7f:45: e8:f9:85:b0:c1:f2:50:a9:b1:68:eb:73:ba:fe:c9:b8: 82:fa:f3:bc:a0:66:ad:34:5d:9e:e3:f9:06:74:0b:77: 3f:1a:ab:62:07:db:11:6e:d9:95:c6:54:bf:a1:15:e2: 0d:d5:2e:37:79:a1:5c:3b:10:9b:77:62:72:01:66:7b: ca:58:2b:32:7f:ac:4e:67:97:85:95:91:04:3a:fc:00: a6:34:02:71:26:00:91:9f:cb:e9:27:cf:a5:2b:08:b3: f5:c8:01:50:c1:1d:76:9f:2d:75:8e:f2:e1:83:a1:b2: 95:60:2d:5a:61:56:9a:c3:d4:40:cf:5d:19:20:91:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:1e:9d:43:4f:18:a9:17:b0:d1:25:3c:16:0a:b0:26: 38:c9:30:c7:e8:58:b5:8d:f5:e7:ff:9d:89:5e:e8:87: 51:a7:2a:53:c9:76:11:d1:2a:ae:07:d1:04:ca:3a:42: d9:ba:3c:71:4c:80:31:6f:b2:25:47:c4:a8:02:7e:da: 80:6d:d3:32:79:87:f9:9f:06:22:69:1d:c3:bf:3e:4e: 11:9a:0c:54:fd:94:c1:0d:24:0b:26:62:b1:11:99:82: 53:12:95:d4:22:b7:c5:02:df:84:38:59:b4:7e:84:3f: d0:4d:13:63:d0:4a:24:29:54:c3:e7:ae:8e:c2:a7:55: 6b:7d:db:0c:8c:a0:cb:a9:ee:5d:55:ad:b0:7e:65:55: f0:d7:70:3c:50:29:fa:ac:67:46:29:a6:6a:88:40:12: 8c:c0:14:1b:a6:aa:e6:39:72:21:58:40:d4:fb:c0:79: f4:a7:46:44:9a:57:54:f7:6f:3c:21:4d:7e:ea:83:e7: c0:7a:dc:53:a6:75:3d:31:0c:a6:40:54:a9:21:bf:f1: e4:ff:2d:96:5b:18:99:a6:0d:32:2e:b9:96:10:a6:f0: 43:09:de:31:1b:35:9e:bd:70:4c:d7:84:cf:3e:07:df: 69:dd:b4:c7:0c:45:7a:31:72:d0:d6:40:b9:e7:57:07 Fingerprint (SHA-256): FA:81:9F:E7:E4:43:E3:08:BB:71:CB:A2:DC:BA:73:DA:85:A9:36:AD:A7:96:F5:E4:54:44:22:5C:D6:F2:ED:B0 Fingerprint (SHA1): 78:7C:96:94:8C:9C:16:98:97:01:14:E8:DC:AF:06:BB:6D:B6:E4:4C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201905 (0x1315e4b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:20:35 2023 Not After : Mon Mar 20 20:20:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:2f:ad:86:ff:92:6c:40:21:fc:13:3b:1b:99:14:d3: bc:a9:fb:1c:88:ea:86:08:73:96:d3:80:8c:e4:32:1f: 42:ce:ac:bd:69:46:72:54:b0:33:f7:7e:e7:88:c0:92: 32:34:92:9b:f0:14:6d:49:85:d4:6a:af:c0:32:f2:9b: e4:69:18:70:99:97:68:99:a5:24:47:8b:1a:61:99:fa: 68:a9:76:35:4b:d9:0e:a6:cd:58:b4:7f:f1:f5:0c:c0: 2b:fe:a9:7e:78:5a:bd:4c:18:32:16:65:2b:87:c3:37: d3:40:e4:15:de:88:12:a7:3d:80:55:35:df:f1:7f:45: e8:f9:85:b0:c1:f2:50:a9:b1:68:eb:73:ba:fe:c9:b8: 82:fa:f3:bc:a0:66:ad:34:5d:9e:e3:f9:06:74:0b:77: 3f:1a:ab:62:07:db:11:6e:d9:95:c6:54:bf:a1:15:e2: 0d:d5:2e:37:79:a1:5c:3b:10:9b:77:62:72:01:66:7b: ca:58:2b:32:7f:ac:4e:67:97:85:95:91:04:3a:fc:00: a6:34:02:71:26:00:91:9f:cb:e9:27:cf:a5:2b:08:b3: f5:c8:01:50:c1:1d:76:9f:2d:75:8e:f2:e1:83:a1:b2: 95:60:2d:5a:61:56:9a:c3:d4:40:cf:5d:19:20:91:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:1e:9d:43:4f:18:a9:17:b0:d1:25:3c:16:0a:b0:26: 38:c9:30:c7:e8:58:b5:8d:f5:e7:ff:9d:89:5e:e8:87: 51:a7:2a:53:c9:76:11:d1:2a:ae:07:d1:04:ca:3a:42: d9:ba:3c:71:4c:80:31:6f:b2:25:47:c4:a8:02:7e:da: 80:6d:d3:32:79:87:f9:9f:06:22:69:1d:c3:bf:3e:4e: 11:9a:0c:54:fd:94:c1:0d:24:0b:26:62:b1:11:99:82: 53:12:95:d4:22:b7:c5:02:df:84:38:59:b4:7e:84:3f: d0:4d:13:63:d0:4a:24:29:54:c3:e7:ae:8e:c2:a7:55: 6b:7d:db:0c:8c:a0:cb:a9:ee:5d:55:ad:b0:7e:65:55: f0:d7:70:3c:50:29:fa:ac:67:46:29:a6:6a:88:40:12: 8c:c0:14:1b:a6:aa:e6:39:72:21:58:40:d4:fb:c0:79: f4:a7:46:44:9a:57:54:f7:6f:3c:21:4d:7e:ea:83:e7: c0:7a:dc:53:a6:75:3d:31:0c:a6:40:54:a9:21:bf:f1: e4:ff:2d:96:5b:18:99:a6:0d:32:2e:b9:96:10:a6:f0: 43:09:de:31:1b:35:9e:bd:70:4c:d7:84:cf:3e:07:df: 69:dd:b4:c7:0c:45:7a:31:72:d0:d6:40:b9:e7:57:07 Fingerprint (SHA-256): FA:81:9F:E7:E4:43:E3:08:BB:71:CB:A2:DC:BA:73:DA:85:A9:36:AD:A7:96:F5:E4:54:44:22:5C:D6:F2:ED:B0 Fingerprint (SHA1): 78:7C:96:94:8C:9C:16:98:97:01:14:E8:DC:AF:06:BB:6D:B6:E4:4C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201908 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320201909 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201910 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 320201911 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320201912 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320201913 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 320201914 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201908 (0x1315e4b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:39 2023 Not After : Mon Mar 20 20:20:39 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:9b:0e:c0:05:c1:f9:c7:15:38:64:63:06:41:d9:03: 58:52:c0:b7:8f:06:bc:ed:91:ff:c3:05:21:c1:78:a4: 41:20:b3:f8:ca:2f:34:57:d1:01:fa:50:85:ee:68:48: db:a5:19:ae:09:76:56:ab:01:58:3d:31:e2:56:8d:fc: cb:2a:41:fa:cc:83:39:5d:86:25:91:fc:58:53:d3:43: 53:58:28:6d:6a:02:1c:45:d0:41:68:57:ee:86:0c:1a: fc:13:1d:b9:20:26:9f:fe:4e:76:88:35:ea:15:5f:f5: 2c:7a:b5:cd:ea:53:87:fc:81:d2:62:fc:f3:6d:95:9e: 66:b8:18:3b:12:76:6d:91:02:b8:5b:84:ed:24:c8:c5: a7:71:b2:26:6b:09:16:2c:f4:b4:df:78:cf:26:1f:7c: ad:50:b7:8d:03:b2:7a:d0:52:57:06:f6:d6:11:b4:36: 55:17:18:15:23:4f:92:6a:a7:95:b0:f7:22:dc:95:38: 02:bb:cf:b2:82:8c:ac:18:7d:b6:f7:c8:c3:eb:87:c0: 48:34:ea:76:79:f6:46:35:95:5e:cc:bc:49:36:ed:20: 77:1f:af:51:79:b4:0c:0d:b9:16:75:30:48:db:93:78: 5f:bd:0d:1e:e8:66:86:38:38:fc:69:22:0d:a4:93:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:f4:49:3c:21:04:9c:5f:6f:3f:7f:fa:48:bb:b9:00: 11:c7:e6:41:5d:b2:ee:71:47:68:0b:e3:14:db:b0:c8: c9:c5:f0:01:5a:14:1e:89:c2:2a:10:ac:1a:05:e0:c2: fe:77:71:cb:09:30:77:6c:f5:fc:3a:63:4d:df:d4:f6: e8:f5:53:51:af:99:31:2c:65:cc:8f:35:c2:48:49:dc: 30:01:6c:6a:1a:7f:af:b9:65:29:1f:5c:8a:8a:28:68: 08:46:3b:75:ac:1c:33:f6:89:af:5c:d7:91:1f:fc:43: b0:86:62:05:ac:6b:63:82:40:b7:12:42:45:56:f3:0a: ba:99:0f:f9:6b:37:04:90:b5:76:0a:50:9d:d0:87:5e: 81:31:c4:27:05:79:4c:50:87:3c:c9:a2:68:70:84:fc: 63:0a:44:bb:c1:a2:c3:1c:31:1b:a1:6e:da:d1:1e:ea: 04:27:bf:ea:7a:3f:4f:99:5b:51:be:f2:04:8d:e7:dd: dc:bc:9f:1f:b8:0a:ff:33:bd:16:60:83:26:65:0f:5f: 43:71:df:b9:a4:a3:15:89:98:af:1c:87:8e:23:ab:cb: 3a:b4:59:89:cd:94:ee:1c:18:e6:04:ad:2d:5c:e3:45: c6:be:44:82:d9:b3:0e:90:1d:46:c7:65:62:34:25:e7 Fingerprint (SHA-256): 45:4B:B4:42:47:31:C2:88:4D:11:8A:FF:4C:F9:4E:EA:7B:52:0B:33:8D:8F:0E:55:CC:8B:6E:50:E0:A9:9C:F3 Fingerprint (SHA1): 52:2E:62:D7:A2:97:E1:BC:D3:44:1F:B0:05:97:31:65:9A:4E:45:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201908 (0x1315e4b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:39 2023 Not After : Mon Mar 20 20:20:39 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:9b:0e:c0:05:c1:f9:c7:15:38:64:63:06:41:d9:03: 58:52:c0:b7:8f:06:bc:ed:91:ff:c3:05:21:c1:78:a4: 41:20:b3:f8:ca:2f:34:57:d1:01:fa:50:85:ee:68:48: db:a5:19:ae:09:76:56:ab:01:58:3d:31:e2:56:8d:fc: cb:2a:41:fa:cc:83:39:5d:86:25:91:fc:58:53:d3:43: 53:58:28:6d:6a:02:1c:45:d0:41:68:57:ee:86:0c:1a: fc:13:1d:b9:20:26:9f:fe:4e:76:88:35:ea:15:5f:f5: 2c:7a:b5:cd:ea:53:87:fc:81:d2:62:fc:f3:6d:95:9e: 66:b8:18:3b:12:76:6d:91:02:b8:5b:84:ed:24:c8:c5: a7:71:b2:26:6b:09:16:2c:f4:b4:df:78:cf:26:1f:7c: ad:50:b7:8d:03:b2:7a:d0:52:57:06:f6:d6:11:b4:36: 55:17:18:15:23:4f:92:6a:a7:95:b0:f7:22:dc:95:38: 02:bb:cf:b2:82:8c:ac:18:7d:b6:f7:c8:c3:eb:87:c0: 48:34:ea:76:79:f6:46:35:95:5e:cc:bc:49:36:ed:20: 77:1f:af:51:79:b4:0c:0d:b9:16:75:30:48:db:93:78: 5f:bd:0d:1e:e8:66:86:38:38:fc:69:22:0d:a4:93:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:f4:49:3c:21:04:9c:5f:6f:3f:7f:fa:48:bb:b9:00: 11:c7:e6:41:5d:b2:ee:71:47:68:0b:e3:14:db:b0:c8: c9:c5:f0:01:5a:14:1e:89:c2:2a:10:ac:1a:05:e0:c2: fe:77:71:cb:09:30:77:6c:f5:fc:3a:63:4d:df:d4:f6: e8:f5:53:51:af:99:31:2c:65:cc:8f:35:c2:48:49:dc: 30:01:6c:6a:1a:7f:af:b9:65:29:1f:5c:8a:8a:28:68: 08:46:3b:75:ac:1c:33:f6:89:af:5c:d7:91:1f:fc:43: b0:86:62:05:ac:6b:63:82:40:b7:12:42:45:56:f3:0a: ba:99:0f:f9:6b:37:04:90:b5:76:0a:50:9d:d0:87:5e: 81:31:c4:27:05:79:4c:50:87:3c:c9:a2:68:70:84:fc: 63:0a:44:bb:c1:a2:c3:1c:31:1b:a1:6e:da:d1:1e:ea: 04:27:bf:ea:7a:3f:4f:99:5b:51:be:f2:04:8d:e7:dd: dc:bc:9f:1f:b8:0a:ff:33:bd:16:60:83:26:65:0f:5f: 43:71:df:b9:a4:a3:15:89:98:af:1c:87:8e:23:ab:cb: 3a:b4:59:89:cd:94:ee:1c:18:e6:04:ad:2d:5c:e3:45: c6:be:44:82:d9:b3:0e:90:1d:46:c7:65:62:34:25:e7 Fingerprint (SHA-256): 45:4B:B4:42:47:31:C2:88:4D:11:8A:FF:4C:F9:4E:EA:7B:52:0B:33:8D:8F:0E:55:CC:8B:6E:50:E0:A9:9C:F3 Fingerprint (SHA1): 52:2E:62:D7:A2:97:E1:BC:D3:44:1F:B0:05:97:31:65:9A:4E:45:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201915 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320201916 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 320201917 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 320201918 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 320201919 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 320201920 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 320201921 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 320201922 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 320201923 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 320201924 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 320201925 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 320201926 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 320201927 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 320201928 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 320201929 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 320201930 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 320201931 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 320201932 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 320201933 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 320201934 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 320201935 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 320201936 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 320201937 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 320201938 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 320201939 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 320201940 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 320201941 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 320201942 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 320201943 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 320201944 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201915 (0x1315e4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:20:45 2023 Not After : Mon Mar 20 20:20:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f0:50:8b:c3:da:84:ae:68:20:e3:29:ad:15:6a:c7: a8:c6:ef:29:19:c7:9d:51:64:5d:57:76:5b:b2:d4:a5: a1:e4:f3:b5:a2:7a:4e:84:75:ee:16:b8:a0:bd:99:77: a4:5c:f2:31:7f:3c:51:bd:6a:67:a2:8c:4f:87:7a:f8: 12:57:de:f5:d4:c5:18:7f:67:98:81:37:14:09:3b:2c: 76:4f:43:61:ca:dd:84:82:6b:44:d5:c7:b2:73:de:c2: 98:33:43:18:a8:3d:83:ec:e6:cd:fa:56:d7:a6:ee:a9: fd:09:b8:79:2b:d6:1e:83:19:8b:8b:36:9c:1d:1e:b1: 12:db:2b:12:74:8a:48:63:f0:55:a4:39:10:44:d9:e0: 51:1b:b2:f1:59:2f:6a:9b:ae:cd:2e:16:87:2e:d1:2d: 2c:d2:2f:60:f8:b4:7e:bd:3d:14:47:da:f0:7b:15:75: 59:b1:d9:3f:bb:13:d9:c2:08:d8:b1:7b:94:6b:cb:99: 0b:f7:b1:53:ba:ab:e7:01:16:de:2e:da:21:bf:23:63: bb:c4:b5:c6:8d:a6:d7:d2:56:7a:db:15:f8:b3:cf:2b: cc:b9:b9:10:a8:d5:52:90:47:bd:de:38:50:99:7d:2e: 7d:d4:5b:3a:6f:13:5d:56:75:9a:b4:15:a4:47:50:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:4b:01:0c:55:3d:51:23:00:71:87:96:6a:87:38:47: 4a:86:54:20:59:7d:02:86:8f:a7:0c:e3:51:f1:3f:ad: 61:fa:2a:ba:6e:0d:05:e8:61:8c:86:ce:40:77:a5:a6: 59:e2:f0:5a:75:ab:9b:41:bb:8f:a2:35:6d:39:04:b1: 3c:68:2f:7e:d6:29:df:a3:a9:be:c8:96:5e:68:da:7c: 7f:72:d4:3f:c9:dc:1b:34:41:5c:c7:9d:ae:e8:2c:c7: 3a:6b:0a:6a:c6:fc:4f:c1:f7:0d:4c:d9:19:ae:b4:b2: cb:b7:b6:02:96:b7:b5:ac:94:48:1c:f0:aa:7d:e9:73: d8:c4:29:63:62:c3:eb:04:2b:5f:24:e2:64:59:12:ec: 6c:58:56:ac:3f:95:e9:bb:01:84:56:00:32:0b:5c:af: 6b:1b:c6:da:cc:6b:f4:56:62:aa:07:8a:7d:2d:eb:84: f0:77:04:4f:12:f8:8b:dd:79:87:b5:26:d4:e8:13:25: d8:ef:94:76:30:dd:91:41:96:93:5d:10:14:9c:2c:c9: f0:71:6b:df:e9:f4:1b:6a:c9:96:45:38:1c:cd:db:ef: 68:5d:a7:62:c7:13:bc:df:08:21:88:20:c0:3c:47:70: b1:ef:3b:52:4e:cc:6c:28:2f:77:63:60:29:91:31:b4 Fingerprint (SHA-256): 2B:81:38:C6:2F:3C:02:69:57:3A:74:D7:E5:5B:67:A1:8F:32:78:C2:23:75:4D:F4:45:63:77:16:F0:95:E4:F6 Fingerprint (SHA1): 1E:05:51:73:31:51:70:BB:8C:E5:D3:4A:DB:A7:DE:94:F9:9D:66:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201945 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 320201946 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 320201947 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 320201948 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 320201949 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 320201950 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 320201951 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201945 (0x1315e4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:09 2023 Not After : Mon Mar 20 20:21:09 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:af:27:08:dd:e1:b7:de:5d:31:d8:3f:0b:a3:d2:51: 38:8f:3a:2c:15:9f:ce:e9:aa:de:be:84:fd:07:a5:08: 84:28:45:8e:e4:fe:04:a7:8f:ef:b9:85:7e:5c:8c:6c: f0:b1:6f:14:8e:62:36:02:fc:9c:06:52:82:fe:79:90: 66:46:52:83:7a:33:ee:f2:b0:8f:04:b6:c6:81:ac:9a: 35:7d:3f:33:3e:b1:68:3c:8a:43:eb:b1:57:03:c4:30: 66:7b:31:42:bf:8c:bd:c8:45:37:81:a6:d4:14:a4:7d: 6d:8d:b9:6a:f8:0a:59:c4:0a:aa:91:d0:b8:da:58:a1: c7:ba:d9:7e:0a:be:fe:7d:75:b0:13:c0:85:2e:ef:36: 41:e0:80:25:25:bd:b9:44:8a:d2:15:c7:bb:ed:d2:89: 78:ec:8d:7d:fb:b7:18:79:e1:fb:d3:b9:f6:94:82:0c: 41:14:aa:c4:f5:62:e8:10:9e:de:54:a9:b0:03:b2:a4: a9:90:dd:c9:16:cd:56:d5:25:c3:70:45:74:db:05:7c: ee:88:f8:3d:07:fe:c1:25:49:47:5e:43:d2:f7:65:a4: 6e:f0:42:5a:6b:9e:cf:f6:86:98:50:0f:41:88:9c:c6: 38:06:58:d8:1b:1f:cc:e2:33:bd:5e:9a:73:f6:23:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:bb:1c:b2:d4:0b:2e:79:0a:d1:9c:fb:e0:08:bf:2a: c7:a0:c6:40:c1:f6:d8:58:1a:47:53:21:42:7b:06:de: 68:aa:d2:e0:9a:2b:91:59:b3:90:24:25:c1:d0:e0:6b: 4e:67:6f:3b:9d:8a:c6:ce:01:9d:58:e1:7a:24:52:7e: 2f:64:97:ef:48:64:4c:ba:6a:e6:56:e2:73:04:dd:17: be:81:e5:22:da:55:6f:15:14:ca:ca:f5:11:b5:7c:34: 73:4e:f1:0d:4e:ed:65:7d:b1:46:b5:53:5b:f9:fa:2d: d1:d7:2a:84:9d:58:a6:91:d0:98:93:b1:8f:f2:32:19: 68:53:29:fd:6b:92:f7:24:73:2d:d9:33:ce:74:d4:aa: 92:83:b2:b0:d0:d0:e3:7d:3c:f3:83:59:ae:12:d2:86: 8b:ca:6d:23:63:ab:64:45:11:3d:56:d3:19:7a:ea:3c: b6:0b:be:12:93:27:56:d0:77:fb:73:55:f6:a7:4f:7e: e8:83:5c:d5:34:f9:5c:a9:94:53:4d:1b:ed:cc:ce:50: dc:35:a5:fc:bb:f9:80:8d:42:72:6b:ed:8e:bf:12:b9: e4:23:e4:e8:87:6d:77:0e:97:59:d2:4e:9a:b0:90:94: fe:6f:1d:fb:05:e0:e0:a3:be:91:b3:b0:20:7d:64:18 Fingerprint (SHA-256): ED:27:F1:6E:3A:63:E9:C9:77:07:EE:8A:E8:1C:EA:78:F4:AE:C1:0C:33:6D:12:AE:8B:FE:B6:C7:8E:C8:55:B0 Fingerprint (SHA1): 3B:BC:9D:5F:A3:81:94:1B:2B:74:7F:23:17:DB:30:3E:47:98:EF:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201945 (0x1315e4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:09 2023 Not After : Mon Mar 20 20:21:09 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:af:27:08:dd:e1:b7:de:5d:31:d8:3f:0b:a3:d2:51: 38:8f:3a:2c:15:9f:ce:e9:aa:de:be:84:fd:07:a5:08: 84:28:45:8e:e4:fe:04:a7:8f:ef:b9:85:7e:5c:8c:6c: f0:b1:6f:14:8e:62:36:02:fc:9c:06:52:82:fe:79:90: 66:46:52:83:7a:33:ee:f2:b0:8f:04:b6:c6:81:ac:9a: 35:7d:3f:33:3e:b1:68:3c:8a:43:eb:b1:57:03:c4:30: 66:7b:31:42:bf:8c:bd:c8:45:37:81:a6:d4:14:a4:7d: 6d:8d:b9:6a:f8:0a:59:c4:0a:aa:91:d0:b8:da:58:a1: c7:ba:d9:7e:0a:be:fe:7d:75:b0:13:c0:85:2e:ef:36: 41:e0:80:25:25:bd:b9:44:8a:d2:15:c7:bb:ed:d2:89: 78:ec:8d:7d:fb:b7:18:79:e1:fb:d3:b9:f6:94:82:0c: 41:14:aa:c4:f5:62:e8:10:9e:de:54:a9:b0:03:b2:a4: a9:90:dd:c9:16:cd:56:d5:25:c3:70:45:74:db:05:7c: ee:88:f8:3d:07:fe:c1:25:49:47:5e:43:d2:f7:65:a4: 6e:f0:42:5a:6b:9e:cf:f6:86:98:50:0f:41:88:9c:c6: 38:06:58:d8:1b:1f:cc:e2:33:bd:5e:9a:73:f6:23:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:bb:1c:b2:d4:0b:2e:79:0a:d1:9c:fb:e0:08:bf:2a: c7:a0:c6:40:c1:f6:d8:58:1a:47:53:21:42:7b:06:de: 68:aa:d2:e0:9a:2b:91:59:b3:90:24:25:c1:d0:e0:6b: 4e:67:6f:3b:9d:8a:c6:ce:01:9d:58:e1:7a:24:52:7e: 2f:64:97:ef:48:64:4c:ba:6a:e6:56:e2:73:04:dd:17: be:81:e5:22:da:55:6f:15:14:ca:ca:f5:11:b5:7c:34: 73:4e:f1:0d:4e:ed:65:7d:b1:46:b5:53:5b:f9:fa:2d: d1:d7:2a:84:9d:58:a6:91:d0:98:93:b1:8f:f2:32:19: 68:53:29:fd:6b:92:f7:24:73:2d:d9:33:ce:74:d4:aa: 92:83:b2:b0:d0:d0:e3:7d:3c:f3:83:59:ae:12:d2:86: 8b:ca:6d:23:63:ab:64:45:11:3d:56:d3:19:7a:ea:3c: b6:0b:be:12:93:27:56:d0:77:fb:73:55:f6:a7:4f:7e: e8:83:5c:d5:34:f9:5c:a9:94:53:4d:1b:ed:cc:ce:50: dc:35:a5:fc:bb:f9:80:8d:42:72:6b:ed:8e:bf:12:b9: e4:23:e4:e8:87:6d:77:0e:97:59:d2:4e:9a:b0:90:94: fe:6f:1d:fb:05:e0:e0:a3:be:91:b3:b0:20:7d:64:18 Fingerprint (SHA-256): ED:27:F1:6E:3A:63:E9:C9:77:07:EE:8A:E8:1C:EA:78:F4:AE:C1:0C:33:6D:12:AE:8B:FE:B6:C7:8E:C8:55:B0 Fingerprint (SHA1): 3B:BC:9D:5F:A3:81:94:1B:2B:74:7F:23:17:DB:30:3E:47:98:EF:DB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201952 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201953 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201954 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320201955 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201952 (0x1315e4e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:16 2023 Not After : Mon Mar 20 20:21:16 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:78:28:7c:13:48:94:5a:b9:26:8e:3d:67:d0:a4:1c: 25:4f:e1:f1:30:35:4c:c3:1b:af:e0:34:5b:dd:01:5f: ea:e7:b5:68:62:82:78:3c:61:7c:e3:78:c1:87:99:58: 76:a8:54:b6:cd:e9:93:cc:3b:89:d7:02:ed:21:f6:76: b9:7d:64:73:5a:7a:49:43:7c:fc:89:32:da:66:40:dc: 34:ab:86:c8:03:a6:ea:56:34:2c:d3:aa:e6:99:78:ab: fb:80:69:48:20:e7:38:7c:84:f3:33:7e:05:b5:a1:16: 6b:88:a0:93:02:2e:59:f7:1e:58:d2:03:8b:0e:c4:cb: 23:41:01:dd:af:9a:e2:e2:b4:75:34:f8:a6:87:0d:4c: 87:0b:db:cf:05:8b:d7:a9:11:96:2a:11:1b:a2:c6:22: ab:d1:a7:58:b2:7e:69:46:5c:a9:3d:1c:c1:06:f8:f8: 09:df:54:d1:d9:f4:de:c9:c5:82:49:53:e0:b0:c3:f8: f7:dc:20:4e:81:ab:11:7c:fc:ae:8c:33:16:38:19:8a: 51:9d:f7:df:c8:a5:9c:8f:d9:1d:cc:32:18:9a:f9:67: fe:1d:81:5e:30:c3:37:eb:7f:78:ad:2d:2d:54:18:04: f4:b8:01:ff:c4:20:c2:86:8a:ae:5e:79:d1:6b:b9:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:71:23:37:47:49:20:f1:f3:65:02:49:f2:5b:64:82: 57:90:e5:f5:dc:de:d5:a5:69:77:e6:be:a2:57:86:c6: 59:f5:49:93:05:c4:95:3f:0f:b7:96:0c:90:6f:dd:d4: 57:36:2f:88:f9:4d:a8:ff:b0:9a:e5:52:82:81:db:57: 2b:14:9e:cb:e8:52:2c:e1:f0:17:a2:c2:b1:af:9d:06: 2c:f8:73:b8:d4:10:25:8c:88:b6:49:67:4c:19:f0:c1: 2f:86:f5:ea:e4:4f:6c:8c:a9:98:9e:7b:e6:a8:21:4c: e4:f1:1c:b5:4c:6d:50:1f:7e:a5:6f:a6:61:ef:86:71: c8:1c:f0:ca:cb:cd:8a:eb:f3:9e:c7:d9:e7:16:ee:78: 4c:04:81:5d:df:d4:cb:d6:0f:92:11:2e:e5:2e:cb:1f: af:2f:cb:fc:2f:36:c3:c8:8c:87:85:45:f9:a3:99:d0: c4:81:46:a7:48:07:20:c2:39:eb:ce:ce:8d:e6:02:bb: 33:99:57:32:d6:c2:94:c3:30:ed:94:f8:17:94:11:1f: 2d:f5:d0:a2:8e:ed:3e:c7:c7:38:82:55:0f:c1:c9:8a: 51:80:68:96:01:92:bc:01:90:b9:3f:c2:0f:51:78:9e: 55:72:26:7a:eb:a9:d4:52:f4:6e:f6:98:0b:99:3a:f9 Fingerprint (SHA-256): E7:BA:F6:33:4A:D8:51:A0:CF:9F:A8:D2:46:C0:B9:EB:16:FD:9E:1E:A5:F9:A0:BA:E6:3A:B1:B4:74:F1:6B:8B Fingerprint (SHA1): 09:C3:A0:9A:C7:4C:C9:11:80:2C:D3:42:DA:53:1C:AF:1F:69:21:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201953 (0x1315e4e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:16 2023 Not After : Mon Mar 20 20:21:16 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:84:40:28:8c:8a:15:2c:76:47:64:2a:27:aa:0e:a4: d4:71:9f:45:29:08:0a:7e:04:67:1f:c7:2b:b8:47:8c: c4:25:af:a5:aa:63:1c:73:46:36:49:22:26:00:b0:cb: 56:c1:10:cf:0f:c3:fa:e8:34:5b:3c:64:a3:7b:3e:df: d1:fd:76:82:15:cd:37:2b:01:52:04:b8:0e:db:92:2d: dc:09:f4:ca:87:2f:42:90:a5:60:76:e6:96:f2:d3:12: 68:78:89:f6:65:18:fd:27:d9:90:59:68:0f:ca:60:12: fd:07:aa:8f:1a:73:31:87:dd:14:40:0a:c5:58:45:5f: 72:a8:1f:12:e6:1a:93:5e:9e:5a:b6:e8:11:d3:4c:da: 12:e0:8f:71:2e:cf:a1:a8:7f:ad:f7:bd:c6:2d:46:50: b3:0c:b8:a9:34:bd:9c:59:f3:a4:d3:de:5f:3a:32:f4: 30:e7:27:c2:b3:ef:ea:6d:37:22:70:8b:b1:df:5e:88: ed:3e:c6:ba:e5:cc:ad:17:e7:01:bf:4b:1c:c9:be:b0: aa:8a:88:f1:eb:84:df:72:a5:db:fe:5f:19:6e:cf:4d: f8:df:67:ef:f8:8e:47:58:61:68:09:be:9a:15:a5:6f: 84:ab:23:9b:66:35:dd:bc:1f:02:40:98:c1:df:f1:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:9d:13:55:c4:73:f9:4a:32:53:e5:74:6d:6e:7e:31: 0a:50:41:13:bb:63:1d:08:6f:85:d0:d7:07:03:c9:10: bb:29:75:54:7c:a9:e2:ba:16:74:e1:25:0d:88:14:da: 93:41:1e:6b:a2:93:a0:93:95:6a:de:21:51:de:62:a7: 7e:c2:71:ef:e5:10:52:6b:fb:f6:d3:dc:f1:e0:43:8e: be:20:d2:f2:b9:e6:99:34:bd:82:89:70:3b:f4:cf:20: f5:c1:f6:81:89:62:81:f7:df:70:99:14:16:df:44:bd: 38:09:0d:5c:3d:54:c3:37:0e:a8:8b:af:53:36:a5:55: 2d:87:d4:82:5f:27:a6:ab:f1:07:30:13:6b:3d:2b:e6: 80:7f:49:a6:fc:96:30:72:d9:47:5a:21:5e:84:f4:7d: 63:4e:60:7e:95:19:9b:f8:65:39:3e:17:13:66:45:b5: 72:a4:12:89:04:c5:37:54:c7:11:7f:7f:0e:7b:3d:8e: 5c:f1:0d:f1:90:71:88:7e:da:c4:15:8b:03:7d:ca:e1: 19:98:5d:23:0f:fa:96:94:ce:da:ba:ff:c7:d3:ed:07: 5a:64:b6:81:9d:82:04:39:a3:af:f2:48:37:44:b5:b0: 6f:a3:14:68:b4:a6:ec:e2:b3:88:20:52:d3:2f:e4:1e Fingerprint (SHA-256): 9A:A6:68:7D:1B:E8:52:A4:AB:96:C2:29:4E:53:C1:E4:92:FD:BC:19:98:E1:B5:67:D3:5D:D9:21:B5:45:7B:76 Fingerprint (SHA1): CB:C1:E4:0F:3E:A2:76:00:57:E0:59:37:28:22:C1:61:FF:AF:9E:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201954 (0x1315e4e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:21:17 2023 Not After : Mon Mar 20 20:21:17 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:be:c8:dd:5c:ce:c4:0b:91:c9:0f:88:bc:7f:d5:35: 0d:a2:25:69:63:51:c9:3c:87:10:7d:c5:e5:88:2c:8e: 39:9a:b8:7e:16:b8:90:82:be:37:75:6f:17:dd:a7:69: c2:87:2b:02:e0:0f:cc:c7:f7:37:36:5b:2a:a7:1d:03: eb:25:4c:03:99:17:aa:25:1e:b0:2f:a1:7e:fa:10:b5: d4:f2:8b:5a:2c:d7:d3:3d:c4:46:9a:75:c5:aa:f6:14: 28:a6:51:05:1d:c6:4e:2d:c5:fd:38:37:16:6b:fc:06: a0:ed:0f:0d:70:63:c0:ab:b2:f5:85:eb:79:08:9f:93: 6f:d2:df:84:de:2b:07:1f:57:37:5f:b7:d5:af:78:87: 30:84:ed:9b:2b:f9:02:3c:f2:e6:76:e1:eb:6d:21:95: a9:a4:3d:03:94:1c:79:89:f4:d3:01:19:aa:4c:50:88: 51:83:51:8c:81:19:1b:56:b6:eb:d6:3f:b0:c4:a4:34: 4a:7b:c0:f1:34:68:c5:e5:99:1e:0d:14:d0:95:12:c5: ea:2d:82:99:b3:3a:82:1f:96:62:c2:5d:f6:31:27:20: ce:a3:be:8d:0f:88:e6:0b:d3:bb:57:78:5e:d8:57:23: c1:9c:cd:97:80:ed:a1:2d:e3:1b:ec:8e:f7:07:ff:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:9e:81:dd:78:2b:2a:85:09:4c:d6:12:ec:7e:4c:1f: 6e:fd:45:7e:8e:25:c5:ef:1b:06:dd:e8:50:d3:34:57: 16:3a:b4:0a:37:4a:b9:5b:5a:31:a6:a4:4b:3a:1b:e3: a9:e5:a9:a8:09:f1:31:27:3d:2c:8d:6e:44:4f:50:ef: 07:1a:da:9e:24:33:cb:f4:0b:58:9d:a6:69:bb:e3:57: 01:36:5e:6f:82:7d:12:28:f4:cb:cf:f1:7e:80:b3:40: d8:8d:b6:1d:2d:9b:e8:11:0a:4f:bf:29:8d:51:ae:3e: 38:59:8c:16:76:97:21:cb:c4:43:91:cc:73:76:2d:dc: b8:64:12:6a:22:05:6a:38:4c:b4:91:c5:0a:77:c9:83: a5:cc:fa:31:89:8d:84:de:a0:51:b3:b7:8f:25:bb:3c: 12:e0:05:31:4a:c4:73:45:4d:28:db:e1:94:f1:ad:e8: 9e:9b:b3:cd:7e:21:bb:95:d5:7f:f9:b5:d0:b4:22:56: 6b:a7:2b:02:b6:54:93:0c:f9:8a:d1:25:d3:88:a8:0b: c6:18:80:a0:06:6f:b1:0d:db:32:af:21:4d:21:17:a4: d1:43:2c:4f:a1:6e:6e:71:7e:41:7e:bc:c2:ac:88:f3: c0:96:45:c5:aa:2d:cd:f1:f0:a1:3d:0e:22:43:60:6b Fingerprint (SHA-256): 65:20:74:BD:28:24:8F:81:4E:AD:C2:46:75:C3:08:D0:5D:37:1A:1F:F7:9D:B8:38:FC:D6:38:B3:07:C7:7E:08 Fingerprint (SHA1): 07:4D:2A:5A:A0:2E:B1:01:A6:E0:A8:51:D1:20:9B:37:20:57:D0:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201956 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201957 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201958 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 320201959 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 320201960 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201956 (0x1315e4e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:20 2023 Not After : Mon Mar 20 20:21:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:25:e3:45:89:3c:97:63:4f:ba:9d:b5:f8:60:b7:19: a2:8a:c0:2c:42:9e:81:0c:90:99:d3:e0:6f:00:23:45: e2:ac:9d:98:e9:90:79:76:d8:ff:18:af:61:b6:73:68: 1f:ca:0b:df:b2:81:c0:b3:51:8c:c4:aa:ac:f0:84:f1: ef:3b:96:57:4e:e5:3c:4e:97:da:34:c3:e9:26:bc:2a: 40:d0:48:47:73:d9:df:bf:c7:d5:37:e4:39:be:ec:27: 77:dc:05:0b:5a:2d:12:10:ca:24:87:a7:7c:d4:ca:df: 7a:0c:b8:67:c2:25:1d:ef:d2:03:c0:e7:ef:3b:d9:9e: f1:ce:a9:58:a1:a5:53:e0:56:87:77:59:a2:1a:16:ea: 0b:54:75:f4:13:39:2d:e1:3f:f6:33:9b:ec:c3:fb:ef: 73:94:2c:d8:3d:86:3f:04:ae:58:7b:98:13:0d:c6:33: cf:34:94:6f:e6:8a:11:9c:91:ca:b3:1b:87:44:ae:01: 4b:a8:5a:7f:a8:4a:62:f7:70:35:0b:77:9d:a6:ce:8a: 22:9c:75:98:74:f0:3e:29:67:fc:90:c7:f2:51:26:45: 3f:60:b5:6a:0d:d8:c2:82:63:35:7e:2c:ab:d6:9e:b1: 4f:2a:9a:98:8b:c6:7a:37:97:b4:79:6f:b3:63:ff:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:c7:96:b6:d6:47:21:59:b5:e3:c0:5d:f1:15:33:88: 2d:78:21:f6:75:d8:3c:0c:6e:a8:55:cf:3b:80:0a:1f: 17:76:a3:71:b2:3a:97:96:15:82:d5:ab:bd:a1:a3:06: 13:a0:f8:db:e0:4e:28:ba:6b:ff:1e:a6:f0:01:e3:8b: db:0b:16:30:92:bb:df:00:14:43:5c:e1:da:4d:34:4e: 78:95:3a:0e:8b:12:91:e8:a5:cf:74:a8:5d:32:de:63: 16:d1:17:29:09:43:b9:da:bc:fe:5e:52:67:d2:4f:90: e8:ff:cc:57:b6:df:a6:11:c4:09:fd:f1:5a:20:70:51: e5:15:e6:6b:54:25:fc:bf:93:65:25:20:15:3f:69:5c: 90:d5:3e:b7:58:68:7b:7b:43:65:f4:4e:4c:c6:2b:78: bd:d3:16:7c:40:f5:ef:44:5a:70:77:12:63:a7:2c:85: 6c:f5:9d:47:dc:93:4d:b0:77:e7:11:20:2f:e0:3c:41: 1c:2a:ea:c7:72:0b:eb:29:db:cd:97:df:0e:89:99:68: dc:a3:b8:4d:6f:6f:44:5c:41:93:4f:22:c7:c5:a6:88: ee:29:0a:a6:39:e2:a3:38:46:95:a8:ea:8f:2e:38:41: b7:15:a2:2c:0a:e8:29:b0:ff:f6:f9:52:4b:2a:f6:00 Fingerprint (SHA-256): 3B:82:0D:CD:3D:D7:02:49:36:87:F4:D0:8F:2F:56:42:29:5F:63:71:83:5A:32:22:18:E9:06:2E:B0:73:7E:1E Fingerprint (SHA1): 94:F0:FB:07:0D:CD:95:C2:29:4A:22:CD:CF:63:A1:B1:84:9B:E3:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201957 (0x1315e4e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:21 2023 Not After : Mon Mar 20 20:21:21 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:86:b1:d7:7b:a8:54:2f:38:31:c3:31:b4:7f:df:f3: c6:cf:53:9f:1b:f9:a2:35:1a:74:8a:a3:71:a7:52:25: f1:46:7c:81:b9:5f:37:df:94:93:bd:68:9d:bb:97:d2: 1c:07:0a:77:e3:22:d8:fd:cf:32:26:15:6b:bc:5d:cc: f7:47:42:cb:98:b9:9b:82:f2:e5:e3:13:7e:7a:4d:1d: c8:cc:79:60:79:28:23:20:c5:9a:04:36:37:96:38:a7: af:5d:11:da:50:eb:d8:84:a6:5a:f8:cf:df:30:9e:56: 37:a2:24:9d:50:4d:23:28:f7:99:df:37:ea:af:30:10: 46:92:21:3b:37:24:98:a9:90:06:26:aa:72:94:4e:7c: 11:7f:8f:ad:d1:96:c0:66:8d:a6:c9:60:ed:8e:2e:60: 3a:ce:c4:91:9b:2c:3e:56:5c:16:f4:98:3b:f5:ce:29: 93:38:bf:af:dc:27:58:ec:b0:4d:69:a8:48:16:d7:70: 47:01:89:fb:2c:66:1f:09:df:bf:e9:8d:91:3d:cf:46: 63:68:3c:fc:29:eb:a1:12:b6:af:9c:dc:0d:b0:40:cc: 44:f5:b1:15:17:d3:a1:c3:20:ba:04:9c:cb:15:1f:8e: 07:64:ed:3f:2d:26:bb:fd:5e:7d:8c:48:6d:87:65:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:e7:51:c4:b3:0d:a7:30:98:61:c6:c1:a8:bb:0f:6d: 3f:32:dc:31:9c:ac:0d:72:43:4f:cf:28:06:bf:7e:29: f1:01:62:40:f3:47:ba:a7:81:53:b3:41:59:7b:d7:a3: 1c:37:29:1d:8c:13:c3:20:aa:36:c2:ee:23:ca:7f:72: 24:8b:0b:86:fa:af:4a:b4:04:e9:05:81:8c:bf:0c:99: 35:89:82:8c:c8:ce:2c:95:3e:08:ec:51:bd:ac:f8:ad: 4a:47:44:69:80:b7:1a:ea:49:ff:0f:a4:3b:73:6f:8a: 57:88:a6:76:c9:4f:20:86:85:32:a6:af:d6:1c:6e:03: e2:59:70:5e:3e:a9:a4:96:06:06:31:52:48:ee:71:14: e2:15:1e:87:c6:cd:fc:6b:82:a6:4f:8e:50:bc:0e:3d: c4:71:c0:77:17:95:d7:c4:ee:40:c8:29:c8:5c:b4:9f: 02:12:fc:e1:80:a7:61:67:27:da:6f:92:8f:6b:32:9b: e3:4f:d9:35:38:f6:c1:9c:98:30:e1:90:fa:ff:3c:1c: 91:83:d1:de:41:1b:cc:ab:ab:15:ad:37:c0:ce:54:ab: f6:76:fd:99:a3:c2:8f:27:2d:49:2c:de:73:5c:f3:b7: 08:42:f0:a9:78:cc:33:6c:18:95:b4:d6:83:e6:df:bc Fingerprint (SHA-256): AA:14:08:D9:6E:F1:A2:80:5B:3A:64:60:A6:30:F7:23:8D:03:B9:3B:72:15:12:14:D0:DE:93:0C:0E:5C:B3:B5 Fingerprint (SHA1): D4:60:2F:1F:AB:EC:45:5F:E5:93:F1:AE:FB:A1:0B:74:8A:EC:E7:E7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201958 (0x1315e4e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:21:22 2023 Not After : Mon Mar 20 20:21:22 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:a0:30:de:93:b6:34:0a:82:96:2d:e8:4c:f5:bf:77: 8a:6d:ae:91:d0:15:13:86:9f:48:7c:ac:5a:e7:ac:32: 33:7d:c5:70:8a:f9:49:1a:e2:f9:70:c1:c0:0f:57:89: c9:1b:04:ec:34:71:c5:e1:51:9d:ad:b0:3f:68:34:f5: e3:e6:fa:84:09:3c:bb:a5:94:1c:a0:3c:0f:95:8a:b0: 88:58:c8:36:8b:94:2c:d7:cf:7b:62:9c:d7:75:b8:9a: e1:de:ac:a4:93:11:a9:17:47:bc:89:84:88:31:d5:7b: 95:90:80:b9:f6:b0:cd:13:fb:6e:af:21:51:1d:3c:2f: 35:0f:94:ea:91:fb:fa:35:a5:6c:b5:ca:34:81:67:7d: 4e:d7:04:9b:24:95:b7:89:a4:e4:db:a6:0e:7a:f9:09: 64:2b:ab:13:4d:00:0c:9b:40:b8:5c:73:a2:08:73:5d: bd:e0:c1:75:59:c9:19:2b:3d:9b:5a:85:42:37:81:db: 9c:7d:17:20:d0:42:b3:ff:5a:aa:fd:e6:6a:45:00:f3: 9c:a7:9d:8f:5a:bf:8a:08:0c:9b:2d:fe:51:c0:a2:11: 2e:f8:8f:f4:dc:c2:15:0b:05:02:92:2d:ed:89:e1:97: 98:f9:9c:c1:89:98:d9:be:8a:16:28:f7:77:12:22:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:17:3c:92:17:3b:dd:8e:c1:d7:0f:be:f2:e8:da:34: cd:63:ff:bd:3f:b9:bb:e0:b1:f7:62:74:f9:80:35:8d: ae:68:29:69:3c:84:55:e4:94:63:73:62:35:54:28:0b: 89:1e:cf:b0:8b:d2:54:a7:6f:39:9c:36:0f:26:04:e8: 94:4a:ce:13:97:fa:c9:8d:e7:6d:6e:da:64:9a:ee:88: 76:38:f5:8a:fb:c1:22:c7:01:a1:77:c1:7b:b0:ae:af: 13:90:91:a3:a4:f2:b4:ce:7f:92:9b:89:2b:c5:53:59: 65:72:fe:f8:fe:d3:7c:92:70:39:49:de:fa:8d:a7:d9: 6d:88:d5:07:1c:d2:dd:b5:70:7d:bf:25:ae:ce:97:3f: f8:90:23:3c:78:21:db:1e:fd:5a:80:ab:62:7f:3a:14: c3:82:ab:81:d0:40:8e:c3:23:ed:4e:1e:a8:97:c9:f1: a8:c4:f3:e9:f8:75:33:ca:cb:31:3a:fc:4d:d6:75:6d: c5:73:ca:97:1a:76:46:42:85:b7:64:c6:9e:e9:9e:60: 34:a0:7c:82:32:f2:43:e6:b6:86:fa:15:da:78:e3:ba: 25:76:9a:8a:39:17:22:9d:0a:8b:9e:e0:38:c0:7b:81: 1a:24:fb:59:16:82:79:a0:5c:e5:69:4f:4e:86:a3:f6 Fingerprint (SHA-256): 79:96:82:13:70:DA:AB:24:85:E5:41:7D:B9:06:54:8B:91:DC:1A:1E:47:CC:48:41:D5:DB:85:D8:5E:39:B2:E9 Fingerprint (SHA1): 6A:CB:8F:80:0A:5D:75:31:E5:DF:49:D4:40:4E:CC:27:08:60:67:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201961 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201962 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320201963 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA1Root-320201724.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320201964 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201961 (0x1315e4e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:25 2023 Not After : Mon Mar 20 20:21:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:a8:40:fc:04:6d:51:2a:7e:14:43:e7:50:ad:7a:e3: 96:58:dc:d0:de:58:cb:15:57:31:54:a9:5b:e6:76:16: 2d:32:df:ee:24:92:17:9b:ae:a4:bf:59:b3:d0:36:82: 69:31:43:92:f2:f3:2b:fc:e2:e4:8c:2f:ae:8a:c0:91: 33:46:e7:a7:9b:a4:fe:10:76:01:d7:ee:29:39:c5:9f: 16:13:66:12:42:1e:d0:9e:32:70:6b:32:fe:ce:35:2d: fe:d9:84:ad:97:e6:a8:fc:d1:e9:be:db:b0:ae:75:66: ef:5d:9f:e9:f4:1d:03:44:a2:b1:00:09:a7:13:2e:8b: c4:3e:51:14:36:2b:46:10:69:b9:e8:b4:bb:98:5f:a9: a3:ee:e1:25:b6:b2:e7:fe:40:6e:07:ba:54:1e:b7:63: a4:f9:f3:43:e6:b1:29:ff:d6:58:ac:76:cb:08:6a:73: 2f:ba:45:d2:46:72:32:f4:fe:e1:5d:9c:75:45:ca:18: 14:2b:38:c5:ed:14:10:3c:a1:8d:55:59:19:2c:32:52: 99:a1:27:b1:8f:43:0a:00:ea:ae:86:9e:39:d3:a0:eb: 7a:ec:3c:dd:47:2c:cc:e1:7d:9f:5c:9e:dc:2a:e5:89: 6d:1f:4a:e3:16:c7:c4:4f:7a:68:7b:0d:c0:e6:95:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:e0:79:7a:72:db:27:0c:e2:87:dd:07:5a:0a:16:1f: 0d:64:e8:eb:07:a6:5d:2a:65:82:4b:75:48:54:38:e5: cd:ab:a7:94:af:04:7f:b9:cc:6c:81:57:4f:82:e3:27: 5e:90:87:33:76:3c:d4:b8:54:f1:8d:4b:6e:6d:ec:b7: ab:54:1a:e9:dd:bd:7b:a4:ff:e5:e4:bc:a7:40:ff:ab: f6:9f:bf:2c:eb:34:26:40:75:d6:23:0a:32:df:89:92: a7:a6:fb:8c:dd:ea:6c:cf:fe:3b:3f:c4:c2:d6:f4:44: 78:62:22:1f:17:47:f8:fa:6a:19:2a:fa:bd:dd:89:67: 0b:ec:7e:c6:f0:ec:2f:59:ec:68:40:4e:e2:47:b3:1c: 2e:02:06:6f:ec:7f:d2:fb:69:76:b7:67:eb:6c:5d:82: cb:85:01:0b:56:6d:3d:e1:06:79:2e:92:44:04:db:e2: 77:4e:ac:82:35:b5:9d:58:a0:6c:67:2c:cb:5c:57:4c: 82:87:86:41:dc:f4:09:57:37:65:2b:7a:5d:56:50:a1: 44:f9:4f:0e:63:1e:04:3d:fd:ce:c2:68:99:51:fb:fd: ab:51:a6:57:e4:a9:14:2e:a4:0f:84:63:e6:35:21:d0: 38:8b:0b:78:b1:11:f5:71:e7:3d:0d:9b:e0:aa:69:bd Fingerprint (SHA-256): C7:61:65:1B:E7:4E:24:59:7D:5E:EC:96:92:25:E1:48:BA:EE:27:71:58:6A:55:71:FE:2E:ED:08:1B:2D:9C:AD Fingerprint (SHA1): A2:92:46:3B:69:D2:A0:FA:69:C9:6E:BF:5D:C0:EA:44:E6:2F:07:74 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201965 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201966 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320201967 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320201968 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320201969 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320201725.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201970 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201966 (0x1315e4ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:29 2023 Not After : Mon Mar 20 20:21:29 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:88:ee:10:3d:b4:b3:0d:40:ee:77:bf:1b:d4:ed:18: 78:56:30:57:1a:ca:17:51:a2:bc:a6:86:a3:fe:12:81: 97:1f:56:98:49:20:a1:99:46:59:ab:12:3c:69:0c:9a: c5:51:e3:27:f4:df:92:ca:72:e9:a4:26:da:49:17:54: 8b:33:99:0b:bd:86:8c:0d:f3:0b:f2:fe:7a:f0:fe:47: 5d:43:88:38:be:c3:e5:55:47:91:fe:97:e4:85:10:ca: 93:f9:e3:2a:c4:17:ae:87:10:76:bd:0b:02:94:82:4b: 78:c9:10:c9:d6:9d:2e:6e:a8:fb:4a:bf:10:76:72:44: bc:a6:4d:2d:22:84:82:4c:f4:cc:40:55:a3:01:a5:fb: 46:a9:e9:d6:48:d0:49:32:be:0f:a5:8b:18:65:eb:bf: 18:bd:57:18:c8:c1:4d:43:6b:92:aa:79:08:d9:41:89: 3d:50:99:7f:ad:0d:57:0e:a1:6b:31:eb:77:fd:12:d0: a3:9f:11:c2:6f:b9:37:30:75:eb:c0:dc:b2:0a:f4:29: d2:2d:91:53:cb:59:31:3f:4c:8c:dd:7a:70:91:00:6c: 86:a6:40:ad:ea:5f:e4:81:aa:d5:f5:fc:5f:63:31:79: 04:09:15:b1:03:cf:5a:f2:25:64:6a:b5:dc:d9:9e:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:4d:19:30:b5:b2:0b:a6:b2:99:a0:de:bf:a6:42:cf: 93:32:ea:bf:e1:3e:38:7e:b9:38:40:e7:db:43:5f:0f: 6b:2b:99:1d:24:4f:b4:a9:02:7f:25:92:1b:9c:f3:44: 33:c3:15:37:1c:87:e6:38:b6:76:d4:a2:86:31:2b:ed: 83:69:ab:3a:8b:3b:9c:64:25:f2:80:14:12:6e:b9:5c: c6:92:03:2f:a0:89:5a:b9:59:af:d2:28:bd:90:c8:07: 09:b2:15:a6:b7:8b:4a:32:48:64:de:de:9d:fd:ef:a9: d1:f5:04:b6:74:a6:97:d3:08:a0:a2:92:07:f6:3e:46: a6:e6:ba:20:5d:9d:89:9d:66:59:d7:8f:19:b6:d3:44: 68:78:af:81:10:55:b1:5d:83:09:c6:9a:46:4c:ca:27: f5:02:49:90:df:1e:66:5d:b0:97:b4:a3:d6:fc:52:d2: aa:63:b9:fd:23:2c:02:f8:eb:f5:37:70:67:58:75:94: 75:88:81:09:9c:e4:cf:2f:cd:2f:a0:9d:b3:f0:63:f2: ef:54:6e:46:9d:c0:65:7a:29:76:fb:3f:23:24:ce:9f: 40:29:08:d9:bb:9b:e0:7d:15:df:74:aa:29:2a:5d:0c: 95:79:a7:75:21:55:99:bc:75:74:b9:9a:f4:9d:de:13 Fingerprint (SHA-256): 99:A8:D2:17:DC:68:29:33:CA:9B:AD:F9:BE:31:E6:FC:B6:BD:10:7D:99:22:8E:64:D9:A2:AA:3D:00:E8:EA:10 Fingerprint (SHA1): 72:77:E4:4C:24:D7:8D:96:9E:F8:B2:3E:FA:FC:73:2D:5E:33:06:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201966 (0x1315e4ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:29 2023 Not After : Mon Mar 20 20:21:29 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:88:ee:10:3d:b4:b3:0d:40:ee:77:bf:1b:d4:ed:18: 78:56:30:57:1a:ca:17:51:a2:bc:a6:86:a3:fe:12:81: 97:1f:56:98:49:20:a1:99:46:59:ab:12:3c:69:0c:9a: c5:51:e3:27:f4:df:92:ca:72:e9:a4:26:da:49:17:54: 8b:33:99:0b:bd:86:8c:0d:f3:0b:f2:fe:7a:f0:fe:47: 5d:43:88:38:be:c3:e5:55:47:91:fe:97:e4:85:10:ca: 93:f9:e3:2a:c4:17:ae:87:10:76:bd:0b:02:94:82:4b: 78:c9:10:c9:d6:9d:2e:6e:a8:fb:4a:bf:10:76:72:44: bc:a6:4d:2d:22:84:82:4c:f4:cc:40:55:a3:01:a5:fb: 46:a9:e9:d6:48:d0:49:32:be:0f:a5:8b:18:65:eb:bf: 18:bd:57:18:c8:c1:4d:43:6b:92:aa:79:08:d9:41:89: 3d:50:99:7f:ad:0d:57:0e:a1:6b:31:eb:77:fd:12:d0: a3:9f:11:c2:6f:b9:37:30:75:eb:c0:dc:b2:0a:f4:29: d2:2d:91:53:cb:59:31:3f:4c:8c:dd:7a:70:91:00:6c: 86:a6:40:ad:ea:5f:e4:81:aa:d5:f5:fc:5f:63:31:79: 04:09:15:b1:03:cf:5a:f2:25:64:6a:b5:dc:d9:9e:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:4d:19:30:b5:b2:0b:a6:b2:99:a0:de:bf:a6:42:cf: 93:32:ea:bf:e1:3e:38:7e:b9:38:40:e7:db:43:5f:0f: 6b:2b:99:1d:24:4f:b4:a9:02:7f:25:92:1b:9c:f3:44: 33:c3:15:37:1c:87:e6:38:b6:76:d4:a2:86:31:2b:ed: 83:69:ab:3a:8b:3b:9c:64:25:f2:80:14:12:6e:b9:5c: c6:92:03:2f:a0:89:5a:b9:59:af:d2:28:bd:90:c8:07: 09:b2:15:a6:b7:8b:4a:32:48:64:de:de:9d:fd:ef:a9: d1:f5:04:b6:74:a6:97:d3:08:a0:a2:92:07:f6:3e:46: a6:e6:ba:20:5d:9d:89:9d:66:59:d7:8f:19:b6:d3:44: 68:78:af:81:10:55:b1:5d:83:09:c6:9a:46:4c:ca:27: f5:02:49:90:df:1e:66:5d:b0:97:b4:a3:d6:fc:52:d2: aa:63:b9:fd:23:2c:02:f8:eb:f5:37:70:67:58:75:94: 75:88:81:09:9c:e4:cf:2f:cd:2f:a0:9d:b3:f0:63:f2: ef:54:6e:46:9d:c0:65:7a:29:76:fb:3f:23:24:ce:9f: 40:29:08:d9:bb:9b:e0:7d:15:df:74:aa:29:2a:5d:0c: 95:79:a7:75:21:55:99:bc:75:74:b9:9a:f4:9d:de:13 Fingerprint (SHA-256): 99:A8:D2:17:DC:68:29:33:CA:9B:AD:F9:BE:31:E6:FC:B6:BD:10:7D:99:22:8E:64:D9:A2:AA:3D:00:E8:EA:10 Fingerprint (SHA1): 72:77:E4:4C:24:D7:8D:96:9E:F8:B2:3E:FA:FC:73:2D:5E:33:06:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201971 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201972 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320201973 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320201974 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320201975 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320201726.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201976 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320201977 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-BridgeNavy-320201727.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320201978 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201972 (0x1315e4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:32 2023 Not After : Mon Mar 20 20:21:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:bf:64:14:1a:a6:2d:41:f9:ee:cc:55:f1:f8:97:b9: 8a:85:7c:43:ee:49:77:6b:99:11:8c:29:ac:2e:ce:13: d7:cd:e0:16:03:e0:dd:06:2b:1d:19:a0:9e:13:0c:74: d7:2b:4b:95:12:04:3c:3c:93:69:b2:83:51:13:d8:63: f5:e9:da:a1:34:9e:1e:3c:55:a0:b1:c2:81:6b:4d:f4: 16:21:69:c8:d1:03:03:6a:32:69:21:c6:f1:ad:a0:c7: 09:86:16:77:8f:40:dd:25:a8:53:e4:f4:2e:e6:ac:11: 60:a5:48:fa:9a:e3:1e:61:7a:b7:d4:89:29:7b:0d:b2: 6d:45:4a:37:7e:19:a1:96:00:21:86:0c:b5:e1:15:e1: 30:7a:5c:10:a5:35:3a:af:b4:86:6d:be:59:3c:76:72: f2:b2:a1:94:fe:20:18:24:72:a9:6b:93:ca:45:f3:f7: 7d:21:0a:aa:60:28:a5:3a:57:d9:b0:bf:a9:d0:a5:db: b6:ee:ce:da:eb:c8:f4:59:52:56:d3:e8:e3:ae:8c:55: 9d:d6:41:59:50:9f:10:56:d2:2b:c6:54:63:62:a1:cf: 77:84:8b:b7:ac:9f:c1:e2:3f:8f:d4:06:e0:6b:10:e1: 8d:26:f6:51:f1:3a:1b:70:5c:84:21:50:9b:07:63:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:dd:c8:e1:7d:78:b3:48:31:b8:69:a8:03:02:70:fe: 43:fc:bd:f2:4f:b8:04:7a:d2:a4:d8:d0:4a:18:85:99: c5:43:24:c0:ae:9a:18:5b:77:fd:1c:d4:3d:e0:e9:2b: e5:48:f0:4e:d0:e5:da:0a:a2:da:17:cc:ed:b3:25:38: d2:4a:97:0a:c7:0e:f8:58:b3:33:31:4b:b6:c1:5c:b4: b6:93:1c:2c:d8:8e:47:c8:23:fe:47:cc:aa:69:3c:53: ca:e2:ed:2c:67:a3:c2:32:a5:c9:ee:62:e6:98:03:a1: 4d:06:aa:37:df:cf:9c:71:f1:74:3f:da:21:fe:f7:17: 81:7a:61:b2:19:9a:2d:74:cb:9e:78:dc:4c:22:ff:46: db:53:f6:f4:fb:a3:8e:0c:23:e7:c8:64:d8:2d:88:35: 6d:4f:61:53:b9:54:17:cb:5e:d6:dc:ec:12:25:e0:d8: 1d:60:8b:8b:7a:eb:40:44:18:48:ff:7d:cd:7c:08:02: f4:f3:2c:d9:7f:c5:47:3e:31:c5:84:73:ce:b0:d5:79: 68:a4:d2:05:78:00:7e:7e:75:a1:d3:2c:88:f6:d0:40: 7b:d2:fb:bc:45:7b:51:d4:87:d4:9c:51:a3:14:ee:89: e5:9b:9e:cb:aa:f0:d1:b7:51:0a:32:73:43:ae:12:b3 Fingerprint (SHA-256): 5E:A4:C3:65:AE:A0:53:65:25:44:7E:EE:4A:C4:69:78:B2:57:56:6E:96:20:6B:9E:32:23:3D:3E:0D:A8:F2:B7 Fingerprint (SHA1): DF:3B:11:AB:EA:A9:B8:57:EB:0B:B3:BA:A2:EA:5C:AA:E4:A5:59:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201972 (0x1315e4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:32 2023 Not After : Mon Mar 20 20:21:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:bf:64:14:1a:a6:2d:41:f9:ee:cc:55:f1:f8:97:b9: 8a:85:7c:43:ee:49:77:6b:99:11:8c:29:ac:2e:ce:13: d7:cd:e0:16:03:e0:dd:06:2b:1d:19:a0:9e:13:0c:74: d7:2b:4b:95:12:04:3c:3c:93:69:b2:83:51:13:d8:63: f5:e9:da:a1:34:9e:1e:3c:55:a0:b1:c2:81:6b:4d:f4: 16:21:69:c8:d1:03:03:6a:32:69:21:c6:f1:ad:a0:c7: 09:86:16:77:8f:40:dd:25:a8:53:e4:f4:2e:e6:ac:11: 60:a5:48:fa:9a:e3:1e:61:7a:b7:d4:89:29:7b:0d:b2: 6d:45:4a:37:7e:19:a1:96:00:21:86:0c:b5:e1:15:e1: 30:7a:5c:10:a5:35:3a:af:b4:86:6d:be:59:3c:76:72: f2:b2:a1:94:fe:20:18:24:72:a9:6b:93:ca:45:f3:f7: 7d:21:0a:aa:60:28:a5:3a:57:d9:b0:bf:a9:d0:a5:db: b6:ee:ce:da:eb:c8:f4:59:52:56:d3:e8:e3:ae:8c:55: 9d:d6:41:59:50:9f:10:56:d2:2b:c6:54:63:62:a1:cf: 77:84:8b:b7:ac:9f:c1:e2:3f:8f:d4:06:e0:6b:10:e1: 8d:26:f6:51:f1:3a:1b:70:5c:84:21:50:9b:07:63:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:dd:c8:e1:7d:78:b3:48:31:b8:69:a8:03:02:70:fe: 43:fc:bd:f2:4f:b8:04:7a:d2:a4:d8:d0:4a:18:85:99: c5:43:24:c0:ae:9a:18:5b:77:fd:1c:d4:3d:e0:e9:2b: e5:48:f0:4e:d0:e5:da:0a:a2:da:17:cc:ed:b3:25:38: d2:4a:97:0a:c7:0e:f8:58:b3:33:31:4b:b6:c1:5c:b4: b6:93:1c:2c:d8:8e:47:c8:23:fe:47:cc:aa:69:3c:53: ca:e2:ed:2c:67:a3:c2:32:a5:c9:ee:62:e6:98:03:a1: 4d:06:aa:37:df:cf:9c:71:f1:74:3f:da:21:fe:f7:17: 81:7a:61:b2:19:9a:2d:74:cb:9e:78:dc:4c:22:ff:46: db:53:f6:f4:fb:a3:8e:0c:23:e7:c8:64:d8:2d:88:35: 6d:4f:61:53:b9:54:17:cb:5e:d6:dc:ec:12:25:e0:d8: 1d:60:8b:8b:7a:eb:40:44:18:48:ff:7d:cd:7c:08:02: f4:f3:2c:d9:7f:c5:47:3e:31:c5:84:73:ce:b0:d5:79: 68:a4:d2:05:78:00:7e:7e:75:a1:d3:2c:88:f6:d0:40: 7b:d2:fb:bc:45:7b:51:d4:87:d4:9c:51:a3:14:ee:89: e5:9b:9e:cb:aa:f0:d1:b7:51:0a:32:73:43:ae:12:b3 Fingerprint (SHA-256): 5E:A4:C3:65:AE:A0:53:65:25:44:7E:EE:4A:C4:69:78:B2:57:56:6E:96:20:6B:9E:32:23:3D:3E:0D:A8:F2:B7 Fingerprint (SHA1): DF:3B:11:AB:EA:A9:B8:57:EB:0B:B3:BA:A2:EA:5C:AA:E4:A5:59:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201971 (0x1315e4f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:21:32 2023 Not After : Mon Mar 20 20:21:32 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:f2:5f:8d:44:cd:4e:62:cb:d9:6a:92:aa:28:d7:d7: c7:46:12:eb:bf:ad:34:f4:32:59:77:81:2f:56:06:e0: 3a:1c:a0:d3:8c:b6:ef:6e:97:3a:9c:ed:61:3e:42:31: 30:68:16:54:97:a2:b7:af:36:28:59:c3:0d:51:33:53: 34:61:1f:3c:39:f4:e8:a0:f5:b9:26:f9:84:b8:b7:9c: 4e:2f:df:f1:87:48:21:c5:33:65:59:e9:82:10:7c:df: 43:9d:e9:ee:9c:49:b4:54:b8:bd:42:69:bd:34:57:78: 50:26:2d:e7:d0:96:93:7b:16:0e:95:fe:73:35:47:cf: 3b:46:5b:6e:3b:95:1f:17:c0:c5:29:16:15:07:24:c9: 78:b5:9e:b8:c0:a0:18:f1:5d:90:17:55:5d:3a:9c:c1: ce:4b:30:f0:9e:67:00:01:1a:ab:e7:8f:ad:3d:1c:7f: 85:08:dc:47:27:7a:ae:78:56:36:16:0d:61:c7:46:16: d5:48:d1:b9:ba:29:bc:b3:79:aa:11:e3:15:59:38:ed: d8:dc:da:48:31:8b:19:6c:c4:f2:74:b7:47:85:27:aa: 88:47:f9:25:1c:01:d7:77:5c:c3:7c:33:09:c3:38:20: 99:ce:f5:84:b2:7c:26:eb:f7:ed:23:b3:a7:0f:74:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:01:bf:33:c0:ce:bd:65:a5:31:17:d4:24:c0:35:da: cc:fd:e9:fe:4f:fe:00:06:50:5b:e3:c7:17:18:89:9b: 1a:1e:5b:91:84:a2:c4:33:61:3f:71:8d:7f:da:74:2a: ea:f3:d6:b7:50:8d:68:63:bf:2b:8c:7c:b1:d7:4b:bc: fc:ed:c7:3a:8f:29:df:93:9d:32:c5:11:55:e6:6c:f3: d1:a2:b4:9b:2b:a7:a0:06:8d:4e:98:12:ba:0b:8e:87: 39:a9:a3:b0:03:1f:74:30:b8:2f:fd:03:d4:d9:7e:c5: 86:aa:6f:4e:d6:4b:03:f2:96:c6:0f:38:a6:a0:97:d8: 05:69:53:b6:a9:e3:a9:ba:9b:13:0c:20:15:45:ac:ed: 61:8c:41:af:b1:3f:ea:1a:a3:80:2c:93:da:6a:24:5b: 7c:48:3d:af:24:57:16:02:5f:68:70:24:6c:bf:aa:de: 9d:2c:95:ae:43:57:aa:31:d0:0f:d9:ae:a2:d7:cc:a4: 9e:5f:81:38:46:26:d0:86:eb:2f:60:9a:ba:2b:f9:a6: 54:55:de:78:41:fe:e2:80:d9:a4:63:3d:3a:56:b1:32: a4:e8:d3:6c:0c:8a:5a:b2:84:1c:59:32:06:0f:7f:67: 67:40:73:6e:9c:00:29:f7:95:7c:7e:9d:0a:4a:9d:8c Fingerprint (SHA-256): FF:F7:3A:75:B1:6E:12:A0:6B:CB:FF:76:6A:45:0E:FD:7A:19:36:34:27:D4:0F:4D:8A:04:85:08:73:C9:75:66 Fingerprint (SHA1): 3F:99:28:7A:73:05:72:70:35:45:09:FF:B5:25:82:FF:C9:F6:86:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201972 (0x1315e4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:32 2023 Not After : Mon Mar 20 20:21:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:bf:64:14:1a:a6:2d:41:f9:ee:cc:55:f1:f8:97:b9: 8a:85:7c:43:ee:49:77:6b:99:11:8c:29:ac:2e:ce:13: d7:cd:e0:16:03:e0:dd:06:2b:1d:19:a0:9e:13:0c:74: d7:2b:4b:95:12:04:3c:3c:93:69:b2:83:51:13:d8:63: f5:e9:da:a1:34:9e:1e:3c:55:a0:b1:c2:81:6b:4d:f4: 16:21:69:c8:d1:03:03:6a:32:69:21:c6:f1:ad:a0:c7: 09:86:16:77:8f:40:dd:25:a8:53:e4:f4:2e:e6:ac:11: 60:a5:48:fa:9a:e3:1e:61:7a:b7:d4:89:29:7b:0d:b2: 6d:45:4a:37:7e:19:a1:96:00:21:86:0c:b5:e1:15:e1: 30:7a:5c:10:a5:35:3a:af:b4:86:6d:be:59:3c:76:72: f2:b2:a1:94:fe:20:18:24:72:a9:6b:93:ca:45:f3:f7: 7d:21:0a:aa:60:28:a5:3a:57:d9:b0:bf:a9:d0:a5:db: b6:ee:ce:da:eb:c8:f4:59:52:56:d3:e8:e3:ae:8c:55: 9d:d6:41:59:50:9f:10:56:d2:2b:c6:54:63:62:a1:cf: 77:84:8b:b7:ac:9f:c1:e2:3f:8f:d4:06:e0:6b:10:e1: 8d:26:f6:51:f1:3a:1b:70:5c:84:21:50:9b:07:63:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:dd:c8:e1:7d:78:b3:48:31:b8:69:a8:03:02:70:fe: 43:fc:bd:f2:4f:b8:04:7a:d2:a4:d8:d0:4a:18:85:99: c5:43:24:c0:ae:9a:18:5b:77:fd:1c:d4:3d:e0:e9:2b: e5:48:f0:4e:d0:e5:da:0a:a2:da:17:cc:ed:b3:25:38: d2:4a:97:0a:c7:0e:f8:58:b3:33:31:4b:b6:c1:5c:b4: b6:93:1c:2c:d8:8e:47:c8:23:fe:47:cc:aa:69:3c:53: ca:e2:ed:2c:67:a3:c2:32:a5:c9:ee:62:e6:98:03:a1: 4d:06:aa:37:df:cf:9c:71:f1:74:3f:da:21:fe:f7:17: 81:7a:61:b2:19:9a:2d:74:cb:9e:78:dc:4c:22:ff:46: db:53:f6:f4:fb:a3:8e:0c:23:e7:c8:64:d8:2d:88:35: 6d:4f:61:53:b9:54:17:cb:5e:d6:dc:ec:12:25:e0:d8: 1d:60:8b:8b:7a:eb:40:44:18:48:ff:7d:cd:7c:08:02: f4:f3:2c:d9:7f:c5:47:3e:31:c5:84:73:ce:b0:d5:79: 68:a4:d2:05:78:00:7e:7e:75:a1:d3:2c:88:f6:d0:40: 7b:d2:fb:bc:45:7b:51:d4:87:d4:9c:51:a3:14:ee:89: e5:9b:9e:cb:aa:f0:d1:b7:51:0a:32:73:43:ae:12:b3 Fingerprint (SHA-256): 5E:A4:C3:65:AE:A0:53:65:25:44:7E:EE:4A:C4:69:78:B2:57:56:6E:96:20:6B:9E:32:23:3D:3E:0D:A8:F2:B7 Fingerprint (SHA1): DF:3B:11:AB:EA:A9:B8:57:EB:0B:B3:BA:A2:EA:5C:AA:E4:A5:59:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201972 (0x1315e4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:32 2023 Not After : Mon Mar 20 20:21:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:bf:64:14:1a:a6:2d:41:f9:ee:cc:55:f1:f8:97:b9: 8a:85:7c:43:ee:49:77:6b:99:11:8c:29:ac:2e:ce:13: d7:cd:e0:16:03:e0:dd:06:2b:1d:19:a0:9e:13:0c:74: d7:2b:4b:95:12:04:3c:3c:93:69:b2:83:51:13:d8:63: f5:e9:da:a1:34:9e:1e:3c:55:a0:b1:c2:81:6b:4d:f4: 16:21:69:c8:d1:03:03:6a:32:69:21:c6:f1:ad:a0:c7: 09:86:16:77:8f:40:dd:25:a8:53:e4:f4:2e:e6:ac:11: 60:a5:48:fa:9a:e3:1e:61:7a:b7:d4:89:29:7b:0d:b2: 6d:45:4a:37:7e:19:a1:96:00:21:86:0c:b5:e1:15:e1: 30:7a:5c:10:a5:35:3a:af:b4:86:6d:be:59:3c:76:72: f2:b2:a1:94:fe:20:18:24:72:a9:6b:93:ca:45:f3:f7: 7d:21:0a:aa:60:28:a5:3a:57:d9:b0:bf:a9:d0:a5:db: b6:ee:ce:da:eb:c8:f4:59:52:56:d3:e8:e3:ae:8c:55: 9d:d6:41:59:50:9f:10:56:d2:2b:c6:54:63:62:a1:cf: 77:84:8b:b7:ac:9f:c1:e2:3f:8f:d4:06:e0:6b:10:e1: 8d:26:f6:51:f1:3a:1b:70:5c:84:21:50:9b:07:63:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:dd:c8:e1:7d:78:b3:48:31:b8:69:a8:03:02:70:fe: 43:fc:bd:f2:4f:b8:04:7a:d2:a4:d8:d0:4a:18:85:99: c5:43:24:c0:ae:9a:18:5b:77:fd:1c:d4:3d:e0:e9:2b: e5:48:f0:4e:d0:e5:da:0a:a2:da:17:cc:ed:b3:25:38: d2:4a:97:0a:c7:0e:f8:58:b3:33:31:4b:b6:c1:5c:b4: b6:93:1c:2c:d8:8e:47:c8:23:fe:47:cc:aa:69:3c:53: ca:e2:ed:2c:67:a3:c2:32:a5:c9:ee:62:e6:98:03:a1: 4d:06:aa:37:df:cf:9c:71:f1:74:3f:da:21:fe:f7:17: 81:7a:61:b2:19:9a:2d:74:cb:9e:78:dc:4c:22:ff:46: db:53:f6:f4:fb:a3:8e:0c:23:e7:c8:64:d8:2d:88:35: 6d:4f:61:53:b9:54:17:cb:5e:d6:dc:ec:12:25:e0:d8: 1d:60:8b:8b:7a:eb:40:44:18:48:ff:7d:cd:7c:08:02: f4:f3:2c:d9:7f:c5:47:3e:31:c5:84:73:ce:b0:d5:79: 68:a4:d2:05:78:00:7e:7e:75:a1:d3:2c:88:f6:d0:40: 7b:d2:fb:bc:45:7b:51:d4:87:d4:9c:51:a3:14:ee:89: e5:9b:9e:cb:aa:f0:d1:b7:51:0a:32:73:43:ae:12:b3 Fingerprint (SHA-256): 5E:A4:C3:65:AE:A0:53:65:25:44:7E:EE:4A:C4:69:78:B2:57:56:6E:96:20:6B:9E:32:23:3D:3E:0D:A8:F2:B7 Fingerprint (SHA1): DF:3B:11:AB:EA:A9:B8:57:EB:0B:B3:BA:A2:EA:5C:AA:E4:A5:59:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201979 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201980 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 320201981 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 320201982 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 320201983 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 320201984 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320201985 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320201986 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201987 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320201988 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201979 (0x1315e4fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 20:21:39 2023 Not After : Mon Mar 20 20:21:39 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:e4:43:0c:db:f4:d7:0c:20:d5:0e:5a:02:03:08:d7: ff:fb:43:ab:bd:1f:5a:2e:c0:56:65:ab:1e:ee:af:2e: fc:6e:bf:b2:d6:d6:2e:eb:6c:73:a2:fb:0f:bb:5a:94: 98:06:d6:c9:51:db:5d:2e:f5:52:9b:cd:6a:7a:a3:c8: da:3c:d7:5a:37:a8:f9:72:12:5b:86:6a:3e:6e:3c:db: 56:66:80:43:c7:d4:e8:a4:66:66:5e:00:6d:2a:ac:cf: 9c:d4:50:02:13:72:c1:42:37:d6:12:14:0d:50:4e:8e: 41:7c:b1:89:01:cd:fa:7a:04:20:3a:d3:f5:1e:f2:e3: f0:80:9a:62:86:b0:d5:61:74:d8:c7:b8:fc:b4:15:71: 25:4c:42:1a:6c:8c:b7:02:40:28:7a:e9:8d:3d:30:6d: 7c:13:c7:6c:1f:db:b2:6a:85:dd:ae:30:26:dc:b0:66: b9:46:a8:24:60:24:6e:42:92:d7:c7:c7:88:f2:8a:8f: 14:22:22:a6:c9:32:15:ad:42:3c:6b:69:a1:7b:b6:cc: 53:ef:45:2a:64:ed:b9:01:7e:7b:db:16:6c:f8:d5:9b: 12:ff:a7:d3:85:f5:01:ca:26:78:2a:75:0b:a1:4e:ae: 74:e6:2d:91:de:0d:df:91:67:57:41:ea:bb:b2:fb:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d9:ef:dd:f2:fe:7f:2c:e3:09:14:ab:08:c0:4d:cf:57: ac:5e:fa:1d:34:a2:27:1f:15:4b:04:f3:4e:99:cc:72: 53:0f:9f:ee:82:3c:e4:6d:8c:1d:e0:c0:27:28:56:85: ed:03:f0:26:53:63:2c:1e:b5:af:a6:68:2f:3b:9b:1c: 81:06:dd:33:f7:32:3b:20:42:9a:c4:81:69:eb:a4:c0: 7e:38:09:dd:87:06:09:6c:0c:14:95:69:a0:70:74:85: 7b:8d:d1:7b:f6:bf:83:07:f4:3f:f7:eb:8c:90:a6:f2: 6f:41:02:dc:76:77:13:1a:9d:c5:40:4b:ef:2e:de:f9: 11:22:d1:a2:72:a8:1a:7c:8e:30:a0:48:92:3e:c2:87: 88:38:e2:06:57:46:a2:98:ee:43:ae:b4:3c:9d:8d:ac: 31:06:70:82:a8:2d:7d:b3:21:01:8a:2f:3a:84:3f:ed: 18:92:97:30:b1:39:d9:c3:ec:92:87:22:05:0c:08:89: fd:ab:f1:9b:0c:0a:61:94:2b:58:70:fa:72:2e:9e:76: 85:41:36:eb:34:87:24:b4:82:ca:5e:1e:cf:d9:b1:bf: b4:93:4f:b9:e2:71:26:27:98:3b:e2:35:81:38:7c:d0: 50:70:c3:09:85:04:49:c6:8c:4c:d5:e6:df:d9:7a:b0 Fingerprint (SHA-256): 3F:94:9D:E3:7D:A4:27:1D:A7:C8:89:20:E5:9C:70:FB:F2:9E:64:C6:B2:46:E6:4C:FD:42:6A:BF:6C:DD:6C:A8 Fingerprint (SHA1): FD:DF:FB:55:60:50:90:1A:B8:CD:E7:8F:82:97:07:77:4F:DE:5A:42 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201980 (0x1315e4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 20:21:40 2023 Not After : Mon Mar 20 20:21:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:5e:c6:b0:04:4f:61:6e:5e:83:54:15:37:b0:3f:52: 73:af:79:68:f3:9e:9c:f1:2b:f6:86:8c:97:0d:3d:76: 4d:62:c6:78:3d:e2:88:37:54:a3:e7:b4:9b:34:00:2b: 1a:32:f1:c5:70:3f:e7:51:c6:eb:5e:eb:9b:9a:e9:55: dc:e3:ae:59:83:ad:42:05:6a:99:79:b9:ff:e8:e8:34: 66:b5:2e:d9:7c:a4:75:d1:25:cc:49:32:d1:cb:4e:90: 87:2f:ca:14:7c:73:0a:22:89:74:d4:9b:60:cc:67:10: 34:82:61:22:71:aa:da:64:83:f1:21:4b:af:ad:d0:9a: cb:d6:a8:da:9a:f5:a6:ed:4b:91:b1:50:d2:ec:01:e7: 88:e4:9d:df:40:f5:84:80:d7:6f:89:32:f8:31:6d:c7: fc:38:7f:3f:31:7b:1e:af:56:23:d7:c8:37:51:01:8e: 58:6e:f1:4f:4d:6d:22:91:2b:27:36:15:43:33:c3:e9: d2:5d:09:76:8a:d6:c9:11:60:41:aa:14:ab:93:bd:ce: 56:04:50:b4:2d:5e:dd:15:52:93:4f:c3:9d:89:bb:0a: c4:ec:38:e7:61:50:f4:4f:9a:40:51:08:52:75:1c:f7: a3:49:e0:9b:7c:92:15:4c:4d:82:47:c3:e3:98:b6:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:fe:07:f6:33:53:5d:d7:1d:5d:90:20:d5:1d:78:8d: 99:95:7c:1c:74:d9:78:2d:51:df:16:e3:4c:ae:db:ea: e2:ff:94:0a:15:6e:90:ea:5d:96:5f:c8:aa:1d:40:95: d0:df:e5:3e:e9:28:3e:8a:be:37:7d:04:64:09:e3:df: 60:7a:dd:2b:56:ab:fa:d8:94:df:2e:0c:19:50:34:ae: 4f:12:79:5c:d4:34:2c:84:97:6c:13:dc:ca:1c:f2:a5: e2:a2:dc:a4:71:7b:d1:33:82:2f:75:92:df:23:9b:15: 8c:80:6b:2c:d2:83:e5:cf:cd:4a:a5:1e:e8:e4:6c:c5: 7e:3f:67:c8:64:b0:76:88:c6:61:5c:9c:aa:6d:03:c7: 9d:9b:e8:56:67:b3:5e:f9:3b:72:f8:46:59:be:9b:3b: 33:14:88:f5:de:5e:d5:06:08:5c:a1:f2:c4:0e:aa:57: 83:87:8c:62:3c:82:05:a7:44:f7:81:cf:09:11:a9:ec: 9c:9f:24:d4:f3:91:17:b5:75:2c:02:96:ee:8f:f4:0a: ec:b9:cf:57:39:23:59:0a:e1:bd:3e:e5:1a:9a:c7:08: cf:f7:cc:6b:24:bc:1e:d2:1e:c0:08:01:0d:61:27:21: a2:ba:c1:45:7d:b5:4a:4c:26:3c:91:6e:0a:08:ce:0b Fingerprint (SHA-256): 2C:14:48:9F:4D:70:FD:DC:63:C3:1F:78:53:06:CE:D7:24:75:CE:7B:5B:39:ED:2A:AB:81:16:22:66:49:98:FF Fingerprint (SHA1): 6B:3B:E0:17:3A:A9:3A:6C:30:16:CC:91:6B:7E:3E:2A:2B:46:B8:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201989 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320201990 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320201991 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 320201992 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320201993 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 320201994 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 320201995 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 320201996 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 320201997 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201989 (0x1315e505) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:48 2023 Not After : Mon Mar 20 20:21:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:b9:bd:b4:df:4e:e4:59:5c:fe:65:0d:be:27:69:8c: a0:d4:61:d1:2a:72:51:6d:c6:18:32:cf:b8:9f:55:d0: fc:69:34:ec:fe:91:07:be:20:cf:39:5c:52:bc:a1:91: 17:85:10:c9:1a:92:bb:c0:6d:34:53:9d:2a:2a:65:47: 1f:22:ba:af:68:38:36:6a:37:a8:02:93:a6:76:10:2d: a1:af:08:e6:a7:e6:97:09:dc:ce:17:3b:06:1e:31:81: 44:b7:23:05:fe:46:eb:bb:bf:24:41:4b:79:00:f0:94: 0b:ad:87:b1:f1:38:c5:26:f4:ed:87:f4:1e:c7:c0:03: 55:c1:48:c9:c9:bd:d3:3f:a5:06:64:2e:32:1a:1a:39: 15:14:c2:94:37:64:38:21:78:fb:0f:1d:63:07:18:f7: af:ca:b4:73:f8:c3:27:7c:95:25:2f:bd:cf:ce:43:02: 58:db:e6:80:fa:0d:72:69:3c:b1:ff:b8:03:a2:2f:c3: 90:26:e2:fb:e7:90:8c:31:6a:a9:a4:51:60:3e:8a:96: 21:6e:56:1c:04:30:9e:18:d2:b6:09:79:e8:34:3e:f3: a8:c7:0b:3c:fb:1f:8f:f2:f1:57:0a:b7:b4:95:fc:b8: 5b:f9:3a:14:e4:5c:6e:1d:4c:9f:64:2c:4b:2b:72:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:49:cd:20:de:cd:7e:1f:3f:16:ff:d6:e1: 81:dd:49:2d:c1:c4:f1:cd:e1:e1:f8:0f:fc:de:43:18: 02:1c:48:8a:42:d3:f2:f6:e8:08:62:ae:0e:16:6f:37: af:0d:49:a9:4c:a8:81:4d:ea:a8:55:98:96:73 Fingerprint (SHA-256): 0A:85:5F:03:02:DA:03:41:FA:B6:F6:4E:07:7A:A7:C0:18:6C:E9:CF:D6:E1:DE:FE:21:EF:4D:75:0B:A2:8F:27 Fingerprint (SHA1): 7B:AF:D9:89:68:48:3B:C7:BE:28:07:61:7B:BE:98:87:C2:B0:D6:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201989 (0x1315e505) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:48 2023 Not After : Mon Mar 20 20:21:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:b9:bd:b4:df:4e:e4:59:5c:fe:65:0d:be:27:69:8c: a0:d4:61:d1:2a:72:51:6d:c6:18:32:cf:b8:9f:55:d0: fc:69:34:ec:fe:91:07:be:20:cf:39:5c:52:bc:a1:91: 17:85:10:c9:1a:92:bb:c0:6d:34:53:9d:2a:2a:65:47: 1f:22:ba:af:68:38:36:6a:37:a8:02:93:a6:76:10:2d: a1:af:08:e6:a7:e6:97:09:dc:ce:17:3b:06:1e:31:81: 44:b7:23:05:fe:46:eb:bb:bf:24:41:4b:79:00:f0:94: 0b:ad:87:b1:f1:38:c5:26:f4:ed:87:f4:1e:c7:c0:03: 55:c1:48:c9:c9:bd:d3:3f:a5:06:64:2e:32:1a:1a:39: 15:14:c2:94:37:64:38:21:78:fb:0f:1d:63:07:18:f7: af:ca:b4:73:f8:c3:27:7c:95:25:2f:bd:cf:ce:43:02: 58:db:e6:80:fa:0d:72:69:3c:b1:ff:b8:03:a2:2f:c3: 90:26:e2:fb:e7:90:8c:31:6a:a9:a4:51:60:3e:8a:96: 21:6e:56:1c:04:30:9e:18:d2:b6:09:79:e8:34:3e:f3: a8:c7:0b:3c:fb:1f:8f:f2:f1:57:0a:b7:b4:95:fc:b8: 5b:f9:3a:14:e4:5c:6e:1d:4c:9f:64:2c:4b:2b:72:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:49:cd:20:de:cd:7e:1f:3f:16:ff:d6:e1: 81:dd:49:2d:c1:c4:f1:cd:e1:e1:f8:0f:fc:de:43:18: 02:1c:48:8a:42:d3:f2:f6:e8:08:62:ae:0e:16:6f:37: af:0d:49:a9:4c:a8:81:4d:ea:a8:55:98:96:73 Fingerprint (SHA-256): 0A:85:5F:03:02:DA:03:41:FA:B6:F6:4E:07:7A:A7:C0:18:6C:E9:CF:D6:E1:DE:FE:21:EF:4D:75:0B:A2:8F:27 Fingerprint (SHA1): 7B:AF:D9:89:68:48:3B:C7:BE:28:07:61:7B:BE:98:87:C2:B0:D6:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201989 (0x1315e505) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:48 2023 Not After : Mon Mar 20 20:21:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:b9:bd:b4:df:4e:e4:59:5c:fe:65:0d:be:27:69:8c: a0:d4:61:d1:2a:72:51:6d:c6:18:32:cf:b8:9f:55:d0: fc:69:34:ec:fe:91:07:be:20:cf:39:5c:52:bc:a1:91: 17:85:10:c9:1a:92:bb:c0:6d:34:53:9d:2a:2a:65:47: 1f:22:ba:af:68:38:36:6a:37:a8:02:93:a6:76:10:2d: a1:af:08:e6:a7:e6:97:09:dc:ce:17:3b:06:1e:31:81: 44:b7:23:05:fe:46:eb:bb:bf:24:41:4b:79:00:f0:94: 0b:ad:87:b1:f1:38:c5:26:f4:ed:87:f4:1e:c7:c0:03: 55:c1:48:c9:c9:bd:d3:3f:a5:06:64:2e:32:1a:1a:39: 15:14:c2:94:37:64:38:21:78:fb:0f:1d:63:07:18:f7: af:ca:b4:73:f8:c3:27:7c:95:25:2f:bd:cf:ce:43:02: 58:db:e6:80:fa:0d:72:69:3c:b1:ff:b8:03:a2:2f:c3: 90:26:e2:fb:e7:90:8c:31:6a:a9:a4:51:60:3e:8a:96: 21:6e:56:1c:04:30:9e:18:d2:b6:09:79:e8:34:3e:f3: a8:c7:0b:3c:fb:1f:8f:f2:f1:57:0a:b7:b4:95:fc:b8: 5b:f9:3a:14:e4:5c:6e:1d:4c:9f:64:2c:4b:2b:72:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:49:cd:20:de:cd:7e:1f:3f:16:ff:d6:e1: 81:dd:49:2d:c1:c4:f1:cd:e1:e1:f8:0f:fc:de:43:18: 02:1c:48:8a:42:d3:f2:f6:e8:08:62:ae:0e:16:6f:37: af:0d:49:a9:4c:a8:81:4d:ea:a8:55:98:96:73 Fingerprint (SHA-256): 0A:85:5F:03:02:DA:03:41:FA:B6:F6:4E:07:7A:A7:C0:18:6C:E9:CF:D6:E1:DE:FE:21:EF:4D:75:0B:A2:8F:27 Fingerprint (SHA1): 7B:AF:D9:89:68:48:3B:C7:BE:28:07:61:7B:BE:98:87:C2:B0:D6:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201989 (0x1315e505) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:48 2023 Not After : Mon Mar 20 20:21:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:b9:bd:b4:df:4e:e4:59:5c:fe:65:0d:be:27:69:8c: a0:d4:61:d1:2a:72:51:6d:c6:18:32:cf:b8:9f:55:d0: fc:69:34:ec:fe:91:07:be:20:cf:39:5c:52:bc:a1:91: 17:85:10:c9:1a:92:bb:c0:6d:34:53:9d:2a:2a:65:47: 1f:22:ba:af:68:38:36:6a:37:a8:02:93:a6:76:10:2d: a1:af:08:e6:a7:e6:97:09:dc:ce:17:3b:06:1e:31:81: 44:b7:23:05:fe:46:eb:bb:bf:24:41:4b:79:00:f0:94: 0b:ad:87:b1:f1:38:c5:26:f4:ed:87:f4:1e:c7:c0:03: 55:c1:48:c9:c9:bd:d3:3f:a5:06:64:2e:32:1a:1a:39: 15:14:c2:94:37:64:38:21:78:fb:0f:1d:63:07:18:f7: af:ca:b4:73:f8:c3:27:7c:95:25:2f:bd:cf:ce:43:02: 58:db:e6:80:fa:0d:72:69:3c:b1:ff:b8:03:a2:2f:c3: 90:26:e2:fb:e7:90:8c:31:6a:a9:a4:51:60:3e:8a:96: 21:6e:56:1c:04:30:9e:18:d2:b6:09:79:e8:34:3e:f3: a8:c7:0b:3c:fb:1f:8f:f2:f1:57:0a:b7:b4:95:fc:b8: 5b:f9:3a:14:e4:5c:6e:1d:4c:9f:64:2c:4b:2b:72:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:49:cd:20:de:cd:7e:1f:3f:16:ff:d6:e1: 81:dd:49:2d:c1:c4:f1:cd:e1:e1:f8:0f:fc:de:43:18: 02:1c:48:8a:42:d3:f2:f6:e8:08:62:ae:0e:16:6f:37: af:0d:49:a9:4c:a8:81:4d:ea:a8:55:98:96:73 Fingerprint (SHA-256): 0A:85:5F:03:02:DA:03:41:FA:B6:F6:4E:07:7A:A7:C0:18:6C:E9:CF:D6:E1:DE:FE:21:EF:4D:75:0B:A2:8F:27 Fingerprint (SHA1): 7B:AF:D9:89:68:48:3B:C7:BE:28:07:61:7B:BE:98:87:C2:B0:D6:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320202158Z nextupdate=20240320202158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 20:21:58 2023 Next Update: Wed Mar 20 20:21:58 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202158Z nextupdate=20240320202158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:21:58 2023 Next Update: Wed Mar 20 20:21:58 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320202158Z nextupdate=20240320202158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 20:21:58 2023 Next Update: Wed Mar 20 20:21:58 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320202158Z nextupdate=20240320202158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 20:21:58 2023 Next Update: Wed Mar 20 20:21:58 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320202159Z addcert 14 20230320202159Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 20:21:59 2023 Next Update: Wed Mar 20 20:21:58 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 20 20:21:59 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202200Z addcert 15 20230320202200Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:22:00 2023 Next Update: Wed Mar 20 20:21:58 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 20 20:22:00 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:53 2023 Not After : Mon Mar 20 20:21:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:f8:24:88:0a:72:f9:e9:d7:b7:46:e8:58:0a:32:00: 3e:86:66:05:1d:09:60:6e:fb:b3:64:25:12:87:97:c7: b5:78:8e:7d:73:07:da:3d:28:00:be:07:9b:9a:ba:8e: e8:82:15:6e:4d:04:28:c2:e5:eb:93:ad:49:39:09:29: 61:90:02:4c:7d:4d:fd:d8:f0:d6:da:95:b1:99:f5:d4: f8:a1:78:96:ef:76:25:78:ab:f7:45:90:69:3e:bd:4f: 46:c3:3b:71:65:1e:59:4e:0f:af:fc:2e:20:38:b3:f8: a7:8b:cf:44:b0:e8:13:7a:56:50:db:74:4e:c2:24:ba: d2:ac:85:29:d4:51:e6:07:8b:36:5f:17:53:ea:77:71: 31:d2:9f:14:7c:96:8d:3e:5e:01:89:c5:b7:66:a0:1b: e3:1a:0e:20:c3:c2:eb:0b:74:95:4c:8f:9c:db:ca:72: d5:ec:70:42:4f:e3:89:12:3c:27:b6:2f:78:82:b1:56: e8:a8:e5:3e:1a:94:7d:97:65:12:06:72:8f:7f:49:98: f2:c0:27:24:bd:47:fe:dd:61:4d:cb:9a:17:a1:52:2a: 3e:8c:bc:a4:b7:ad:7a:1d:4e:f3:1a:c0:66:74:4f:fe: 45:bc:7e:1f:31:fc:be:73:ad:b5:71:de:79:eb:f6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:4b:b3:27:4f:d6:c8:8a:01:51:d0:88:5e:9f:a8:e8: c1:43:ec:c6:c0:18:5d:35:a3:24:c9:80:50:bd:64:72: d1:1b:ed:cd:c3:5a:e1:41:30:68:c8:3b:39:80:18:8c: d3:f1:70:b7:d9:cd:c3:9a:2a:99:f6:10:3c:fb:f6:46: 65:59:ac:8a:39:aa:42:c5:ba:f2:22:88:60:80:18:e4: bc:49:dc:01:b1:a0:80:e1:15:dd:49:2f:f6:07:8e:08: 34:f7:a6:5f:47:73:71:e2:db:37:7c:3c:19:64:52:5e: d5:2e:1f:f7:65:9d:2e:8e:be:9b:20:aa:cb:42:21:f5: fb:81:f9:5f:3e:66:01:7e:02:2f:1d:6c:0c:53:68:5a: d8:32:0a:af:7a:5b:61:5b:08:a4:75:7b:c5:99:31:94: 0c:b0:7f:77:35:a9:06:93:45:40:2b:7b:13:79:1c:87: 83:9f:ea:01:11:28:24:fc:2b:2f:9e:0c:ff:29:ef:18: d3:14:d2:a8:dc:6d:c4:86:ef:5b:11:b5:d8:b9:22:d1: 06:50:c1:ab:41:b6:e7:05:3a:dd:57:85:4e:17:c2:a4: 08:a4:70:85:a7:a3:98:2a:1c:e1:57:ff:42:b7:b2:86: 3f:da:d4:0d:21:c6:bc:13:25:04:91:6a:34:c0:d3:c2 Fingerprint (SHA-256): DB:75:08:21:26:3C:9E:AE:FE:21:60:31:27:E4:3F:F4:56:9C:95:DB:45:ED:CE:92:3F:0C:A2:3C:1E:3A:62:4D Fingerprint (SHA1): D6:AD:10:8E:50:9C:95:C3:0E:11:20:2A:5E:AC:31:1A:BF:DE:4B:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:21:53 2023 Not After : Mon Mar 20 20:21:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:f8:24:88:0a:72:f9:e9:d7:b7:46:e8:58:0a:32:00: 3e:86:66:05:1d:09:60:6e:fb:b3:64:25:12:87:97:c7: b5:78:8e:7d:73:07:da:3d:28:00:be:07:9b:9a:ba:8e: e8:82:15:6e:4d:04:28:c2:e5:eb:93:ad:49:39:09:29: 61:90:02:4c:7d:4d:fd:d8:f0:d6:da:95:b1:99:f5:d4: f8:a1:78:96:ef:76:25:78:ab:f7:45:90:69:3e:bd:4f: 46:c3:3b:71:65:1e:59:4e:0f:af:fc:2e:20:38:b3:f8: a7:8b:cf:44:b0:e8:13:7a:56:50:db:74:4e:c2:24:ba: d2:ac:85:29:d4:51:e6:07:8b:36:5f:17:53:ea:77:71: 31:d2:9f:14:7c:96:8d:3e:5e:01:89:c5:b7:66:a0:1b: e3:1a:0e:20:c3:c2:eb:0b:74:95:4c:8f:9c:db:ca:72: d5:ec:70:42:4f:e3:89:12:3c:27:b6:2f:78:82:b1:56: e8:a8:e5:3e:1a:94:7d:97:65:12:06:72:8f:7f:49:98: f2:c0:27:24:bd:47:fe:dd:61:4d:cb:9a:17:a1:52:2a: 3e:8c:bc:a4:b7:ad:7a:1d:4e:f3:1a:c0:66:74:4f:fe: 45:bc:7e:1f:31:fc:be:73:ad:b5:71:de:79:eb:f6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:4b:b3:27:4f:d6:c8:8a:01:51:d0:88:5e:9f:a8:e8: c1:43:ec:c6:c0:18:5d:35:a3:24:c9:80:50:bd:64:72: d1:1b:ed:cd:c3:5a:e1:41:30:68:c8:3b:39:80:18:8c: d3:f1:70:b7:d9:cd:c3:9a:2a:99:f6:10:3c:fb:f6:46: 65:59:ac:8a:39:aa:42:c5:ba:f2:22:88:60:80:18:e4: bc:49:dc:01:b1:a0:80:e1:15:dd:49:2f:f6:07:8e:08: 34:f7:a6:5f:47:73:71:e2:db:37:7c:3c:19:64:52:5e: d5:2e:1f:f7:65:9d:2e:8e:be:9b:20:aa:cb:42:21:f5: fb:81:f9:5f:3e:66:01:7e:02:2f:1d:6c:0c:53:68:5a: d8:32:0a:af:7a:5b:61:5b:08:a4:75:7b:c5:99:31:94: 0c:b0:7f:77:35:a9:06:93:45:40:2b:7b:13:79:1c:87: 83:9f:ea:01:11:28:24:fc:2b:2f:9e:0c:ff:29:ef:18: d3:14:d2:a8:dc:6d:c4:86:ef:5b:11:b5:d8:b9:22:d1: 06:50:c1:ab:41:b6:e7:05:3a:dd:57:85:4e:17:c2:a4: 08:a4:70:85:a7:a3:98:2a:1c:e1:57:ff:42:b7:b2:86: 3f:da:d4:0d:21:c6:bc:13:25:04:91:6a:34:c0:d3:c2 Fingerprint (SHA-256): DB:75:08:21:26:3C:9E:AE:FE:21:60:31:27:E4:3F:F4:56:9C:95:DB:45:ED:CE:92:3F:0C:A2:3C:1E:3A:62:4D Fingerprint (SHA1): D6:AD:10:8E:50:9C:95:C3:0E:11:20:2A:5E:AC:31:1A:BF:DE:4B:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320201998 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 320201999 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201755.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201728.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201755.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 320202000 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201755.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201729.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 320202001 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201755.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201730.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320201755.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320201731.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320202207Z nextupdate=20240320202207Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 20:22:07 2023 Next Update: Wed Mar 20 20:22:07 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202207Z nextupdate=20240320202207Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:22:07 2023 Next Update: Wed Mar 20 20:22:07 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320202207Z nextupdate=20240320202207Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 20:22:07 2023 Next Update: Wed Mar 20 20:22:07 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320202208Z nextupdate=20240320202208Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 20:22:08 2023 Next Update: Wed Mar 20 20:22:08 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202209Z addcert 20 20230320202209Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:22:09 2023 Next Update: Wed Mar 20 20:22:07 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 20:22:09 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320202210Z addcert 40 20230320202210Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 20:22:10 2023 Next Update: Wed Mar 20 20:22:07 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 20:22:09 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 20:22:10 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201998 (0x1315e50e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:22:02 2023 Not After : Mon Mar 20 20:22:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ec:da:d7:3e:4a:fb:bc:dd:74:8a:eb:a1:3c:81:47: c6:a7:00:cd:f1:d1:6d:88:23:24:6e:48:81:1c:cb:01: 6d:25:3b:67:82:82:c6:9b:38:8d:e3:06:b0:42:fe:37: 6e:2a:63:07:17:2a:26:51:68:27:e8:8f:49:27:bf:89: 23:e2:d1:27:51:72:f5:f9:40:84:96:0c:02:51:0c:de: 19:a6:87:9c:14:b1:9d:33:94:d1:64:12:fe:c1:43:9a: e7:7d:94:0a:f3:3d:55:db:1a:51:33:43:03:50:f0:cd: 18:5b:5a:ba:36:14:d4:31:73:08:7c:69:6a:c9:80:fe: 74:f1:26:70:fb:57:a2:c4:83:6a:4f:e1:69:87:eb:02: c9:24:5a:48:30:58:81:0e:c7:69:fb:e4:da:9c:33:ed: 50:c8:fa:57:19:db:ef:0d:9f:e6:b0:a1:5f:53:09:1e: 3c:21:e6:8b:8e:91:15:1e:81:dd:47:7f:24:f7:01:6f: 61:cd:33:3d:93:cc:11:ef:ec:4a:c6:df:3b:3b:e9:e1: 1b:a9:0c:02:b3:8c:1f:de:50:bc:69:94:aa:e4:ef:b0: d0:01:cf:bf:fc:ba:6f:e1:40:e8:70:37:6e:a7:b9:f7: a7:f2:8f:8e:1d:dc:62:16:e6:f0:aa:5a:72:18:fc:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:16:1a:3b:3c:03:21:38:66:66:ab:31:e2:66:7a:a3: 59:ce:3c:88:2b:25:f0:fc:89:63:52:d7:0a:8e:f0:49: 1f:54:bf:a8:4b:b8:0c:83:2b:59:dd:a3:d4:0c:9f:84: 43:e8:7a:8d:2c:de:01:52:0e:ca:68:af:b0:c5:d2:2b: 87:6e:7c:f7:d3:3b:78:ca:d7:b2:3c:eb:63:f4:f7:1a: 89:f1:6c:44:80:bf:30:0d:0f:32:7b:a0:37:68:0e:97: ea:b8:63:56:e5:f0:76:a9:67:9d:a1:75:7e:72:f2:0f: bc:1b:09:23:06:23:04:1b:c5:3b:0a:e7:c2:87:ac:08: a7:04:78:4a:c1:3e:4e:4d:e9:12:55:f5:08:8c:17:8c: 0a:c6:1c:ad:fd:0e:ad:c1:19:f1:c2:b9:f7:af:d2:f7: a9:8d:ae:8a:e9:2a:db:f6:34:de:2e:91:70:07:41:0e: a8:a7:5d:21:26:f2:e3:ee:b1:47:ac:8c:2d:b9:c8:90: 07:e3:48:92:21:db:cd:fc:40:89:9d:b1:50:17:eb:6a: d0:94:d4:3d:73:14:06:bd:51:5f:51:73:49:b5:82:a5: a4:25:c3:e6:16:82:a7:f2:53:09:74:1f:5b:b5:bd:da: 3f:f6:08:97:f9:a0:95:e5:a2:e1:fc:e7:d1:b8:b8:27 Fingerprint (SHA-256): EC:68:E7:EB:B8:D1:58:B1:3C:BE:05:E8:8A:DF:32:93:31:9F:4B:41:B0:48:52:3E:3E:C2:40:8E:C7:D5:52:35 Fingerprint (SHA1): 8A:80:A1:3D:CF:44:D4:65:A8:77:A3:49:47:2F:E9:81:60:14:EA:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320201998 (0x1315e50e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 20:22:02 2023 Not After : Mon Mar 20 20:22:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ec:da:d7:3e:4a:fb:bc:dd:74:8a:eb:a1:3c:81:47: c6:a7:00:cd:f1:d1:6d:88:23:24:6e:48:81:1c:cb:01: 6d:25:3b:67:82:82:c6:9b:38:8d:e3:06:b0:42:fe:37: 6e:2a:63:07:17:2a:26:51:68:27:e8:8f:49:27:bf:89: 23:e2:d1:27:51:72:f5:f9:40:84:96:0c:02:51:0c:de: 19:a6:87:9c:14:b1:9d:33:94:d1:64:12:fe:c1:43:9a: e7:7d:94:0a:f3:3d:55:db:1a:51:33:43:03:50:f0:cd: 18:5b:5a:ba:36:14:d4:31:73:08:7c:69:6a:c9:80:fe: 74:f1:26:70:fb:57:a2:c4:83:6a:4f:e1:69:87:eb:02: c9:24:5a:48:30:58:81:0e:c7:69:fb:e4:da:9c:33:ed: 50:c8:fa:57:19:db:ef:0d:9f:e6:b0:a1:5f:53:09:1e: 3c:21:e6:8b:8e:91:15:1e:81:dd:47:7f:24:f7:01:6f: 61:cd:33:3d:93:cc:11:ef:ec:4a:c6:df:3b:3b:e9:e1: 1b:a9:0c:02:b3:8c:1f:de:50:bc:69:94:aa:e4:ef:b0: d0:01:cf:bf:fc:ba:6f:e1:40:e8:70:37:6e:a7:b9:f7: a7:f2:8f:8e:1d:dc:62:16:e6:f0:aa:5a:72:18:fc:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:16:1a:3b:3c:03:21:38:66:66:ab:31:e2:66:7a:a3: 59:ce:3c:88:2b:25:f0:fc:89:63:52:d7:0a:8e:f0:49: 1f:54:bf:a8:4b:b8:0c:83:2b:59:dd:a3:d4:0c:9f:84: 43:e8:7a:8d:2c:de:01:52:0e:ca:68:af:b0:c5:d2:2b: 87:6e:7c:f7:d3:3b:78:ca:d7:b2:3c:eb:63:f4:f7:1a: 89:f1:6c:44:80:bf:30:0d:0f:32:7b:a0:37:68:0e:97: ea:b8:63:56:e5:f0:76:a9:67:9d:a1:75:7e:72:f2:0f: bc:1b:09:23:06:23:04:1b:c5:3b:0a:e7:c2:87:ac:08: a7:04:78:4a:c1:3e:4e:4d:e9:12:55:f5:08:8c:17:8c: 0a:c6:1c:ad:fd:0e:ad:c1:19:f1:c2:b9:f7:af:d2:f7: a9:8d:ae:8a:e9:2a:db:f6:34:de:2e:91:70:07:41:0e: a8:a7:5d:21:26:f2:e3:ee:b1:47:ac:8c:2d:b9:c8:90: 07:e3:48:92:21:db:cd:fc:40:89:9d:b1:50:17:eb:6a: d0:94:d4:3d:73:14:06:bd:51:5f:51:73:49:b5:82:a5: a4:25:c3:e6:16:82:a7:f2:53:09:74:1f:5b:b5:bd:da: 3f:f6:08:97:f9:a0:95:e5:a2:e1:fc:e7:d1:b8:b8:27 Fingerprint (SHA-256): EC:68:E7:EB:B8:D1:58:B1:3C:BE:05:E8:8A:DF:32:93:31:9F:4B:41:B0:48:52:3E:3E:C2:40:8E:C7:D5:52:35 Fingerprint (SHA1): 8A:80:A1:3D:CF:44:D4:65:A8:77:A3:49:47:2F:E9:81:60:14:EA:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320202002 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320202003 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320202004 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 320202005 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 320202006 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 320202007 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 320202008 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202002 (0x1315e512) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:22:11 2023 Not After : Mon Mar 20 20:22:11 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:09:ae:19:c8:d8:4c:26:86:d8:97:69:70:c0:93:e8: 0b:13:28:23:d4:fc:bb:6a:a3:43:f3:75:6b:4d:00:96: f7:02:ed:31:ca:bd:7e:9e:bb:0e:9d:24:a8:0d:a5:96: 80:b2:64:ed:20:65:5a:e0:cf:87:fd:a0:87:43:6d:13: 03:3a:6d:24:99:1a:9c:e7:3c:81:d7:44:80:90:cc:c3: 1f:1e:30:0c:0a:d4:f9:0d:70:25:5e:d6:e7:d6:e3:5f: f4:7b:71:57:94:2d:b6:d6:05:e6:b3:86:76:f6:2f:fe: 7c:ac:02:1c:03:11:ca:88:36:6e:9f:48:aa:87:19:31: ee:e7:30:73:18:02:ea:ec:93:9a:84:c2:b8:53:f2:44: b1:27:f8:a2:9d:ae:3e:63:6a:29:61:a8:88:e9:40:93: 6f:e2:4b:25:ad:d2:36:97:33:df:21:a3:38:49:54:8c: 3f:33:51:f0:33:1a:81:43:9e:04:71:a2:9c:1b:3b:21: 8a:79:9c:c4:e8:90:0e:6f:56:09:7a:b5:6d:36:08:2c: 24:f4:48:ee:69:fc:1d:ba:e3:90:ad:c6:d7:b2:7f:15: ae:6f:c2:3a:24:a4:f1:48:92:ac:06:fb:e6:18:fe:c2: d6:9c:09:d5:1c:b7:41:f2:27:2c:46:c0:0f:ee:56:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:f5:12:52:cc:d9:66:30:77:70:9c:26:d1:28:2d:84: d4:f0:54:51:d2:2c:b2:1d:fb:d1:5c:b0:cb:99:46:9a: a3:81:10:be:93:5e:9a:2f:df:2a:14:bf:8e:ab:4c:53: 0e:67:74:fc:af:37:e3:e1:ac:30:0d:37:6c:37:ea:06: 82:56:a0:34:64:5d:75:b7:26:e4:66:2e:be:a9:98:6e: 47:6d:e2:ad:b9:f2:70:ee:41:95:6b:a3:d9:de:cb:0e: 4c:31:cc:c5:04:6f:36:7b:6d:32:63:b8:cc:ba:51:a7: 0b:ef:88:09:8c:00:82:ed:b7:d4:8c:ef:b2:52:0d:af: bf:1f:fd:ff:7d:bc:3e:78:a0:c8:30:1f:f6:df:6d:5a: 6a:a4:84:23:ef:83:8a:dc:ad:d7:7e:6c:37:d4:2e:0e: 91:1a:a8:a5:90:a5:b3:f2:26:32:ba:40:d5:d4:23:e2: 9e:cb:28:73:be:c6:4d:ba:c5:b8:0b:dd:47:35:05:c8: cf:44:e7:6b:57:6f:4c:d7:1b:3e:e8:61:82:1e:17:23: 3d:a4:10:39:a5:47:24:aa:6a:18:ab:69:02:68:cc:fa: 54:a4:e3:59:1e:21:b6:ff:f5:fa:cc:81:8c:a8:ee:7a: 65:23:2f:c0:9c:f6:bc:3c:50:06:c4:d9:f3:33:64:01 Fingerprint (SHA-256): 59:6E:2F:AD:1C:AD:14:DE:F6:C6:6C:C4:01:35:D9:2F:26:3B:7A:9C:A7:93:75:96:E1:8E:BC:17:4E:15:A1:BB Fingerprint (SHA1): C5:9D:80:B2:07:C7:50:82:A0:C1:36:47:E3:6D:67:9D:E2:E4:F8:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202004 (0x1315e514) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:22:13 2023 Not After : Mon Mar 20 20:22:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:f0:0a:e4:45:43:cf:d5:e7:30:9a:a9:5d:77:ac:e0: 2a:03:20:df:8c:ad:1e:f1:90:7b:e8:d5:49:da:c0:1a: c1:6c:69:f3:35:aa:85:c5:04:c0:78:7b:26:33:d0:9c: fd:b0:ed:22:c1:1a:42:2c:20:c7:57:ed:b0:2b:bf:56: 14:c9:15:0b:6e:6f:18:d7:a2:15:de:fe:61:59:1c:c8: 80:82:f2:59:e1:94:10:95:be:0f:7e:88:2f:61:e0:3d: 90:46:d2:9c:38:c6:d8:51:53:67:bb:7e:71:8f:3d:ae: fd:e7:fe:bd:61:6d:2d:4d:07:01:92:14:38:6f:17:e7: 55:d0:bf:e4:43:77:1e:f8:65:de:14:4f:1f:a8:09:ad: c9:58:13:7d:7b:2b:4d:fb:ce:d4:2b:d1:d0:f1:6f:30: 62:ba:92:3a:17:94:0d:3b:22:77:3a:95:c8:a1:29:fc: 03:5e:d0:29:98:a2:6f:67:a0:63:7c:3e:8a:e4:b0:33: ae:ba:4c:b8:a3:6f:1c:03:52:74:43:08:4e:32:69:bd: 3b:8e:5d:e8:39:82:8f:20:79:7b:4b:52:37:c1:39:43: 94:fd:97:2c:89:fa:43:95:c2:f2:07:df:19:2f:36:7a: 55:ff:cd:6a:02:b5:e1:d9:79:84:06:47:b6:83:78:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:80:dd:ea:80:07:5d:55:a3:2b:23:d9:bd:a8:01:75: 26:95:35:0c:d4:a8:e1:e4:75:f9:9f:69:50:6b:05:a7: 6e:d8:30:db:7f:26:be:57:0a:7e:47:76:01:50:d0:03: a4:61:16:0a:99:99:12:04:ba:cf:d6:8c:16:b2:1a:d6: 2b:90:1a:51:dd:8f:b0:86:2c:c2:5e:a8:53:c3:73:00: 9d:4b:07:3a:e1:89:83:af:af:5a:15:e6:15:37:df:92: 71:d4:db:97:0e:f0:17:46:67:58:d4:4f:c7:18:3b:66: ed:70:33:3d:47:a1:7b:24:4b:22:91:ff:39:cb:1c:4b: 73:e4:52:2e:bc:0e:73:b3:9f:3f:6d:bd:b4:9d:ef:45: de:95:63:63:2d:f9:23:b4:ab:40:23:1b:bb:f2:2e:ed: c2:06:43:d9:81:23:52:15:1f:29:ca:11:d1:ed:72:dc: e8:18:78:a4:12:71:66:7d:4c:33:44:dc:e5:b9:28:61: 91:24:35:3e:73:6a:c9:fa:16:e8:4c:c9:32:1f:5a:85: c6:e2:60:b8:0f:14:50:2a:b1:ad:3e:fd:34:a2:a5:43: 14:9f:4c:fd:0e:0e:00:e9:dc:23:3d:bf:d7:56:6c:f5: 36:74:6d:96:e4:09:b5:44:5f:75:ae:1e:45:bd:47:17 Fingerprint (SHA-256): 06:4B:D7:D6:BF:A3:97:37:C8:96:CE:BF:94:84:89:AD:2C:A1:56:32:C7:EB:28:01:EF:3B:65:96:20:5E:82:67 Fingerprint (SHA1): E2:18:F6:FB:32:C6:10:5B:70:1D:CE:6E:B2:C8:17:8D:5A:54:B0:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202002 (0x1315e512) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:22:11 2023 Not After : Mon Mar 20 20:22:11 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:09:ae:19:c8:d8:4c:26:86:d8:97:69:70:c0:93:e8: 0b:13:28:23:d4:fc:bb:6a:a3:43:f3:75:6b:4d:00:96: f7:02:ed:31:ca:bd:7e:9e:bb:0e:9d:24:a8:0d:a5:96: 80:b2:64:ed:20:65:5a:e0:cf:87:fd:a0:87:43:6d:13: 03:3a:6d:24:99:1a:9c:e7:3c:81:d7:44:80:90:cc:c3: 1f:1e:30:0c:0a:d4:f9:0d:70:25:5e:d6:e7:d6:e3:5f: f4:7b:71:57:94:2d:b6:d6:05:e6:b3:86:76:f6:2f:fe: 7c:ac:02:1c:03:11:ca:88:36:6e:9f:48:aa:87:19:31: ee:e7:30:73:18:02:ea:ec:93:9a:84:c2:b8:53:f2:44: b1:27:f8:a2:9d:ae:3e:63:6a:29:61:a8:88:e9:40:93: 6f:e2:4b:25:ad:d2:36:97:33:df:21:a3:38:49:54:8c: 3f:33:51:f0:33:1a:81:43:9e:04:71:a2:9c:1b:3b:21: 8a:79:9c:c4:e8:90:0e:6f:56:09:7a:b5:6d:36:08:2c: 24:f4:48:ee:69:fc:1d:ba:e3:90:ad:c6:d7:b2:7f:15: ae:6f:c2:3a:24:a4:f1:48:92:ac:06:fb:e6:18:fe:c2: d6:9c:09:d5:1c:b7:41:f2:27:2c:46:c0:0f:ee:56:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:f5:12:52:cc:d9:66:30:77:70:9c:26:d1:28:2d:84: d4:f0:54:51:d2:2c:b2:1d:fb:d1:5c:b0:cb:99:46:9a: a3:81:10:be:93:5e:9a:2f:df:2a:14:bf:8e:ab:4c:53: 0e:67:74:fc:af:37:e3:e1:ac:30:0d:37:6c:37:ea:06: 82:56:a0:34:64:5d:75:b7:26:e4:66:2e:be:a9:98:6e: 47:6d:e2:ad:b9:f2:70:ee:41:95:6b:a3:d9:de:cb:0e: 4c:31:cc:c5:04:6f:36:7b:6d:32:63:b8:cc:ba:51:a7: 0b:ef:88:09:8c:00:82:ed:b7:d4:8c:ef:b2:52:0d:af: bf:1f:fd:ff:7d:bc:3e:78:a0:c8:30:1f:f6:df:6d:5a: 6a:a4:84:23:ef:83:8a:dc:ad:d7:7e:6c:37:d4:2e:0e: 91:1a:a8:a5:90:a5:b3:f2:26:32:ba:40:d5:d4:23:e2: 9e:cb:28:73:be:c6:4d:ba:c5:b8:0b:dd:47:35:05:c8: cf:44:e7:6b:57:6f:4c:d7:1b:3e:e8:61:82:1e:17:23: 3d:a4:10:39:a5:47:24:aa:6a:18:ab:69:02:68:cc:fa: 54:a4:e3:59:1e:21:b6:ff:f5:fa:cc:81:8c:a8:ee:7a: 65:23:2f:c0:9c:f6:bc:3c:50:06:c4:d9:f3:33:64:01 Fingerprint (SHA-256): 59:6E:2F:AD:1C:AD:14:DE:F6:C6:6C:C4:01:35:D9:2F:26:3B:7A:9C:A7:93:75:96:E1:8E:BC:17:4E:15:A1:BB Fingerprint (SHA1): C5:9D:80:B2:07:C7:50:82:A0:C1:36:47:E3:6D:67:9D:E2:E4:F8:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202002 (0x1315e512) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:22:11 2023 Not After : Mon Mar 20 20:22:11 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:09:ae:19:c8:d8:4c:26:86:d8:97:69:70:c0:93:e8: 0b:13:28:23:d4:fc:bb:6a:a3:43:f3:75:6b:4d:00:96: f7:02:ed:31:ca:bd:7e:9e:bb:0e:9d:24:a8:0d:a5:96: 80:b2:64:ed:20:65:5a:e0:cf:87:fd:a0:87:43:6d:13: 03:3a:6d:24:99:1a:9c:e7:3c:81:d7:44:80:90:cc:c3: 1f:1e:30:0c:0a:d4:f9:0d:70:25:5e:d6:e7:d6:e3:5f: f4:7b:71:57:94:2d:b6:d6:05:e6:b3:86:76:f6:2f:fe: 7c:ac:02:1c:03:11:ca:88:36:6e:9f:48:aa:87:19:31: ee:e7:30:73:18:02:ea:ec:93:9a:84:c2:b8:53:f2:44: b1:27:f8:a2:9d:ae:3e:63:6a:29:61:a8:88:e9:40:93: 6f:e2:4b:25:ad:d2:36:97:33:df:21:a3:38:49:54:8c: 3f:33:51:f0:33:1a:81:43:9e:04:71:a2:9c:1b:3b:21: 8a:79:9c:c4:e8:90:0e:6f:56:09:7a:b5:6d:36:08:2c: 24:f4:48:ee:69:fc:1d:ba:e3:90:ad:c6:d7:b2:7f:15: ae:6f:c2:3a:24:a4:f1:48:92:ac:06:fb:e6:18:fe:c2: d6:9c:09:d5:1c:b7:41:f2:27:2c:46:c0:0f:ee:56:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:f5:12:52:cc:d9:66:30:77:70:9c:26:d1:28:2d:84: d4:f0:54:51:d2:2c:b2:1d:fb:d1:5c:b0:cb:99:46:9a: a3:81:10:be:93:5e:9a:2f:df:2a:14:bf:8e:ab:4c:53: 0e:67:74:fc:af:37:e3:e1:ac:30:0d:37:6c:37:ea:06: 82:56:a0:34:64:5d:75:b7:26:e4:66:2e:be:a9:98:6e: 47:6d:e2:ad:b9:f2:70:ee:41:95:6b:a3:d9:de:cb:0e: 4c:31:cc:c5:04:6f:36:7b:6d:32:63:b8:cc:ba:51:a7: 0b:ef:88:09:8c:00:82:ed:b7:d4:8c:ef:b2:52:0d:af: bf:1f:fd:ff:7d:bc:3e:78:a0:c8:30:1f:f6:df:6d:5a: 6a:a4:84:23:ef:83:8a:dc:ad:d7:7e:6c:37:d4:2e:0e: 91:1a:a8:a5:90:a5:b3:f2:26:32:ba:40:d5:d4:23:e2: 9e:cb:28:73:be:c6:4d:ba:c5:b8:0b:dd:47:35:05:c8: cf:44:e7:6b:57:6f:4c:d7:1b:3e:e8:61:82:1e:17:23: 3d:a4:10:39:a5:47:24:aa:6a:18:ab:69:02:68:cc:fa: 54:a4:e3:59:1e:21:b6:ff:f5:fa:cc:81:8c:a8:ee:7a: 65:23:2f:c0:9c:f6:bc:3c:50:06:c4:d9:f3:33:64:01 Fingerprint (SHA-256): 59:6E:2F:AD:1C:AD:14:DE:F6:C6:6C:C4:01:35:D9:2F:26:3B:7A:9C:A7:93:75:96:E1:8E:BC:17:4E:15:A1:BB Fingerprint (SHA1): C5:9D:80:B2:07:C7:50:82:A0:C1:36:47:E3:6D:67:9D:E2:E4:F8:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202004 (0x1315e514) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 20:22:13 2023 Not After : Mon Mar 20 20:22:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:f0:0a:e4:45:43:cf:d5:e7:30:9a:a9:5d:77:ac:e0: 2a:03:20:df:8c:ad:1e:f1:90:7b:e8:d5:49:da:c0:1a: c1:6c:69:f3:35:aa:85:c5:04:c0:78:7b:26:33:d0:9c: fd:b0:ed:22:c1:1a:42:2c:20:c7:57:ed:b0:2b:bf:56: 14:c9:15:0b:6e:6f:18:d7:a2:15:de:fe:61:59:1c:c8: 80:82:f2:59:e1:94:10:95:be:0f:7e:88:2f:61:e0:3d: 90:46:d2:9c:38:c6:d8:51:53:67:bb:7e:71:8f:3d:ae: fd:e7:fe:bd:61:6d:2d:4d:07:01:92:14:38:6f:17:e7: 55:d0:bf:e4:43:77:1e:f8:65:de:14:4f:1f:a8:09:ad: c9:58:13:7d:7b:2b:4d:fb:ce:d4:2b:d1:d0:f1:6f:30: 62:ba:92:3a:17:94:0d:3b:22:77:3a:95:c8:a1:29:fc: 03:5e:d0:29:98:a2:6f:67:a0:63:7c:3e:8a:e4:b0:33: ae:ba:4c:b8:a3:6f:1c:03:52:74:43:08:4e:32:69:bd: 3b:8e:5d:e8:39:82:8f:20:79:7b:4b:52:37:c1:39:43: 94:fd:97:2c:89:fa:43:95:c2:f2:07:df:19:2f:36:7a: 55:ff:cd:6a:02:b5:e1:d9:79:84:06:47:b6:83:78:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:80:dd:ea:80:07:5d:55:a3:2b:23:d9:bd:a8:01:75: 26:95:35:0c:d4:a8:e1:e4:75:f9:9f:69:50:6b:05:a7: 6e:d8:30:db:7f:26:be:57:0a:7e:47:76:01:50:d0:03: a4:61:16:0a:99:99:12:04:ba:cf:d6:8c:16:b2:1a:d6: 2b:90:1a:51:dd:8f:b0:86:2c:c2:5e:a8:53:c3:73:00: 9d:4b:07:3a:e1:89:83:af:af:5a:15:e6:15:37:df:92: 71:d4:db:97:0e:f0:17:46:67:58:d4:4f:c7:18:3b:66: ed:70:33:3d:47:a1:7b:24:4b:22:91:ff:39:cb:1c:4b: 73:e4:52:2e:bc:0e:73:b3:9f:3f:6d:bd:b4:9d:ef:45: de:95:63:63:2d:f9:23:b4:ab:40:23:1b:bb:f2:2e:ed: c2:06:43:d9:81:23:52:15:1f:29:ca:11:d1:ed:72:dc: e8:18:78:a4:12:71:66:7d:4c:33:44:dc:e5:b9:28:61: 91:24:35:3e:73:6a:c9:fa:16:e8:4c:c9:32:1f:5a:85: c6:e2:60:b8:0f:14:50:2a:b1:ad:3e:fd:34:a2:a5:43: 14:9f:4c:fd:0e:0e:00:e9:dc:23:3d:bf:d7:56:6c:f5: 36:74:6d:96:e4:09:b5:44:5f:75:ae:1e:45:bd:47:17 Fingerprint (SHA-256): 06:4B:D7:D6:BF:A3:97:37:C8:96:CE:BF:94:84:89:AD:2C:A1:56:32:C7:EB:28:01:EF:3B:65:96:20:5E:82:67 Fingerprint (SHA1): E2:18:F6:FB:32:C6:10:5B:70:1D:CE:6E:B2:C8:17:8D:5A:54:B0:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202002 (0x1315e512) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:22:11 2023 Not After : Mon Mar 20 20:22:11 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:09:ae:19:c8:d8:4c:26:86:d8:97:69:70:c0:93:e8: 0b:13:28:23:d4:fc:bb:6a:a3:43:f3:75:6b:4d:00:96: f7:02:ed:31:ca:bd:7e:9e:bb:0e:9d:24:a8:0d:a5:96: 80:b2:64:ed:20:65:5a:e0:cf:87:fd:a0:87:43:6d:13: 03:3a:6d:24:99:1a:9c:e7:3c:81:d7:44:80:90:cc:c3: 1f:1e:30:0c:0a:d4:f9:0d:70:25:5e:d6:e7:d6:e3:5f: f4:7b:71:57:94:2d:b6:d6:05:e6:b3:86:76:f6:2f:fe: 7c:ac:02:1c:03:11:ca:88:36:6e:9f:48:aa:87:19:31: ee:e7:30:73:18:02:ea:ec:93:9a:84:c2:b8:53:f2:44: b1:27:f8:a2:9d:ae:3e:63:6a:29:61:a8:88:e9:40:93: 6f:e2:4b:25:ad:d2:36:97:33:df:21:a3:38:49:54:8c: 3f:33:51:f0:33:1a:81:43:9e:04:71:a2:9c:1b:3b:21: 8a:79:9c:c4:e8:90:0e:6f:56:09:7a:b5:6d:36:08:2c: 24:f4:48:ee:69:fc:1d:ba:e3:90:ad:c6:d7:b2:7f:15: ae:6f:c2:3a:24:a4:f1:48:92:ac:06:fb:e6:18:fe:c2: d6:9c:09:d5:1c:b7:41:f2:27:2c:46:c0:0f:ee:56:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:f5:12:52:cc:d9:66:30:77:70:9c:26:d1:28:2d:84: d4:f0:54:51:d2:2c:b2:1d:fb:d1:5c:b0:cb:99:46:9a: a3:81:10:be:93:5e:9a:2f:df:2a:14:bf:8e:ab:4c:53: 0e:67:74:fc:af:37:e3:e1:ac:30:0d:37:6c:37:ea:06: 82:56:a0:34:64:5d:75:b7:26:e4:66:2e:be:a9:98:6e: 47:6d:e2:ad:b9:f2:70:ee:41:95:6b:a3:d9:de:cb:0e: 4c:31:cc:c5:04:6f:36:7b:6d:32:63:b8:cc:ba:51:a7: 0b:ef:88:09:8c:00:82:ed:b7:d4:8c:ef:b2:52:0d:af: bf:1f:fd:ff:7d:bc:3e:78:a0:c8:30:1f:f6:df:6d:5a: 6a:a4:84:23:ef:83:8a:dc:ad:d7:7e:6c:37:d4:2e:0e: 91:1a:a8:a5:90:a5:b3:f2:26:32:ba:40:d5:d4:23:e2: 9e:cb:28:73:be:c6:4d:ba:c5:b8:0b:dd:47:35:05:c8: cf:44:e7:6b:57:6f:4c:d7:1b:3e:e8:61:82:1e:17:23: 3d:a4:10:39:a5:47:24:aa:6a:18:ab:69:02:68:cc:fa: 54:a4:e3:59:1e:21:b6:ff:f5:fa:cc:81:8c:a8:ee:7a: 65:23:2f:c0:9c:f6:bc:3c:50:06:c4:d9:f3:33:64:01 Fingerprint (SHA-256): 59:6E:2F:AD:1C:AD:14:DE:F6:C6:6C:C4:01:35:D9:2F:26:3B:7A:9C:A7:93:75:96:E1:8E:BC:17:4E:15:A1:BB Fingerprint (SHA1): C5:9D:80:B2:07:C7:50:82:A0:C1:36:47:E3:6D:67:9D:E2:E4:F8:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202006 (0x1315e516) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 20:22:14 2023 Not After : Mon Mar 20 20:22:14 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f5:73:f2:84:11:f9:02:b2:bc:7f:9b:e4:7b:1b:8b: 22:8c:de:dc:63:b6:c5:a1:36:3a:37:6d:1f:ca:23:6b: f3:f2:01:0e:24:f3:e9:b1:25:8f:0a:21:ea:52:07:d2: e1:d1:41:97:7b:3a:de:06:e5:18:00:dc:4c:49:fb:79: d2:c9:bc:4d:e3:c2:98:e9:e1:88:f6:18:8e:68:d8:19: f5:f6:e3:7c:c3:5a:cc:d3:dd:57:64:f6:a4:f9:e2:ad: 27:39:69:d8:c6:81:f0:43:a2:05:25:e8:9e:0c:28:95: 4d:4f:a1:eb:9a:93:e0:3f:a8:9f:af:f3:44:52:79:35: ec:47:45:e4:8b:42:e8:fc:93:b5:2f:62:e1:98:3c:91: f1:e7:83:bd:83:98:0f:3d:8e:7a:a6:3c:00:6f:80:88: de:fe:72:06:f0:d7:e6:4d:13:9a:42:00:14:ce:5b:56: 2a:5d:fb:ec:00:d7:d6:89:92:7a:0f:b3:f3:21:dc:0e: b4:ff:fc:47:55:0a:cf:59:e9:9b:82:9c:0f:23:47:76: d7:3e:67:3f:e7:52:42:ad:48:5f:dd:a5:9c:fd:f0:d2: 25:a9:bd:1e:27:2f:f1:ad:9b:63:5c:23:8c:89:bf:7f: 88:2e:58:cd:9c:57:d8:5d:36:4e:00:0c:81:6a:d5:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:c4:38:e6:0c:ea:be:18:7d:fb:8c:a4:04:fc:55:3a: ed:10:3c:2b:f8:82:bb:37:25:07:da:2b:5b:f1:8d:78: 14:53:ee:f1:e7:15:30:49:00:42:e2:9c:40:16:d9:68: c3:15:4e:81:d5:d0:e6:3f:84:e2:9b:23:12:4e:19:d2: c0:c8:9b:7a:3c:3e:23:b8:db:0f:4b:ad:d7:ba:76:31: d2:bd:89:bb:55:63:10:fe:dc:99:e0:46:ba:98:d1:e2: 34:f5:c8:e3:8a:b8:cf:00:dc:0d:3e:24:b7:70:64:77: 95:c4:34:83:0e:8a:9c:d7:3a:14:c2:d8:78:00:bb:40: d8:5f:72:f5:05:34:3d:9c:92:ef:f9:3e:35:a3:5d:76: 5a:50:fa:56:e3:e6:57:26:65:89:28:71:0b:c0:33:e0: 1b:c6:0b:17:4a:15:8f:c6:df:00:69:96:aa:29:7b:cc: dd:d8:5b:b3:fa:2a:90:00:69:43:8d:ab:7a:97:e9:e6: 11:2d:91:75:76:b5:83:85:ac:5b:f7:d2:c6:7b:06:78: 7b:a9:f5:4e:26:5f:28:be:f9:d5:1a:d5:9f:c6:55:20: 30:e7:b3:7f:2e:6b:b0:c7:44:62:30:02:2c:f2:0e:05: 6d:a3:83:cb:18:f0:06:bb:dc:4c:e2:d3:8d:1e:6a:b3 Fingerprint (SHA-256): 09:DD:BE:0E:6E:60:D4:4A:56:37:08:35:A5:E0:0C:7F:0D:7D:84:EE:92:06:AD:18:2E:B0:23:3A:5A:6B:37:3B Fingerprint (SHA1): 9D:05:1F:4D:3A:41:D9:64:AF:43:62:B5:92:2A:CC:2D:08:99:49:BC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202002 (0x1315e512) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 20:22:11 2023 Not After : Mon Mar 20 20:22:11 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:09:ae:19:c8:d8:4c:26:86:d8:97:69:70:c0:93:e8: 0b:13:28:23:d4:fc:bb:6a:a3:43:f3:75:6b:4d:00:96: f7:02:ed:31:ca:bd:7e:9e:bb:0e:9d:24:a8:0d:a5:96: 80:b2:64:ed:20:65:5a:e0:cf:87:fd:a0:87:43:6d:13: 03:3a:6d:24:99:1a:9c:e7:3c:81:d7:44:80:90:cc:c3: 1f:1e:30:0c:0a:d4:f9:0d:70:25:5e:d6:e7:d6:e3:5f: f4:7b:71:57:94:2d:b6:d6:05:e6:b3:86:76:f6:2f:fe: 7c:ac:02:1c:03:11:ca:88:36:6e:9f:48:aa:87:19:31: ee:e7:30:73:18:02:ea:ec:93:9a:84:c2:b8:53:f2:44: b1:27:f8:a2:9d:ae:3e:63:6a:29:61:a8:88:e9:40:93: 6f:e2:4b:25:ad:d2:36:97:33:df:21:a3:38:49:54:8c: 3f:33:51:f0:33:1a:81:43:9e:04:71:a2:9c:1b:3b:21: 8a:79:9c:c4:e8:90:0e:6f:56:09:7a:b5:6d:36:08:2c: 24:f4:48:ee:69:fc:1d:ba:e3:90:ad:c6:d7:b2:7f:15: ae:6f:c2:3a:24:a4:f1:48:92:ac:06:fb:e6:18:fe:c2: d6:9c:09:d5:1c:b7:41:f2:27:2c:46:c0:0f:ee:56:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:f5:12:52:cc:d9:66:30:77:70:9c:26:d1:28:2d:84: d4:f0:54:51:d2:2c:b2:1d:fb:d1:5c:b0:cb:99:46:9a: a3:81:10:be:93:5e:9a:2f:df:2a:14:bf:8e:ab:4c:53: 0e:67:74:fc:af:37:e3:e1:ac:30:0d:37:6c:37:ea:06: 82:56:a0:34:64:5d:75:b7:26:e4:66:2e:be:a9:98:6e: 47:6d:e2:ad:b9:f2:70:ee:41:95:6b:a3:d9:de:cb:0e: 4c:31:cc:c5:04:6f:36:7b:6d:32:63:b8:cc:ba:51:a7: 0b:ef:88:09:8c:00:82:ed:b7:d4:8c:ef:b2:52:0d:af: bf:1f:fd:ff:7d:bc:3e:78:a0:c8:30:1f:f6:df:6d:5a: 6a:a4:84:23:ef:83:8a:dc:ad:d7:7e:6c:37:d4:2e:0e: 91:1a:a8:a5:90:a5:b3:f2:26:32:ba:40:d5:d4:23:e2: 9e:cb:28:73:be:c6:4d:ba:c5:b8:0b:dd:47:35:05:c8: cf:44:e7:6b:57:6f:4c:d7:1b:3e:e8:61:82:1e:17:23: 3d:a4:10:39:a5:47:24:aa:6a:18:ab:69:02:68:cc:fa: 54:a4:e3:59:1e:21:b6:ff:f5:fa:cc:81:8c:a8:ee:7a: 65:23:2f:c0:9c:f6:bc:3c:50:06:c4:d9:f3:33:64:01 Fingerprint (SHA-256): 59:6E:2F:AD:1C:AD:14:DE:F6:C6:6C:C4:01:35:D9:2F:26:3B:7A:9C:A7:93:75:96:E1:8E:BC:17:4E:15:A1:BB Fingerprint (SHA1): C5:9D:80:B2:07:C7:50:82:A0:C1:36:47:E3:6D:67:9D:E2:E4:F8:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320202007 (0x1315e517) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 20:22:15 2023 Not After : Mon Mar 20 20:22:15 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:a8:43:c1:34:86:6e:2e:ea:78:40:0d:da:37:73:24: 14:e5:b7:eb:b7:b5:5b:fd:b8:57:8b:dc:a2:a9:19:b4: b2:79:3d:c6:06:80:82:5e:dd:65:1c:1c:da:83:98:79: f6:b8:fb:26:38:b2:45:08:1c:36:d1:b5:37:00:63:8d: 51:0c:56:28:30:9f:d8:28:b4:17:f8:12:24:7e:6e:9e: 0e:a0:57:d2:bf:01:7e:49:38:99:9e:a6:f8:f5:cd:34: e4:44:87:e8:66:48:fc:7f:59:01:86:3a:33:73:0f:e6: 32:69:c6:31:fb:b6:51:18:b7:85:7e:66:be:cc:db:32: b3:22:07:2f:a8:69:8f:66:64:c1:b9:e0:33:34:70:09: 98:2c:ef:51:52:2a:bc:d2:2d:bb:c3:c0:cb:2a:58:e7: da:a2:00:bd:30:18:44:98:69:50:09:5f:d4:6d:b5:5e: 11:08:4d:a8:c5:ac:ca:48:1a:28:60:7a:9a:48:fe:04: 15:ad:83:9c:0e:93:73:e5:ad:3a:36:b8:b7:6e:41:f4: 81:83:bd:81:68:03:c8:76:ee:24:7a:22:27:37:bb:bb: 03:17:34:4c:98:2b:48:88:3a:71:f4:42:30:29:c5:b1: 84:6b:c7:b5:43:a6:80:49:1e:91:a2:fa:c3:40:1a:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:c4:4a:11:02:d7:ec:91:8b:d9:18:f2:49:7b:7c:c4: e6:8f:f4:16:aa:ee:bb:9b:7a:b2:69:9a:95:ef:28:98: 11:73:f1:68:b8:90:4b:3d:f6:a7:42:7c:0d:06:7e:82: 8d:e7:df:77:55:a8:53:50:cb:65:18:8a:d5:21:1a:15: 01:2c:50:20:6c:b0:21:82:df:55:14:d8:0f:7d:aa:dc: 7d:06:82:58:5e:62:f7:98:96:05:c8:85:f7:ee:a1:c3: f3:0b:6a:cb:42:0b:db:44:85:85:2f:9a:91:8a:88:39: 51:2a:c7:63:f2:a2:e8:0d:61:ea:17:28:b5:14:23:05: 69:02:36:ac:af:07:e1:2f:d8:85:2a:10:8e:b5:8a:c2: 88:14:db:6b:a5:75:87:7c:52:2e:a8:d0:da:8b:9a:3c: 0d:4d:de:78:61:83:1a:70:36:c3:b4:5c:a8:a3:42:29: fb:ff:aa:84:c3:24:3a:7c:ac:3d:7b:91:24:2b:a4:e1: 80:34:db:b0:6c:64:51:c4:7e:9a:66:c3:a2:a4:2d:ec: fb:fd:9d:6c:ed:bc:4a:ce:3d:31:f9:18:12:b6:38:eb: 25:cb:d8:a4:cc:8f:6a:84:98:29:56:0b:d2:38:ec:be: b6:26:c1:d5:95:12:92:e1:ac:e7:cf:cb:db:a3:70:94 Fingerprint (SHA-256): E3:DA:42:A6:B0:5F:3D:D2:72:D5:0B:6D:B3:D7:B0:0B:7C:63:49:BC:B7:2C:CD:50:8A:E3:76:06:58:42:C9:A5 Fingerprint (SHA1): 0D:86:52:3F:86:D1:45:EB:1B:CB:50:D3:20:A7:67:9F:5F:BE:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 17777 at Mon Mar 20 20:22:21 UTC 2023 kill -USR1 17777 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 17777 killed at Mon Mar 20 20:22:21 UTC 2023 TIMESTAMP chains END: Mon Mar 20 20:22:21 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Mon Mar 20 20:22:21 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Mon Mar 20 20:22:21 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Mon Mar 20 20:22:21 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Mon Mar 20 20:22:21 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Mon Mar 20 20:22:22 UTC 2023 TIMESTAMP ec END: Mon Mar 20 20:22:22 UTC 2023 ec.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Mon Mar 20 20:22:22 UTC 2023 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x39720866 updateID= - merging object Type 0x00000001 id=0x3c517208 updateID= - merging object Type 0x00000001 id=0x3b740a1f updateID= - merging object Type 0x00000001 id=0x3f720866 updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3d740a1f updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3b751a1d updateID= - merging object Type 0x00000001 id=0x3d417208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f217208 updateID= - merging object Type 0x00000002 id=0x15870c2f updateID= - merging object Type 0x00000002 id=0x143d4c2b updateID= - merging object Type 0x00000002 id=0x117a23f7 updateID= - merging object Type 0x00000002 id=0x162081d8 updateID= - merging object Type 0x00000002 id=0x156c562a updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0xce534352 id=0x31427b6b updateID= - merging object Type 0xce534352 id=0x37377769 updateID= - merging object Type 0xce534352 id=0x377b6603 updateID= - merging object Type 0xce534352 id=0x30626103 updateID= - merging object Type 0xce534352 id=0x34101166 updateID= - merging object Type 0xce534352 id=0x306f1f18 updateID= - merging object Type 0xce534352 id=0x344c671e updateID= - merging object Type 0xce534352 id=0x312b021e updateID= - merging object Type 0xce534352 id=0x326f1d18 updateID= - merging object Type 0xce534352 id=0x37170d0c updateID= - merging object Type 0xce534352 id=0x30626104 updateID= - merging object Type 0xce534352 id=0x30626105 updateID= - merging object Type 0xce534352 id=0x31130d0c updateID= - merging object Type 0xce534352 id=0x3308615b updateID= - merging object Type 0x00000003 id=0x0d870c2f updateID= - merging object Type 0x00000003 id=0x0c3d4c2b updateID= - merging object Type 0x00000003 id=0x097a23f7 updateID= - merging object Type 0x00000003 id=0x0e2081d8 updateID= - merging object Type 0x00000003 id=0x0d6c562a updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= dbupgrade.sh: #1: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3f720866 updateID= - merging object Type 0x00000001 id=0x3c277208 updateID= - merging object Type 0x00000001 id=0x3d740a1f updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3d751a1d updateID= - merging object Type 0x00000001 id=0x3d577208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f377208 updateID= - merging object Type 0x00000002 id=0x1749193e updateID= - merging object Type 0x00000002 id=0x14f23b0f updateID= - merging object Type 0x00000002 id=0x11cc97d8 updateID= - merging object Type 0x00000002 id=0x1585362c updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x178383e9 updateID= - merging object Type 0xce534352 id=0x377b6603 updateID= - merging object Type 0xce534352 id=0x34121d4d updateID= - merging object Type 0xce534352 id=0x327d6f47 updateID= - merging object Type 0xce534352 id=0x357b7403 updateID= - merging object Type 0xce534352 id=0x30626103 updateID= - merging object Type 0xce534352 id=0x34101166 updateID= - merging object Type 0xce534352 id=0x3308072e updateID= - merging object Type 0xce534352 id=0x3308615b updateID= - merging object Type 0xce534352 id=0x37170d0c updateID= - merging object Type 0xce534352 id=0x30626104 updateID= - merging object Type 0xce534352 id=0x30626105 updateID= - merging object Type 0xce534352 id=0x31130d0c updateID= - merging object Type 0x00000003 id=0x0f49193e updateID= - merging object Type 0x00000003 id=0x0cf23b0f updateID= - merging object Type 0x00000003 id=0x09cc97d8 updateID= - merging object Type 0x00000003 id=0x0d85362c updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0f8383e9 updateID= dbupgrade.sh: #2: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3d33494a updateID= - merging object Type 0xce534353 id=0x2533494a updateID= - merging object Type 0x00000001 id=0x3d602104 updateID= - merging object Type 0xce534353 id=0x25602104 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3db57208 updateID= - merging object Type 0xce534353 id=0x25b57208 updateID= - merging object Type 0x00000002 id=0x17a6dd6c updateID= - merging object Type 0x00000002 id=0x16331b6c updateID= - merging object Type 0x00000002 id=0x158a5602 updateID= - merging object Type 0x00000002 id=0x106166a0 updateID= - merging object Type 0x00000002 id=0x1170936e updateID= - merging object Type 0x00000002 id=0x129695f5 updateID= - merging object Type 0xce534351 id=0x29495c6d updateID= - merging object Type 0xce534351 id=0x2a08664f updateID= - merging object Type 0xce534351 id=0x29495c6e updateID= - merging object Type 0xce534352 id=0x300e1808 updateID= - merging object Type 0x00000003 id=0x0fa6dd6c updateID= - merging object Type 0x00000003 id=0x0e331b6c updateID= - merging object Type 0x00000003 id=0x0d8a5602 updateID= - merging object Type 0x00000003 id=0x086166a0 updateID= - merging object Type 0x00000003 id=0x0970936e updateID= - merging object Type 0x00000003 id=0x0a9695f5 updateID= dbupgrade.sh: #3: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3b34707d updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3f751a1d updateID= - merging object Type 0x00000001 id=0x3d057208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3fe57208 updateID= - merging object Type 0x00000001 id=0x3834767d updateID= - merging object Type 0x00000001 id=0x3e34727d updateID= - merging object Type 0x00000001 id=0x3834717d updateID= - merging object Type 0x00000001 id=0x3a347f7d updateID= - merging object Type 0x00000001 id=0x3a526702 updateID= - merging object Type 0x00000001 id=0x3c157208 updateID= - merging object Type 0x00000001 id=0x3b34757d updateID= - merging object Type 0x00000001 id=0x3d34747d updateID= - merging object Type 0x00000001 id=0x3f34737d updateID= - merging object Type 0x00000001 id=0x3d347e7d updateID= - merging object Type 0x00000001 id=0x39526703 updateID= - merging object Type 0x00000002 id=0x1675f9cc updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x10a58052 updateID= - merging object Type 0x00000002 id=0x15d1654c updateID= - merging object Type 0x00000002 id=0x1213ad21 updateID= - merging object Type 0x00000002 id=0x13c78d1c updateID= - merging object Type 0x00000002 id=0x155a119e updateID= - merging object Type 0x00000002 id=0x11925e6c updateID= - merging object Type 0x00000002 id=0x10192cad updateID= - merging object Type 0x00000002 id=0x123afa8a updateID= - merging object Type 0x00000002 id=0x10eef3b7 updateID= - merging object Type 0x00000002 id=0x11948c3b updateID= - merging object Type 0x00000002 id=0x10ac290d updateID= - merging object Type 0x00000002 id=0x15dc83ad updateID= - merging object Type 0x00000002 id=0x1549407a updateID= - merging object Type 0x00000002 id=0x158c5cc1 updateID= - merging object Type 0x00000002 id=0x1347685c updateID= - merging object Type 0x00000002 id=0x1335b8da updateID= - merging object Type 0x00000002 id=0x1140369f updateID= - merging object Type 0x00000002 id=0x15ff288c updateID= - merging object Type 0x00000002 id=0x1077712d updateID= - merging object Type 0x00000002 id=0x141094b5 updateID= - merging object Type 0x00000002 id=0x135af703 updateID= - merging object Type 0x00000002 id=0x14fff705 updateID= - merging object Type 0xce534352 id=0x34090377 updateID= - merging object Type 0xce534352 id=0x37607839 updateID= - merging object Type 0xce534352 id=0x310f0a33 updateID= - merging object Type 0xce534352 id=0x326b7c29 updateID= - merging object Type 0xce534352 id=0x326b7c25 updateID= - merging object Type 0xce534352 id=0x307a625a updateID= - merging object Type 0xce534352 id=0x307a042f updateID= - merging object Type 0xce534352 id=0x326b7c2c updateID= - merging object Type 0xce534352 id=0x326b7c2e updateID= - merging object Type 0xce534352 id=0x326b7c28 updateID= - merging object Type 0xce534352 id=0x326b7c2a updateID= - merging object Type 0xce534352 id=0x326b7c24 updateID= - merging object Type 0xce534352 id=0x351e713e updateID= - merging object Type 0xce534352 id=0x36091177 updateID= - merging object Type 0xce534352 id=0x326b7c2f updateID= - merging object Type 0xce534352 id=0x326b7c2b updateID= Generating key. This may take a few moments... - merging object Type 0xce534352 id=0x341e713e updateID= - merging object Type 0x00000003 id=0x0e75f9cc updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x08a58052 updateID= - merging object Type 0x00000003 id=0x0dd1654c updateID= - merging object Type 0x00000003 id=0x0a13ad21 updateID= - merging object Type 0x00000003 id=0x0bc78d1c updateID= - merging object Type 0x00000003 id=0x0d5a119e updateID= - merging object Type 0x00000003 id=0x09925e6c updateID= - merging object Type 0x00000003 id=0x08192cad updateID= - merging object Type 0x00000003 id=0x0a3afa8a updateID= - merging object Type 0x00000003 id=0x08eef3b7 updateID= - merging object Type 0x00000003 id=0x09948c3b updateID= - merging object Type 0x00000003 id=0x08ac290d updateID= - merging object Type 0x00000003 id=0x0ddc83ad updateID= - merging object Type 0x00000003 id=0x0d49407a updateID= - merging object Type 0x00000003 id=0x0d8c5cc1 updateID= - merging object Type 0x00000003 id=0x0b47685c updateID= - merging object Type 0x00000003 id=0x0b35b8da updateID= - merging object Type 0x00000003 id=0x0940369f updateID= - merging object Type 0x00000003 id=0x0dff288c updateID= - merging object Type 0x00000003 id=0x0877712d updateID= - merging object Type 0x00000003 id=0x0c1094b5 updateID= - merging object Type 0x00000003 id=0x0b5af703 updateID= - merging object Type 0x00000003 id=0x0cfff705 updateID= dbupgrade.sh: #4: Upgrading cert_extensions - PASSED client upgrading db client - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3d547208 updateID= - merging object Type 0x00000001 id=0x3f327208 updateID= - merging object Type 0x00000001 id=0x3b740a1f updateID= - merging object Type 0x00000001 id=0x3c751a1e updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3c3b7208 updateID= - merging object Type 0x00000001 id=0x3d537208 updateID= - merging object Type 0x00000001 id=0x3f317208 updateID= - merging object Type 0x00000001 id=0x3a740a1f updateID= - merging object Type 0x00000001 id=0x3f751a1d updateID= - merging object Type 0x00000001 id=0x3c720866 updateID= - merging object Type 0x00000001 id=0x3c097208 updateID= - merging object Type 0x00000001 id=0x3d527208 updateID= - merging object Type 0x00000001 id=0x3f307208 updateID= - merging object Type 0x00000001 id=0x3d740a1f updateID= - merging object Type 0x00000001 id=0x3e751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3d517208 updateID= - merging object Type 0x00000001 id=0x3f0f7208 updateID= - merging object Type 0x00000001 id=0x3c740a20 updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x39720866 updateID= - merging object Type 0x00000001 id=0x3c277208 updateID= - merging object Type 0x00000001 id=0x3f367208 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x38751a1d updateID= - merging object Type 0x00000001 id=0x39720867 updateID= - merging object Type 0x00000001 id=0x3d507208 updateID= - merging object Type 0x00000001 id=0x3c3f7208 updateID= - merging object Type 0x00000001 id=0x3f0e7208 updateID= - merging object Type 0x00000001 id=0x3f740a20 updateID= - merging object Type 0x00000001 id=0x3b751a1d updateID= - merging object Type 0x00000001 id=0x3d577208 updateID= - merging object Type 0x00000001 id=0x3c267208 updateID= - merging object Type 0x00000001 id=0x3f357208 updateID= - merging object Type 0x00000001 id=0x3e740a1f updateID= - merging object Type 0x00000001 id=0x3b751a1e updateID= - merging object Type 0x00000001 id=0x38720866 updateID= - merging object Type 0x00000001 id=0x3d2f7208 updateID= - merging object Type 0x00000001 id=0x3c3e7208 updateID= - merging object Type 0x00000001 id=0x3f0d7208 updateID= - merging object Type 0x00000001 id=0x3e740a20 updateID= - merging object Type 0x00000001 id=0x3f720866 updateID= - merging object Type 0x00000001 id=0x3d567208 updateID= - merging object Type 0x00000001 id=0x3c257208 updateID= - merging object Type 0x00000001 id=0x3f347208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x3a751a1d updateID= - merging object Type 0x00000001 id=0x3f720867 updateID= - merging object Type 0x00000001 id=0x3d2e7208 updateID= - merging object Type 0x00000001 id=0x3c3d7208 updateID= - merging object Type 0x00000001 id=0x3f0c7208 updateID= - merging object Type 0x00000001 id=0x39740a20 updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3d751a1d updateID= - merging object Type 0x00000001 id=0x3e720867 updateID= - merging object Type 0x00000001 id=0x3d557208 updateID= - merging object Type 0x00000001 id=0x3c247208 updateID= - merging object Type 0x00000001 id=0x3f337208 updateID= - merging object Type 0x00000001 id=0x38740a1f updateID= - merging object Type 0x00000001 id=0x3d751a1e updateID= - merging object Type 0x00000001 id=0x3e720868 updateID= - merging object Type 0x00000001 id=0x3d2d7208 updateID= - merging object Type 0x00000001 id=0x3c3c7208 updateID= - merging object Type 0x00000001 id=0x3f0b7208 updateID= - merging object Type 0x00000001 id=0x3b740a20 updateID= - merging object Type 0x00000001 id=0x3c751a1f updateID= - merging object Type 0x00000001 id=0x3d720867 updateID= - merging object Type 0x00000001 id=0x3c237208 updateID= - merging object Type 0x00000001 id=0x3d2c7208 updateID= - merging object Type 0x00000001 id=0x3f197208 updateID= - merging object Type 0x00000001 id=0x3f751a1e updateID= - merging object Type 0x00000001 id=0x3c720867 updateID= - merging object Type 0x00000001 id=0x3c227208 updateID= - merging object Type 0x00000001 id=0x3d2b7208 updateID= - merging object Type 0x00000001 id=0x3d740a20 updateID= - merging object Type 0x00000001 id=0x3e751a1e updateID= - merging object Type 0x00000001 id=0x3b720867 updateID= - merging object Type 0x00000001 id=0x3c217208 updateID= - merging object Type 0x00000001 id=0x3d397208 updateID= - merging object Type 0x00000001 id=0x3f377208 updateID= - merging object Type 0x00000001 id=0x3c740a21 updateID= - merging object Type 0x00000001 id=0x39751a1e updateID= - merging object Type 0x00000001 id=0x3a720866 updateID= - merging object Type 0x00000001 id=0x3c207208 updateID= - merging object Type 0x00000002 id=0x14751d22 updateID= - merging object Type 0x00000002 id=0x1256e817 updateID= - merging object Type 0x00000002 id=0x1114d19b updateID= - merging object Type 0x00000002 id=0x12c02ea2 updateID= - merging object Type 0x00000002 id=0x10cc84aa updateID= - merging object Type 0x00000002 id=0x102a611f updateID= - merging object Type 0x00000002 id=0x10eaf586 updateID= - merging object Type 0x00000002 id=0x1165718f updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x147bc71f updateID= - merging object Type 0x00000002 id=0x15d1ed13 updateID= - merging object Type 0x00000002 id=0x1614e4b7 updateID= - merging object Type 0x00000002 id=0x14ef0735 updateID= - merging object Type 0x00000002 id=0x178b270e updateID= - merging object Type 0x00000002 id=0x16d551b3 updateID= - merging object Type 0x00000002 id=0x1447f205 updateID= - merging object Type 0x00000002 id=0x129fa518 updateID= - merging object Type 0x00000002 id=0x179a8309 updateID= - merging object Type 0x00000002 id=0x107eee90 updateID= - merging object Type 0x00000002 id=0x146459b4 updateID= - merging object Type 0x00000002 id=0x11bebdb4 updateID= - merging object Type 0x00000002 id=0x113ebbb7 updateID= - merging object Type 0x00000002 id=0x17987aa4 updateID= - merging object Type 0x00000002 id=0x154b9495 updateID= - merging object Type 0x00000002 id=0x1219cd67 updateID= - merging object Type 0x00000002 id=0x111b0761 updateID= - merging object Type 0x00000002 id=0x175a629f updateID= - merging object Type 0x00000002 id=0x12eb9858 updateID= - merging object Type 0x00000002 id=0x14e393ac updateID= - merging object Type 0x00000002 id=0x1104c00e updateID= - merging object Type 0x00000002 id=0x13268b7f updateID= - merging object Type 0x00000002 id=0x16d2f093 updateID= - merging object Type 0x00000002 id=0x161e40a8 updateID= - merging object Type 0x00000002 id=0x1397ab56 updateID= - merging object Type 0x00000002 id=0x1047153e updateID= - merging object Type 0x00000002 id=0x10f3a33e updateID= - merging object Type 0x00000002 id=0x1723932e updateID= - merging object Type 0x00000002 id=0x177722ea updateID= - merging object Type 0x00000002 id=0x17820d46 updateID= - merging object Type 0x00000002 id=0x1490ec5f updateID= - merging object Type 0x00000002 id=0x1074440d updateID= - merging object Type 0x00000002 id=0x123c999f updateID= - merging object Type 0x00000002 id=0x15a136f0 updateID= - merging object Type 0x00000002 id=0x152fc697 updateID= - merging object Type 0x00000002 id=0x12736b6a updateID= - merging object Type 0x00000002 id=0x102808b7 updateID= - merging object Type 0x00000002 id=0x151daf56 updateID= - merging object Type 0x00000002 id=0x129b70b8 updateID= - merging object Type 0x00000002 id=0x1022395c updateID= - merging object Type 0x00000002 id=0x13d27bcf updateID= - merging object Type 0x00000002 id=0x14186a26 updateID= - merging object Type 0x00000002 id=0x113f1e6c updateID= - merging object Type 0x00000002 id=0x1204863e updateID= - merging object Type 0x00000002 id=0x1622568f updateID= - merging object Type 0x00000002 id=0x12b29a00 updateID= - merging object Type 0x00000002 id=0x1044af15 updateID= - merging object Type 0x00000002 id=0x15dfb919 updateID= - merging object Type 0x00000002 id=0x11c1574a updateID= - merging object Type 0x00000002 id=0x10afb2e8 updateID= - merging object Type 0x00000002 id=0x12ba3281 updateID= - merging object Type 0x00000002 id=0x15a75199 updateID= - merging object Type 0x00000002 id=0x16a54775 updateID= - merging object Type 0x00000002 id=0x168b6340 updateID= - merging object Type 0x00000002 id=0x1180742a updateID= - merging object Type 0x00000002 id=0x1269147f updateID= - merging object Type 0x00000002 id=0x1223c246 updateID= - merging object Type 0x00000002 id=0x10f72a07 updateID= - merging object Type 0x00000002 id=0x110b117c updateID= - merging object Type 0x00000002 id=0x17ecadd6 updateID= - merging object Type 0x00000002 id=0x15ea9688 updateID= - merging object Type 0x00000002 id=0x1618cad1 updateID= - merging object Type 0xce534352 id=0x33343608 updateID= - merging object Type 0xce534352 id=0x3729516d updateID= - merging object Type 0xce534352 id=0x31381572 updateID= - merging object Type 0xce534352 id=0x324a3814 updateID= - merging object Type 0xce534352 id=0x322c4d18 updateID= - merging object Type 0xce534352 id=0x32373608 updateID= - merging object Type 0xce534352 id=0x362a516d updateID= - merging object Type 0xce534352 id=0x33353608 updateID= - merging object Type 0xce534352 id=0x3728516d updateID= - merging object Type 0xce534352 id=0x31391572 updateID= - merging object Type 0xce534352 id=0x32343608 updateID= - merging object Type 0xce534352 id=0x3629516d updateID= - merging object Type 0xce534352 id=0x31221570 updateID= - merging object Type 0xce534352 id=0x33323608 updateID= - merging object Type 0xce534352 id=0x372f516d updateID= - merging object Type 0xce534352 id=0x37041e0e updateID= - merging object Type 0xce534352 id=0x31677105 updateID= - merging object Type 0xce534352 id=0x31231570 updateID= - merging object Type 0xce534352 id=0x33333608 updateID= - merging object Type 0xce534352 id=0x372e516d updateID= - merging object Type 0xce534352 id=0x30221570 updateID= - merging object Type 0xce534352 id=0x32626d7d updateID= - merging object Type 0xce534352 id=0x31201570 updateID= - merging object Type 0xce534352 id=0x31341572 updateID= - merging object Type 0xce534352 id=0x32463814 updateID= - merging object Type 0xce534352 id=0x32204d18 updateID= - merging object Type 0xce534352 id=0x33303608 updateID= - merging object Type 0xce534352 id=0x372d516d updateID= - merging object Type 0xce534352 id=0x30231570 updateID= - merging object Type 0xce534352 id=0x31211570 updateID= - merging object Type 0xce534352 id=0x31351572 updateID= - merging object Type 0xce534352 id=0x32453814 updateID= - merging object Type 0xce534352 id=0x32234d18 updateID= - merging object Type 0xce534352 id=0x33313608 updateID= - merging object Type 0xce534352 id=0x372c516d updateID= - merging object Type 0xce534352 id=0x30201570 updateID= - merging object Type 0xce534352 id=0x32606d6f updateID= - merging object Type 0xce534352 id=0x33363608 updateID= - merging object Type 0xce534352 id=0x372b516d updateID= - merging object Type 0xce534352 id=0x31261570 updateID= - merging object Type 0xce534352 id=0x31361572 updateID= - merging object Type 0xce534352 id=0x32443814 updateID= - merging object Type 0xce534352 id=0x32224d18 updateID= - merging object Type 0xce534352 id=0x333e3608 updateID= - merging object Type 0xce534352 id=0x3723516d updateID= - merging object Type 0xce534352 id=0x32433814 updateID= - merging object Type 0xce534352 id=0x32254d18 updateID= - merging object Type 0xce534352 id=0x33373608 updateID= - merging object Type 0xce534352 id=0x372a516d updateID= - merging object Type 0xce534352 id=0x31271570 updateID= - merging object Type 0xce534352 id=0x31371572 updateID= - merging object Type 0xce534352 id=0x324b3814 updateID= - merging object Type 0xce534352 id=0x322d4d18 updateID= - merging object Type 0xce534352 id=0x333f3608 updateID= - merging object Type 0xce534352 id=0x3722516d updateID= - merging object Type 0xce534352 id=0x32363608 updateID= - merging object Type 0xce534352 id=0x362b516d updateID= - merging object Type 0xce534352 id=0x31301572 updateID= - merging object Type 0xce534352 id=0x32423814 updateID= - merging object Type 0xce534352 id=0x32244d18 updateID= - merging object Type 0xce534352 id=0x31241570 updateID= - merging object Type 0xce534352 id=0x33433814 updateID= - merging object Type 0xce534352 id=0x33254d18 updateID= - merging object Type 0xce534352 id=0x31311572 updateID= - merging object Type 0xce534352 id=0x32413814 updateID= - merging object Type 0xce534352 id=0x32274d18 updateID= - merging object Type 0xce534352 id=0x31251570 updateID= - merging object Type 0xce534352 id=0x30301572 updateID= - merging object Type 0xce534352 id=0x33423814 updateID= - merging object Type 0xce534352 id=0x33244d18 updateID= - merging object Type 0xce534352 id=0x31186b79 updateID= - merging object Type 0xce534352 id=0x367d6b66 updateID= - merging object Type 0xce534352 id=0x31321572 updateID= - merging object Type 0xce534352 id=0x32403814 updateID= - merging object Type 0xce534352 id=0x32264d18 updateID= - merging object Type 0xce534352 id=0x312a1570 updateID= - merging object Type 0xce534352 id=0x30311572 updateID= - merging object Type 0xce534352 id=0x33413814 updateID= - merging object Type 0xce534352 id=0x33274d18 updateID= - merging object Type 0xce534352 id=0x31331572 updateID= - merging object Type 0xce534352 id=0x32473814 updateID= - merging object Type 0xce534352 id=0x32214d18 updateID= - merging object Type 0xce534352 id=0x312b1570 updateID= - merging object Type 0xce534352 id=0x30321572 updateID= - merging object Type 0x00000003 id=0x0c751d22 updateID= - merging object Type 0x00000003 id=0x0a56e817 updateID= - merging object Type 0x00000003 id=0x0914d19b updateID= - merging object Type 0x00000003 id=0x0ac02ea2 updateID= - merging object Type 0x00000003 id=0x08cc84aa updateID= - merging object Type 0x00000003 id=0x082a611f updateID= - merging object Type 0x00000003 id=0x08eaf586 updateID= - merging object Type 0x00000003 id=0x0965718f updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0c7bc71f updateID= Generating key. This may take a few moments... - merging object Type 0x00000003 id=0x0dd1ed13 updateID= - merging object Type 0x00000003 id=0x0e14e4b7 updateID= - merging object Type 0x00000003 id=0x0cef0735 updateID= - merging object Type 0x00000003 id=0x0f8b270e updateID= - merging object Type 0x00000003 id=0x0ed551b3 updateID= - merging object Type 0x00000003 id=0x0c47f205 updateID= - merging object Type 0x00000003 id=0x0a9fa518 updateID= - merging object Type 0x00000003 id=0x0f9a8309 updateID= - merging object Type 0x00000003 id=0x087eee90 updateID= - merging object Type 0x00000003 id=0x0c6459b4 updateID= - merging object Type 0x00000003 id=0x09bebdb4 updateID= - merging object Type 0x00000003 id=0x093ebbb7 updateID= - merging object Type 0x00000003 id=0x0f987aa4 updateID= - merging object Type 0x00000003 id=0x0d4b9495 updateID= - merging object Type 0x00000003 id=0x0a19cd67 updateID= - merging object Type 0x00000003 id=0x091b0761 updateID= - merging object Type 0x00000003 id=0x0f5a629f updateID= - merging object Type 0x00000003 id=0x0aeb9858 updateID= - merging object Type 0x00000003 id=0x0ce393ac updateID= - merging object Type 0x00000003 id=0x0904c00e updateID= - merging object Type 0x00000003 id=0x0b268b7f updateID= - merging object Type 0x00000003 id=0x0ed2f093 updateID= - merging object Type 0x00000003 id=0x0e1e40a8 updateID= - merging object Type 0x00000003 id=0x0b97ab56 updateID= - merging object Type 0x00000003 id=0x0847153e updateID= - merging object Type 0x00000003 id=0x08f3a33e updateID= - merging object Type 0x00000003 id=0x0f23932e updateID= - merging object Type 0x00000003 id=0x0f7722ea updateID= - merging object Type 0x00000003 id=0x0f820d46 updateID= - merging object Type 0x00000003 id=0x0c90ec5f updateID= - merging object Type 0x00000003 id=0x0874440d updateID= - merging object Type 0x00000003 id=0x0a3c999f updateID= - merging object Type 0x00000003 id=0x0da136f0 updateID= - merging object Type 0x00000003 id=0x0d2fc697 updateID= - merging object Type 0x00000003 id=0x0a736b6a updateID= - merging object Type 0x00000003 id=0x082808b7 updateID= - merging object Type 0x00000003 id=0x0d1daf56 updateID= - merging object Type 0x00000003 id=0x0a9b70b8 updateID= - merging object Type 0x00000003 id=0x0822395c updateID= - merging object Type 0x00000003 id=0x0bd27bcf updateID= - merging object Type 0x00000003 id=0x0c186a26 updateID= - merging object Type 0x00000003 id=0x093f1e6c updateID= - merging object Type 0x00000003 id=0x0a04863e updateID= - merging object Type 0x00000003 id=0x0e22568f updateID= - merging object Type 0x00000003 id=0x0ab29a00 updateID= - merging object Type 0x00000003 id=0x0844af15 updateID= - merging object Type 0x00000003 id=0x0ddfb919 updateID= - merging object Type 0x00000003 id=0x09c1574a updateID= - merging object Type 0x00000003 id=0x08afb2e8 updateID= - merging object Type 0x00000003 id=0x0aba3281 updateID= - merging object Type 0x00000003 id=0x0da75199 updateID= - merging object Type 0x00000003 id=0x0ea54775 updateID= - merging object Type 0x00000003 id=0x0e8b6340 updateID= - merging object Type 0x00000003 id=0x0980742a updateID= - merging object Type 0x00000003 id=0x0a69147f updateID= - merging object Type 0x00000003 id=0x0a23c246 updateID= - merging object Type 0x00000003 id=0x08f72a07 updateID= - merging object Type 0x00000003 id=0x090b117c updateID= - merging object Type 0x00000003 id=0x0fecadd6 updateID= - merging object Type 0x00000003 id=0x0dea9688 updateID= - merging object Type 0x00000003 id=0x0e18cad1 updateID= dbupgrade.sh: #5: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x39455c13 updateID= - merging object Type 0xce534353 id=0x21455c13 updateID= - merging object Type 0x00000001 id=0x3b5e721c updateID= - merging object Type 0x00000001 id=0x3c475b01 updateID= - merging object Type 0x00000001 id=0x3f475a11 updateID= - merging object Type 0xce534353 id=0x27475a11 updateID= - merging object Type 0x00000001 id=0x395e707f updateID= - merging object Type 0x00000001 id=0x3a455c13 updateID= - merging object Type 0x00000001 id=0x3f475b01 updateID= - merging object Type 0xce534353 id=0x27475b01 updateID= - merging object Type 0x00000001 id=0x395f607d updateID= - merging object Type 0x00000001 id=0x3c475a11 updateID= - merging object Type 0x00000002 id=0x1238cb25 updateID= - merging object Type 0x00000002 id=0x110bcd7e updateID= - merging object Type 0x00000002 id=0x15295287 updateID= - merging object Type 0x00000002 id=0x15a0a93f updateID= - merging object Type 0x00000002 id=0x13cbe5cf updateID= - merging object Type 0x00000002 id=0x119da547 updateID= - merging object Type 0x00000002 id=0x173210f6 updateID= - merging object Type 0x00000002 id=0x11ea45c5 updateID= - merging object Type 0x00000002 id=0x17bac101 updateID= - merging object Type 0x00000003 id=0x0a38cb25 updateID= - merging object Type 0x00000003 id=0x090bcd7e updateID= - merging object Type 0x00000003 id=0x0d295287 updateID= - merging object Type 0x00000003 id=0x0da0a93f updateID= - merging object Type 0x00000003 id=0x0bcbe5cf updateID= - merging object Type 0x00000003 id=0x099da547 updateID= - merging object Type 0x00000003 id=0x0f3210f6 updateID= - merging object Type 0x00000003 id=0x09ea45c5 updateID= - merging object Type 0x00000003 id=0x0fbac101 updateID= dbupgrade.sh: #6: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3c3d7208 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3f751a1d updateID= - merging object Type 0x00000001 id=0x3d2d7208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f0d7208 updateID= - merging object Type 0x00000002 id=0x16c43729 updateID= - merging object Type 0x00000002 id=0x17d39278 updateID= - merging object Type 0x00000002 id=0x14809b09 updateID= - merging object Type 0x00000002 id=0x17a77161 updateID= - merging object Type 0x00000002 id=0x14c78a3f updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0xce534352 id=0x32737e6d updateID= - merging object Type 0xce534352 id=0x34101166 updateID= - merging object Type 0xce534352 id=0x37170d0c updateID= - merging object Type 0xce534352 id=0x346f0b1a updateID= - merging object Type 0xce534352 id=0x330a0b05 updateID= - merging object Type 0xce534352 id=0x37150d1e updateID= - merging object Type 0x00000003 id=0x0ec43729 updateID= - merging object Type 0x00000003 id=0x0fd39278 updateID= - merging object Type 0x00000003 id=0x0c809b09 updateID= - merging object Type 0x00000003 id=0x0fa77161 updateID= - merging object Type 0x00000003 id=0x0cc78a3f updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= dbupgrade.sh: #7: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3bbc740a updateID= - merging object Type 0x00000001 id=0x3bbe740a updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3bbf740a updateID= - merging object Type 0x00000002 id=0x1465eb9a updateID= - merging object Type 0x00000002 id=0x171979de updateID= - merging object Type 0x00000002 id=0x10f5b426 updateID= - merging object Type 0xce534352 id=0x301e3734 updateID= - merging object Type 0xce534352 id=0x37193733 updateID= - merging object Type 0xce534352 id=0x321b3732 updateID= - merging object Type 0x00000003 id=0x0c65eb9a updateID= - merging object Type 0x00000003 id=0x0f1979de updateID= - merging object Type 0x00000003 id=0x08f5b426 updateID= dbupgrade.sh: #8: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3c337208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x3d237208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f037208 updateID= - merging object Type 0x00000002 id=0x14994304 updateID= - merging object Type 0x00000002 id=0x112d1587 updateID= - merging object Type 0x00000002 id=0x10b51acb updateID= - merging object Type 0x00000002 id=0x1797c7b2 updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x16ff5ec1 updateID= - merging object Type 0xce534352 id=0x3411002e updateID= - merging object Type 0xce534352 id=0x3411665b updateID= - merging object Type 0xce534352 id=0x30626103 updateID= - merging object Type 0xce534352 id=0x330b1a4d updateID= - merging object Type 0xce534352 id=0x35646847 updateID= - merging object Type 0xce534352 id=0x32627303 updateID= - merging object Type 0x00000003 id=0x0c994304 updateID= - merging object Type 0x00000003 id=0x092d1587 updateID= - merging object Type 0x00000003 id=0x08b51acb updateID= - merging object Type 0x00000003 id=0x0f97c7b2 updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0eff5ec1 updateID= dbupgrade.sh: #9: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3e3a5f60 updateID= - merging object Type 0x00000001 id=0x3b54400e updateID= - merging object Type 0xce534353 id=0x2354400e updateID= - merging object Type 0x00000001 id=0x3a395e72 updateID= - merging object Type 0x00000001 id=0x3b5e721c updateID= - merging object Type 0xce534353 id=0x235e721c updateID= - merging object Type 0x00000001 id=0x3f475a11 updateID= - merging object Type 0xce534353 id=0x27475a11 updateID= - merging object Type 0x00000001 id=0x39455c13 updateID= - merging object Type 0xce534353 id=0x21455c13 updateID= - merging object Type 0x00000001 id=0x3c475b01 updateID= - merging object Type 0xce534353 id=0x24475b01 updateID= - merging object Type 0x00000001 id=0x395e707f updateID= - merging object Type 0xce534353 id=0x215e707f updateID= - merging object Type 0x00000001 id=0x3a385e72 updateID= - merging object Type 0x00000001 id=0x3d56471c updateID= - merging object Type 0xce534353 id=0x2556471c updateID= - merging object Type 0x00000001 id=0x3a3a5e72 updateID= - merging object Type 0x00000001 id=0x3e3a5e70 updateID= - merging object Type 0x00000001 id=0x3b54411e updateID= - merging object Type 0xce534353 id=0x2354411e updateID= - merging object Type 0x00000001 id=0x3c475a11 updateID= - merging object Type 0xce534353 id=0x24475a11 updateID= - merging object Type 0x00000001 id=0x3a455c13 updateID= - merging object Type 0xce534353 id=0x22455c13 updateID= - merging object Type 0x00000001 id=0x3f475b01 updateID= - merging object Type 0xce534353 id=0x27475b01 updateID= - merging object Type 0x00000001 id=0x395f607d updateID= - merging object Type 0xce534353 id=0x215f607d updateID= - merging object Type 0x00000002 id=0x14cf8954 updateID= - merging object Type 0x00000002 id=0x1040befc updateID= - merging object Type 0x00000002 id=0x17bc9e97 updateID= - merging object Type 0x00000002 id=0x1575f105 updateID= - merging object Type 0x00000002 id=0x12a0c373 updateID= - merging object Type 0xce534352 id=0x326d6a5a updateID= - merging object Type 0xce534352 id=0x326d0c2f updateID= - merging object Type 0xce534352 id=0x361e0b77 updateID= - merging object Type 0xce534352 id=0x35777039 updateID= - merging object Type 0xce534352 id=0x33180233 updateID= - merging object Type 0x00000003 id=0x0ccf8954 updateID= - merging object Type 0x00000003 id=0x0840befc updateID= - merging object Type 0x00000003 id=0x0fbc9e97 updateID= - merging object Type 0x00000003 id=0x0d75f105 updateID= - merging object Type 0x00000003 id=0x0aa0c373 updateID= dbupgrade.sh: #10: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x38cf457d updateID= - merging object Type 0x00000001 id=0x39455c13 updateID= - merging object Type 0xce534353 id=0x21455c13 updateID= - merging object Type 0x00000001 id=0x38cd457d updateID= - merging object Type 0x00000001 id=0x3ccd457f updateID= - merging object Type 0x00000001 id=0x3f475a11 updateID= - merging object Type 0xce534353 id=0x27475a11 updateID= - merging object Type 0x00000001 id=0x39446f66 updateID= - merging object Type 0xce534353 id=0x21446f66 updateID= - merging object Type 0x00000001 id=0x3c56471c updateID= - merging object Type 0xce534353 id=0x2456471c updateID= - merging object Type 0x00000001 id=0x3a54411e updateID= - merging object Type 0xce534353 id=0x2254411e updateID= - merging object Type 0x00000001 id=0x3b54400e updateID= - merging object Type 0xce534353 id=0x2354400e updateID= - merging object Type 0x00000001 id=0x3ccd446f updateID= - merging object Type 0x00000001 id=0x3f475b01 updateID= - merging object Type 0xce534353 id=0x27475b01 updateID= - merging object Type 0x00000001 id=0x38ce457d updateID= - merging object Type 0x00000001 id=0x39457f64 updateID= - merging object Type 0xce534353 id=0x21457f64 updateID= - merging object Type 0x00000001 id=0x3b457d07 updateID= - merging object Type 0xce534353 id=0x23457d07 updateID= - merging object Type 0x00000001 id=0x3d56471c updateID= - merging object Type 0xce534353 id=0x2556471c updateID= - merging object Type 0x00000001 id=0x3a54400e updateID= - merging object Type 0xce534353 id=0x2254400e updateID= - merging object Type 0x00000001 id=0x3b54411e updateID= - merging object Type 0xce534353 id=0x2354411e updateID= - merging object Type 0x00000002 id=0x12cddaf9 updateID= - merging object Type 0x00000002 id=0x178d33d6 updateID= - merging object Type 0x00000002 id=0x157801dd updateID= - merging object Type 0x00000002 id=0x139ecba0 updateID= - merging object Type 0x00000002 id=0x14790223 updateID= - merging object Type 0xce534352 id=0x330b7f78 updateID= - merging object Type 0xce534352 id=0x357e737a updateID= - merging object Type 0xce534352 id=0x32261b0b updateID= - merging object Type 0xce534352 id=0x3605630d updateID= - merging object Type 0xce534352 id=0x3362060d updateID= - merging object Type 0x00000003 id=0x0acddaf9 updateID= - merging object Type 0x00000003 id=0x0f8d33d6 updateID= - merging object Type 0x00000003 id=0x0d7801dd updateID= - merging object Type 0x00000003 id=0x0b9ecba0 updateID= - merging object Type 0x00000003 id=0x0c790223 updateID= dbupgrade.sh: #11: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... - merging object Type 0x00000004 id=0x18000000 updateID= dbupgrade.sh: #12: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3ceb7208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x38751a1d updateID= - merging object Type 0x00000001 id=0x3d1a7208 updateID= - merging object Type 0x00000001 id=0x3ffa7208 updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x3d1b7208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3ffb7208 updateID= - merging object Type 0x00000001 id=0x3a720866 updateID= - merging object Type 0x00000001 id=0x3cea7208 updateID= - merging object Type 0x00000001 id=0x38740a1f updateID= - merging object Type 0x00000002 id=0x13fe6c70 updateID= - merging object Type 0x00000002 id=0x139141c5 updateID= - merging object Type 0x00000002 id=0x1541f42d updateID= - merging object Type 0x00000002 id=0x16cbe190 updateID= - merging object Type 0x00000002 id=0x16dfab55 updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x14bb4988 updateID= - merging object Type 0x00000002 id=0x15d3b399 updateID= - merging object Type 0x00000002 id=0x16dacd73 updateID= - merging object Type 0x00000002 id=0x125f4575 updateID= - merging object Type 0x00000002 id=0x17125823 updateID= - merging object Type 0x00000002 id=0x13678510 updateID= - merging object Type 0xce534351 id=0x2a08664f updateID= - merging object Type 0xce534351 id=0x29495c6d updateID= - merging object Type 0xce534352 id=0x330b7f78 updateID= - merging object Type 0xce534352 id=0x357e737a updateID= - merging object Type 0xce534352 id=0x330b6865 updateID= - merging object Type 0xce534352 id=0x37281063 updateID= - merging object Type 0xce534352 id=0x324f7563 updateID= - merging object Type 0xce534352 id=0x310b6a65 updateID= - merging object Type 0xce534352 id=0x32261b0b updateID= - merging object Type 0xce534352 id=0x3605630d updateID= - merging object Type 0xce534352 id=0x3362060d updateID= - merging object Type 0xce534352 id=0x3026190b updateID= - merging object Type 0xce534352 id=0x32260c16 updateID= - merging object Type 0xce534352 id=0x34530014 updateID= - merging object Type 0x00000003 id=0x0bfe6c70 updateID= - merging object Type 0x00000003 id=0x0b9141c5 updateID= - merging object Type 0x00000003 id=0x0d41f42d updateID= - merging object Type 0x00000003 id=0x0ecbe190 updateID= - merging object Type 0x00000003 id=0x0edfab55 updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0cbb4988 updateID= - merging object Type 0x00000003 id=0x0dd3b399 updateID= - merging object Type 0x00000003 id=0x0edacd73 updateID= - merging object Type 0x00000003 id=0x0a5f4575 updateID= - merging object Type 0x00000003 id=0x0f125823 updateID= - merging object Type 0x00000003 id=0x0b678510 updateID= dbupgrade.sh: #13: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c56471c updateID= - merging object Type 0x00000001 id=0x3b54400e updateID= - merging object Type 0xce534353 id=0x2354400e updateID= - merging object Type 0x00000001 id=0x39446f66 updateID= - merging object Type 0x00000001 id=0x3a54411e updateID= - merging object Type 0x00000001 id=0x3d56471c updateID= - merging object Type 0xce534353 id=0x2556471c updateID= - merging object Type 0x00000001 id=0x3b457d07 updateID= - merging object Type 0x00000001 id=0x3a54400e updateID= - merging object Type 0x00000001 id=0x3b54411e updateID= - merging object Type 0xce534353 id=0x2354411e updateID= - merging object Type 0x00000001 id=0x39457f64 updateID= - merging object Type 0x00000002 id=0x11c0b779 updateID= - merging object Type 0x00000002 id=0x17270f8a updateID= - merging object Type 0x00000002 id=0x12df5f97 updateID= - merging object Type 0x00000002 id=0x17ab16c7 updateID= - merging object Type 0x00000002 id=0x152384c4 updateID= - merging object Type 0x00000002 id=0x14d615df updateID= - merging object Type 0x00000002 id=0x12f11baf updateID= - merging object Type 0x00000002 id=0x1053f24d updateID= - merging object Type 0x00000002 id=0x155db84d updateID= - merging object Type 0x00000003 id=0x09c0b779 updateID= - merging object Type 0x00000003 id=0x0f270f8a updateID= - merging object Type 0x00000003 id=0x0adf5f97 updateID= - merging object Type 0x00000003 id=0x0fab16c7 updateID= - merging object Type 0x00000003 id=0x0d2384c4 updateID= - merging object Type 0x00000003 id=0x0cd615df updateID= - merging object Type 0x00000003 id=0x0af11baf updateID= - merging object Type 0x00000003 id=0x0853f24d updateID= - merging object Type 0x00000003 id=0x0d5db84d updateID= dbupgrade.sh: #14: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #15: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3ceb7208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x38751a1d updateID= - merging object Type 0x00000001 id=0x3d1a7208 updateID= - merging object Type 0x00000001 id=0x3ffa7208 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x3d1b7208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3ffb7208 updateID= - merging object Type 0x00000001 id=0x3a720866 updateID= - merging object Type 0x00000001 id=0x3cea7208 updateID= - merging object Type 0x00000001 id=0x38740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000002 id=0x13fe6c70 updateID= - merging object Type 0x00000002 id=0x139141c5 updateID= - merging object Type 0x00000002 id=0x16cbe190 updateID= - merging object Type 0x00000002 id=0x16dfab55 updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x14bb4988 updateID= - merging object Type 0x00000002 id=0x15d3b399 updateID= - merging object Type 0x00000002 id=0x16dacd73 updateID= - merging object Type 0x00000002 id=0x125f4575 updateID= - merging object Type 0x00000002 id=0x1170936e updateID= - merging object Type 0x00000002 id=0x17125823 updateID= - merging object Type 0x00000002 id=0x13678510 updateID= - merging object Type 0xce534352 id=0x330b7f78 updateID= - merging object Type 0xce534352 id=0x357e737a updateID= - merging object Type 0xce534352 id=0x330b6865 updateID= - merging object Type 0xce534352 id=0x37281063 updateID= - merging object Type 0xce534352 id=0x324f7563 updateID= - merging object Type 0xce534352 id=0x310b6a65 updateID= - merging object Type 0xce534352 id=0x32261b0b updateID= - merging object Type 0xce534352 id=0x3605630d updateID= - merging object Type 0xce534352 id=0x3362060d updateID= - merging object Type 0xce534352 id=0x3026190b updateID= - merging object Type 0xce534352 id=0x32260c16 updateID= - merging object Type 0xce534352 id=0x34530014 updateID= - merging object Type 0x00000003 id=0x0bfe6c70 updateID= - merging object Type 0x00000003 id=0x0b9141c5 updateID= - merging object Type 0x00000003 id=0x0ecbe190 updateID= - merging object Type 0x00000003 id=0x0edfab55 updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0cbb4988 updateID= - merging object Type 0x00000003 id=0x0dd3b399 updateID= - merging object Type 0x00000003 id=0x0edacd73 updateID= - merging object Type 0x00000003 id=0x0a5f4575 updateID= - merging object Type 0x00000003 id=0x0970936e updateID= - merging object Type 0x00000003 id=0x0f125823 updateID= - merging object Type 0x00000003 id=0x0b678510 updateID= dbupgrade.sh: #16: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #17: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. - merging object Type 0x00000001 id=0x397e5b0f updateID= - merging object Type 0xce534353 id=0x217e5b0f updateID= - merging object Type 0x00000002 id=0x14cb918f updateID= - merging object Type 0xce534352 id=0x351f0b1a updateID= - merging object Type 0x00000003 id=0x0ccb918f updateID= dbupgrade.sh: #18: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Mon Mar 20 20:22:43 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 20 20:22:43 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:c7:d8:ff:bd:ae:e3:44:52:90:65:6c:e1:bf:dd:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:af:4c:ed:5a:fd:5c:61:00:9c:df:ef:05:bc:98:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:00 2023 Not After : Mon Mar 20 18:52:00 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:8c:e8:51:d8:2f:01:24:fb:9a:56:0a:e7:00:c3: b4:98:9f:dc:ae:f3:dc:96:3e:de:07:59:90:27:10:a3: 7e:a3:fe:8b:aa:38:04:ce:81:8a:ca:96:dd:e1:26:7d: 56:f8:ab:d3:57:9c:0b:c5:81:e9:39:25:00:37:16:43: 22:f9:60:00:d6:f9:19:12:7b:66:fd:28:4b:9c:4f:67: 28:96:af:02:25:1a:5a:2d:76:e8:3d:87:52:99:3f:b3: a4:52:ad:92:19:ee:11:1b:88:fb:a7:c7:95:5b:13:63: 74:54:91:3b:ef:d8:80:44:07:d1:bc:93:fe:18:ac:de: 1e:70:da:27:fe Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:17:92:58:fb:76:52:9b:f9:59:b2: 8a:dd:9a:fe:33:28:68:59:d7:73:88:6b:6e:a8:68:28: 2f:55:d4:41:84:41:81:da:d8:7d:43:a0:2e:a7:78:d8: 7c:2c:bc:27:16:1f:8c:97:6d:5f:2a:d6:82:e6:32:55: 31:7c:96:63:f0:50:bb:02:41:0d:96:a5:39:fb:e3:06: ae:1a:5d:70:43:47:68:f2:da:1b:30:55:bf:67:ed:83: d3:ce:66:c7:cb:fd:69:b1:a4:92:24:b7:0d:bc:f8:9d: fb:40:52:33:36:6d:88:12:50:45:ae:3c:ef:4c:af:2a: b6:26:6f:be:a3:ff:f3:c3:7a:e2 Fingerprint (SHA-256): EF:6C:12:12:91:E6:70:20:1D:39:6A:C3:1F:18:DA:82:49:B7:0A:F1:5D:A7:8D:68:02:2D:59:39:D6:D5:A6:EC Fingerprint (SHA1): 7E:99:AE:D0:14:50:A7:09:AA:0F:14:48:34:CC:CF:F5:3D:89:C2:F0 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:23 2023 Not After : Mon Mar 20 18:52:23 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:48:9c:3f:7d:f8:5c:5b:4f:ce:a9:8d:fe:d4:33:47: cc:81:ca:b6:3e:53:da:2f:eb:93:3e:1c:e0:f4:d5:20: de:a4:4b:79:b1:b4:e4:cb:4e:45:f4:a7:13:79:e5:f4: f7:c4:1b:a4:51:07:06:01:1f:17:7c:5b:d5:48:18:ae: 52:ed:9f:15:34:9d:96:9a:f2:c9:fb:32:fc:0c:5f:46: c6:21:57:c8:2e:da:ee:9c:a6:6e:73:4a:dd:b2:4d:74: 2a Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:a5:b2:7e:ad:d8:34:ce:b4:ee:0b: 18:54:23:88:e9:3a:dd:b5:05:f0:03:da:4e:81:19:40: f9:f2:67:ea:7b:74:65:b0:b2:5e:09:e7:95:0d:59:3b: ba:9d:7c:c6:07:63:00:ed:0a:f0:7f:91:a9:cc:c7:92: fc:ca:60:4e:eb:e4:8d:02:42:00:b3:23:6d:23:07:5e: 52:a2:31:65:00:8d:a1:64:74:6d:12:0d:5d:84:bf:26: 6c:af:64:6d:04:96:49:60:c2:21:a3:41:3e:63:45:51: 61:12:ed:e1:88:a1:a3:1d:75:de:96:48:f8:8a:74:c1: 85:55:77:22:a5:f6:d4:8e:23:d3:a6 Fingerprint (SHA-256): 31:66:AB:9A:98:DF:62:A9:AF:9F:D4:B9:44:9C:80:6F:20:6C:E7:34:65:0B:F9:07:9A:73:EE:D8:B5:6D:E6:96 Fingerprint (SHA1): 5E:07:04:1E:56:77:38:E5:D8:E8:05:B4:A4:BE:5C:D4:48:CD:6E:31 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:27:da:07:d1:b4:6e:9c:47:e1:e4:e0:43:c5:16:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:00 2023 Not After : Mon Mar 20 18:52:00 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:8c:e8:51:d8:2f:01:24:fb:9a:56:0a:e7:00:c3: b4:98:9f:dc:ae:f3:dc:96:3e:de:07:59:90:27:10:a3: 7e:a3:fe:8b:aa:38:04:ce:81:8a:ca:96:dd:e1:26:7d: 56:f8:ab:d3:57:9c:0b:c5:81:e9:39:25:00:37:16:43: 22:f9:60:00:d6:f9:19:12:7b:66:fd:28:4b:9c:4f:67: 28:96:af:02:25:1a:5a:2d:76:e8:3d:87:52:99:3f:b3: a4:52:ad:92:19:ee:11:1b:88:fb:a7:c7:95:5b:13:63: 74:54:91:3b:ef:d8:80:44:07:d1:bc:93:fe:18:ac:de: 1e:70:da:27:fe Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:17:92:58:fb:76:52:9b:f9:59:b2: 8a:dd:9a:fe:33:28:68:59:d7:73:88:6b:6e:a8:68:28: 2f:55:d4:41:84:41:81:da:d8:7d:43:a0:2e:a7:78:d8: 7c:2c:bc:27:16:1f:8c:97:6d:5f:2a:d6:82:e6:32:55: 31:7c:96:63:f0:50:bb:02:41:0d:96:a5:39:fb:e3:06: ae:1a:5d:70:43:47:68:f2:da:1b:30:55:bf:67:ed:83: d3:ce:66:c7:cb:fd:69:b1:a4:92:24:b7:0d:bc:f8:9d: fb:40:52:33:36:6d:88:12:50:45:ae:3c:ef:4c:af:2a: b6:26:6f:be:a3:ff:f3:c3:7a:e2 Fingerprint (SHA-256): EF:6C:12:12:91:E6:70:20:1D:39:6A:C3:1F:18:DA:82:49:B7:0A:F1:5D:A7:8D:68:02:2D:59:39:D6:D5:A6:EC Fingerprint (SHA1): 7E:99:AE:D0:14:50:A7:09:AA:0F:14:48:34:CC:CF:F5:3D:89:C2:F0 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 18:52:23 2023 Not After : Mon Mar 20 18:52:23 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:48:9c:3f:7d:f8:5c:5b:4f:ce:a9:8d:fe:d4:33:47: cc:81:ca:b6:3e:53:da:2f:eb:93:3e:1c:e0:f4:d5:20: de:a4:4b:79:b1:b4:e4:cb:4e:45:f4:a7:13:79:e5:f4: f7:c4:1b:a4:51:07:06:01:1f:17:7c:5b:d5:48:18:ae: 52:ed:9f:15:34:9d:96:9a:f2:c9:fb:32:fc:0c:5f:46: c6:21:57:c8:2e:da:ee:9c:a6:6e:73:4a:dd:b2:4d:74: 2a Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:a5:b2:7e:ad:d8:34:ce:b4:ee:0b: 18:54:23:88:e9:3a:dd:b5:05:f0:03:da:4e:81:19:40: f9:f2:67:ea:7b:74:65:b0:b2:5e:09:e7:95:0d:59:3b: ba:9d:7c:c6:07:63:00:ed:0a:f0:7f:91:a9:cc:c7:92: fc:ca:60:4e:eb:e4:8d:02:42:00:b3:23:6d:23:07:5e: 52:a2:31:65:00:8d:a1:64:74:6d:12:0d:5d:84:bf:26: 6c:af:64:6d:04:96:49:60:c2:21:a3:41:3e:63:45:51: 61:12:ed:e1:88:a1:a3:1d:75:de:96:48:f8:8a:74:c1: 85:55:77:22:a5:f6:d4:8e:23:d3:a6 Fingerprint (SHA-256): 31:66:AB:9A:98:DF:62:A9:AF:9F:D4:B9:44:9C:80:6F:20:6C:E7:34:65:0B:F9:07:9A:73:EE:D8:B5:6D:E6:96 Fingerprint (SHA1): 5E:07:04:1E:56:77:38:E5:D8:E8:05:B4:A4:BE:5C:D4:48:CD:6E:31 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:8f:b2:2f:c9:65:16:f0:a4:64:64:a5:a9:b4:b9:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b6:d3:0e:9e:cf:12:2a:05:84:1a:93:23:9e:27:45:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:50:25:6e:21:54:8b:e1:8c:b9:41:c1:fb:4f:29:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 99:21:06:4b:71:de:f8:36:b4:6e:3d:c3:fc:7a:be:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 18:72:3c:b3:ab:a0:e0:38:bd:8a:20:27:67:98:fc:d6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a6:a3:5c:5e:d2:d3:60:2c:39:63:36:24:58:d1: e6:53 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 70:2d:ad:0f:e2:c0:94:88:15:33:c0:46:fc:5c:5f:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 44:ee:53:21:c9:59:15:19:57:58:31:4a:dd:cc:ac:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 22:10:cf:f3:c7:6e:f8:52:45:fb:21:97:3c:00:59:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f5:64:20:b4:38:63:5d:91:52:23:ce:81:6c:a7:2e:a1 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 5f:f3:f8:c4:ba:e1:c7:3b:47:b5:6c:6f:8d:6a:bb:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 33:c7:1c:de:89:28:cc:78:22:75:9a:ec:75:9a:2d:aa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e5:e4:7a:5d:e9:a3:f0:ba:20:be:ba:c3:d5:54:29:ec Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:b4:3f:bf:b7:47:ef:da:e1:5f:5a:c9:51:53:cb:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 59:87:7a:db:86:1a:67:e2:55:26:24:a8:73:12:d3:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e3:e2:67:3d:8c:24:16:b8:56:bd:bf:79:ca:61:4a:fa Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9e:b3:7b:cf:7f:a6:41:90:4a:dc:68:a4:cb:67: c8:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5f:97:0a:01:2c:7b:c1:cb:1e:5f:05:24:c0:df:04:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:6c:4b:9c:37:a6:d5:ad:1b:f0:23:18:0f:b7:cd:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ae:55:1e:f8:07:a6:cc:db:92:c9:70:8f:57:c9:ec:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 13:f0:c5:9c:a3:18:29:35:a8:e5:31:63:40:f7:b5:b3 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ae:2e:c6:8f:31:a1:dd:4e:55:48:09:ba:96:2b:c8:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3e:38:ce:cf:4e:c7:2a:a8:30:a7:f9:40:16:c5:e0:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c7:e1:79:8c:db:15:9c:e6:15:19:78:4d:e1:73:57:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 97:d5:5a:3c:6e:81:4e:5a:17:5a:d6:2f:d6:85:0a:31 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9d:1b:8c:ee:0e:f9:7d:85:e6:85:01:d4:4d:8a: ed:1e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e8:51:8d:6c:3f:27:ac:d5:ef:60:40:74:aa:cd:c6:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4f:af:e6:34:c1:b0:c6:59:be:2e:d7:8f:8c:3a:1c:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b3:9b:a3:f5:dd:30:15:c2:d1:d5:d2:c4:15:72:62:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f0:a5:85:ca:61:cd:a3:ff:90:55:3b:0a:04:54:ce:28 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 27:63:17:2e:f5:9d:68:0f:d0:f1:5b:c6:f5:7d:40:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:95:03:74:1e:49:b2:6d:d3:5b:e7:d0:88:09:7c:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 80:4f:92:d7:3a:ae:44:64:dd:ec:5f:f1:8f:92:05:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:7f:d5:14:c0:db:e6:7a:ad:84:b5:5b:c0:3a:c7:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e8:9f:e4:05:b3:8e:d2:71:58:e7:22:b3:b9:fa:fc:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:c9:e8:25:32:c8:26:bf:86:d8:79:9b:cb:73:de:c1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:84:7e:48:b5:7f:69:32:af:28:62:6f:f7:26:56: 12:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: fc:ae:67:33:31:47:14:f8:40:38:d5:4d:ea:f9:d7:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:61:df:88:5c:45:a3:5c:1f:40:5e:77:2b:3a:df:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 39:05:4a:a3:6b:2a:05:c8:13:c9:5c:5d:df:bb:c7:9a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 82:3d:c1:fc:d5:c4:df:01:05:12:26:3a:6e:58:8c:bc Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: b2:b1:c3:73:f4:31:c8:73:31:82:62:c3:ab:0d:37:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e7:e8:21:32:c7:39:64:c8:57:f3:49:a2:32:50:e9:28 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 15:93:89:49:fc:f2:9a:24:b6:98:d2:4b:f6:19:5e:40 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 39:70:ca:cf:dd:4a:9a:b7:2a:45:67:97:f4:eb:cb:9a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ab:e4:fb:36:29:87:54:4b:d1:35:46:67:88:f8:c8:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:63:fd:a9:15:28:4f:58:6f:5a:6c:0f:99:2d:96:fe Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:61:f7:b5:85:ac:70:62:66:7c:fc:9a:ea:ac:0d: 5f:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 8c:00:a1:ac:2b:0f:0e:37:73:99:94:15:17:e3:a9:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:78:2b:a7:9f:d3:0f:cf:94:54:c1:fe:18:b1:a9:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 85:59:c4:c2:0e:69:76:7a:bb:dc:66:01:d3:28:73:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: f1:b0:07:e5:a3:60:66:a1:cd:c9:ee:96:91:85:04:89 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 0d:89:24:6c:90:fa:de:e0:67:1a:74:35:25:d1:55:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:c5:dd:e0:b1:ec:3e:07:db:61:63:a1:34:e4:c9:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:17:96:4b:95:1b:e8:e4:ff:d7:53:06:1a:4c:f9:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:83:1c:59:c8:8e:6d:9f:b7:95:a3:52:aa:ef:27:4e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:62:00:09:f1:17:32:8a:1c:64:38:fa:11:58:67: 16:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:71:a8:84:a6:10:65:bd:ac:85:27:c3:ee:97:d0:6f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:20:b9:3c:6e:d1:ee:2a:05:8f:92:e1:9f:88:61:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0a:71:56:41:3f:71:d0:96:0f:23:e7:9e:1f:d1:00:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 91:df:b0:ee:6f:19:2e:7c:5a:55:85:d0:29:99:b8:b7 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 04:30:79:58:47:ae:85:fe:4d:9c:42:1e:28:2b:c0:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6b:2a:2d:52:4a:72:e2:db:b1:8b:0f:84:7c:48:0a:4a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: dc:8d:5b:75:ea:f8:9e:46:2c:e5:c7:aa:91:16:01:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 63:d1:33:68:b9:40:c6:a1:9f:8a:69:03:31:7c:90:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 00:04:9f:d0:42:e9:75:af:28:1b:4e:90:36:16:1b:a4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f1:b9:9c:0d:b5:85:1f:bf:91:d1:af:80:6b:5b:72:85 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:59:25:06:68:77:a6:9e:cd:d5:50:f8:2a:31:8a: 14:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c7:77:08:32:c7:3a:79:7d:89:5d:58:c2:a2:c0:85:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 10:c7:9a:96:a3:e2:bb:eb:28:50:14:90:e1:c5:2a:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 73:b7:06:9d:3f:18:b1:bf:30:98:ae:0f:dd:33:fc:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7a:50:6a:b0:4a:8a:b4:34:8e:dd:4f:60:9b:05:c3:10 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 99:7d:13:e9:64:e3:87:19:b5:5a:85:6c:49:91:bd:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5c:95:04:f9:8f:0d:46:8b:3b:76:d8:4f:13:04:42:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 94:70:a1:b4:c7:53:71:11:4f:db:7d:e4:0e:84:d9:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7f:8e:86:9a:e2:cc:33:b8:af:db:66:e5:c3:ac:0c:4c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a8:a1:f5:40:d0:f4:04:d2:44:26:16:8a:1c:31:36:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:a5:ce:b8:21:eb:b8:56:f7:f8:22:78:25:12:7e:fb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5a:4b:20:cf:17:05:66:16:7c:cc:68:2c:55:f8: 3b:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8f:8e:88:83:f3:57:f4:e7:1d:1a:92:84:4f:cf:3b:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 27:ff:5d:27:11:f8:00:59:ca:69:a6:c1:9b:05:4d:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: e5:2a:5b:a9:b2:ba:2c:68:e4:75:28:89:c9:fb:8f:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 3f:2c:27:70:ed:a9:f9:72:99:f8:eb:15:75:b9:45:b2 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 6a:b9:00:47:33:16:8e:f6:0e:76:d7:9b:f9:8b:68:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:50:ad:fc:db:61:01:78:70:19:cb:0b:12:94:25:f2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 61:0f:d4:86:e5:78:79:fb:fb:39:a1:42:48:79:8c:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:8d:13:a1:bc:c0:93:56:fc:99:cc:25:80:7a:f7:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4d:72:15:d1:1e:26:bc:0a:b2:fa:9c:fa:e5:34:af:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:31:22:35:13:2e:50:68:1e:32:4f:6b:cd:b2:23:1f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c0:19:6a:99:f1:44:1e:b7:37:4b:26:69:ca:ad: 61:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5c:44:cd:4e:fd:cc:df:62:b0:2c:b8:f4:40:39:35:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 03:4a:df:87:68:06:0d:ce:28:82:a3:d7:35:6a:8a:cd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 24:d3:0a:7b:35:88:55:08:95:dc:dc:f3:5a:e0:12:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5e:f2:8a:5f:1b:0e:18:99:ac:89:d5:ac:a3:8f:d1:63 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: b8:7b:10:d6:cf:96:7a:0d:ed:36:f8:53:89:04:c3:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:0a:3f:90:6a:c0:95:1a:d2:90:be:84:3a:e9:75:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6e:4e:60:a3:e0:60:fa:11:69:31:ef:c6:b5:a6:f5:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 36:b8:d5:14:4e:a6:7a:4d:5e:aa:1c:1f:2f:24:ed:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:94:24:2f:f1:35:b4:4c:36:9b:58:47:ba:e7:91:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 27:64:22:96:c9:05:6a:c5:05:59:f8:8d:8b:17:9c:37 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4b:fd:ce:0a:3d:4b:b2:ae:ec:ce:e3:1f:c9:e6: 62:05 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4b:1e:fc:93:64:65:45:e2:cb:00:60:d6:66:14:86:bf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:fe:a7:bb:23:ff:8a:9c:61:ba:56:ba:84:cd:af:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 18:74:da:3d:eb:2f:d9:5d:9b:88:c1:c3:f2:f7:98:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9d:dc:c9:65:ec:d8:56:4b:81:29:eb:06:50:39:f0:6f Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:0c:83:c8:42:4f:a7:e1:15:9b:fc:66:9f:33:b1:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4b:62:13:41:62:92:4e:2b:05:f3:6a:c0:a9:07:50:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:ae:18:37:7f:4d:18:e3:5a:df:93:c5:7d:78:ed:ab Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:9c:0f:5d:d5:d9:d7:82:10:8c:03:c8:b5:82:06: 88:ec Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:48:8e:95:6f:10:01:87:b6:5b:16:90:fc:46:eb:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:1b:3b:da:65:b1:54:13:d8:4f:41:83:5a:dc:8c:6c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:93:fb:88:94:2e:61:c1:39:ee:ed:5e:d0:39:ad: fb:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:81:bd:7a:1b:df:16:45:a1:d1:34:ab:f7:4f:e5:08 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:34:9c:3f:ad:98:15:72:a6:18:42:6e:a3:8c:4b: f7:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:b2:3a:2e:8a:66:a0:d0:ca:d3:16:36:5d:bf:44:e4 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:d9:7f:c2:bd:2d:1d:19:bb:41:6b:ec:db:df:02: 81:57 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ee:4d:5a:8a:c4:0f:7c:a4:dd:a8:98:a1:48:6e:59:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:68:fb:bd:ac:b6:4d:70:5f:b4:d8:fb:73:5c:3b:72 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:f7:b3:5d:2f:76:f1:c4:37:4d:3b:cd:aa:04:04: c1:4d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 95:3b:11:2a:ac:7c:35:87:f4:c4:11:08:e5:b5:78:e5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:ac:4c:28:94:33:7d:e8:7a:5f:66:00:c5:35:ca: 40:be tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:fc:d6:19:5c:54:c0:fe:0e:47:80:90:db:88:0d:37 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:2d:27:dc:3a:17:61:50:dc:d2:b3:e7:c7:dd:94: d6:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 78:54:bb:da:5e:24:9d:b2:1d:6c:d0:c7:78:fd:ce:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:55:06:5d:02:08:c2:f5:57:ed:2e:be:d6:f3:b7:3e Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:4c:5f:a0:56:31:30:e1:cd:20:38:99:50:a1:a6: b3:2c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:c0:f7:e2:03:72:5e:12:0e:14:e0:30:ed:85:f4:ba Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9b:3a:00:53:74:da:c3:69:23:67:f5:ee:ee:73:d1:bc Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:31:69:b9:57:7e:a1:2a:0d:9d:35:c8:c4:7f:38: cc:e7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:fb:7f:cd:f0:91:c7:0f:85:5a:7f:7b:a8:09:0e:1d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dd:70:15:ad:f4:0d:2f:99:3e:62:c5:28:a7:1e: 2b:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:26:d5:10:21:fc:51:82:6d:88:5f:53:96:7a:99:7b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:6a:4e:1c:80:c4:c9:c4:5e:10:b7:6e:eb:98:e5: 12:19 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:18:9e:1c:31:a9:ab:38:cc:8d:63:c2:14:fb:f6:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 64:ba:0d:04:f8:c2:51:dd:71:4b:ed:4f:e2:99:73:31 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:70:c7:4b:ad:a4:f7:42:77:77:df:13:d5:b1:90: d2:60 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fe:88:91:06:04:2f:4b:b0:4e:81:d4:7a:36:fb:41:8c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:ef:90:74:8d:c3:0c:6d:f5:03:22:a9:0f:3f:7f: 28:1e tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 99:0b:02:42:68:9f:d7:bc:dd:66:b0:b7:63:c8:c9:46 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:34:ff:fe:08:ce:96:24:39:1b:14:d7:0c:fd:6b: 88:78 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:3d:44:ce:1a:04:46:c5:f2:f5:c8:23:61:aa:27:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:c4:4e:de:b1:32:a9:6c:50:b0:f9:98:b5:ac:b2:38 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:c8:97:e1:f1:33:27:80:f7:ff:b7:1a:ba:f1:6c: 34:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:e5:41:ca:e1:19:0a:ed:76:d3:d4:b0:09:e6:41:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:31:ec:77:3f:00:30:aa:77:1e:e2:cd:a3:b1:4e:4b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:75:04:fb:ae:d2:3e:b7:90:c1:3c:d2:e9:99:49: 89:62 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:58:f3:3f:14:70:af:e2:17:1c:9e:a8:8c:8b:fa:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:a8:f9:12:af:9b:df:9f:81:37:52:20:19:45:cf:3d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:06:58:b6:23:22:06:12:d4:d0:f4:d6:ba:ac:76: 6e:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b1:26:9b:47:5b:40:35:2f:4a:ce:cf:c0:a9:3c:38:d9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:5f:15:ac:43:7d:26:f0:b8:24:e9:70:7a:1d:a6: 19:75 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:09:e4:60:cd:4c:ff:8e:31:06:54:fd:f5:85:4a:83 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:94:b9:38:a6:e2:fb:3c:32:a1:e7:18:8f:c7:1a: 11:c4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:1b:c0:25:e5:78:56:ae:84:56:2c:a0:7b:41:c7:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:60:6f:f2:84:a4:db:2c:13:cd:7f:fb:6e:69:00:3f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:61:a5:6f:49:fa:24:fd:81:87:db:70:aa:86:ed: 3f:4b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:14:d6:4c:83:a7:fd:0d:41:ea:c6:42:e4:b1:a4:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b3:d3:d5:2b:83:8a:c6:dd:c8:bc:e1:94:ef:ef:81:ea Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:87:b5:f4:4d:ca:c6:f5:98:2b:3e:3f:3a:9e:77: 7a:cf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:eb:6e:7d:07:e6:1d:47:a2:a0:14:b8:99:70:5d:02 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1a:a3:04:60:3d:53:24:bc:c1:4f:38:3d:de:53: 16:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d7:e1:27:45:a9:2c:92:49:ef:0c:7d:55:21:93:bb:08 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:26:41:22:6d:1c:6a:3e:cc:42:d6:f1:d6:c2:37: d3:19 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 90:69:33:ca:7b:1e:85:8a:8e:f3:82:43:0d:58:6b:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:6c:11:ca:c5:37:a8:5d:cf:12:83:5a:35:fc:a1:5f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:5d:25:a4:bd:f3:b6:a8:03:e6:d7:24:de:cf:6a: 43:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6b:89:5c:9e:38:0f:8e:81:fe:66:6f:0d:e3:65:f1:d6 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:21:5a:1a:15:93:2c:d3:dd:b3:9c:2b:a5:87:d3: e6:48 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 86:3b:50:2d:87:52:d0:b5:fb:77:e5:26:8c:3d:fa:a3 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:ab:ce:58:b7:4c:23:6e:9f:bd:d4:15:87:99:8a: f6:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 52:79:3c:63:d9:db:c8:0d:77:58:83:de:19:48:8c:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 44:23:36:5b:0a:31:b5:f5:f5:38:6e:a5:50:6e:80:f2 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:45:26:4a:d5:ac:94:d4:bd:a7:50:b6:c4:1c:90: 05:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:a4:18:45:8a:a3:2f:c3:95:71:a9:9d:de:52:ec:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:b9:7e:5a:7e:de:57:a9:fd:c6:b0:3d:16:32:26:f6 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:25:58:55:22:2a:4b:f3:3a:63:d1:0d:56:c6:30: 97:3d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 27:6d:0f:32:20:1f:c5:8c:55:a9:19:a0:2c:34:09:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c3:15:79:55:2d:f0:ce:60:a3:67:17:79:a0:8b: da:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:1f:60:79:ff:1b:5d:c0:0f:ca:15:9f:fe:14:ef:00 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:c0:c0:df:00:b5:89:16:84:cf:32:d5:d4:99:68: c4:60 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:0d:dc:0c:45:80:82:a2:84:ca:61:0c:92:16:dc:f4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:d9:1c:37:7e:33:a9:6d:c6:b0:21:e2:4b:47:c5:d1 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:08:21:45:41:26:98:a7:b1:d3:f6:49:2e:b6:3f: 56:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8a:d2:1b:76:d6:9f:02:dd:09:aa:2b:33:03:5b:ec:16 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:e6:b2:c2:e4:d4:29:ac:9c:0a:3c:af:7e:22:36: 8d:e9 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:6e:82:9f:12:6f:b6:4c:7a:7b:d9:fb:63:3f:5e:da Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:04:eb:9e:37:84:f8:5e:75:7f:57:0a:9b:f6:d2: 8a:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 18:5b:4d:26:4b:de:56:bc:a1:4d:b7:a7:ee:83:d7:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:2d:f1:d1:07:b2:f7:8d:9e:8d:f8:2c:b5:99:53:1e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:7a:25:01:e4:80:5c:e0:5e:60:57:57:89:e3:47: ba:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:11:e9:12:dd:46:0d:67:8c:8c:cd:3e:64:b5:37:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0d:4a:93:41:f2:37:48:50:7f:ce:71:c7:17:17:26:4e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:1d:d5:60:5b:85:66:24:76:22:c7:35:bd:2f:5f: cc:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c1:de:02:93:80:08:b7:59:e1:81:ce:cd:1e:e9:5d:45 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:27:cf:60:95:94:f4:6d:a6:82:a9:f7:8b:4a:45: 65:2b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d4:9c:c0:75:c3:a8:33:70:db:79:6b:79:5a:33:88:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:d4:3b:a8:15:51:0b:5f:a1:dd:c1:84:06:b4:f8: f3:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:23:c6:a2:d9:b5:56:98:36:76:4b:bb:d8:bb:d5:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 99:fe:e2:68:3a:63:ed:27:42:d5:b2:6e:d7:fb:98:ca Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:60:a6:4b:9d:b2:5f:d9:b1:df:34:c2:02:39:4b: f1:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:4e:ca:b4:1d:5f:cd:98:e0:71:ca:76:70:61:70:5f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:a4:30:6d:db:28:bf:f7:db:0a:79:c3:d4:23:5e: 9b:9f tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3b:c8:61:b1:ad:21:63:f1:d5:61:7f:c5:76:6c:2e:4b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:d2:3b:92:0a:7f:55:1a:9e:78:41:30:0f:30:a1: 02:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 07:6f:40:08:d6:1c:8e:07:a8:ac:4d:69:94:fb:01:4c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 26:4a:c8:89:e2:ab:2c:85:a4:8c:97:89:0c:54:a8:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c5:3e:eb:70:9d:f0:bf:18:00:5c:fe:5d:bd:2c:42:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9d:5b:e2:38:a5:8c:0a:ed:df:9d:e2:eb:85:9a:df:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 58:11:5c:9d:92:57:67:df:d1:c9:e0:61:29:37:a7:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 32:04:0a:26:45:1b:52:5c:82:f0:18:27:59:bb:96:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:d4:05:83:b1:53:a9:6a:74:13:2c:3d:87:1d:e3:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:d8:29:ed:23:e6:e8:ac:bf:3a:5e:dc:50:2f:53:50 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 53:2a:d1:07:14:c9:16:54:c1:b1:1e:d4:a9:f8:49:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ec:3b:18:9e:ba:bd:28:81:43:66:1b:9a:6d:97:23:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d7:04:07:fd:46:12:e1:25:ba:dd:4f:4d:30:e0:fe:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:e1:49:2c:70:7b:72:a8:3f:6a:f4:a0:5b:b5:12:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:e2:f5:aa:d5:81:9a:e5:d5:66:cf:ac:db:2b:5d:16 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:32:dc:57:d7:7a:c2:2e:fb:25:2b:93:66:43:6f: 5b:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 52:9f:76:99:0b:af:72:4b:35:c9:84:e6:e3:64:f4:ed Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:ab:c5:e6:19:23:97:7b:e8:1a:99:ab:90:1f:ff: 95:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:63:1e:02:2e:f8:c4:7e:72:8c:98:47:32:7f:15:7a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:16:45:53:70:b1:bd:d2:bc:8b:5e:de:3e:84:36: 53:b2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:6b:b2:49:63:39:cf:49:df:be:06:68:91:fc:14:81 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:fe:27:6b:f3:3d:16:e8:46:03:ef:a6:59:49:aa: 8a:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:36:6c:b9:16:c8:5f:d6:69:b9:7a:6b:32:5d:98:7e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:03:71:f2:b6:59:0d:c2:dd:c3:a9:4c:37:4b:aa: d9:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:ca:2f:ee:39:8c:8d:5d:8f:58:d3:1a:44:d9:b7:08 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a0:b7:96:3b:47:c3:18:98:28:56:4c:c2:67:dc: 17:a8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:d7:95:15:d4:84:fa:06:d6:01:29:8c:0f:22:5f:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:d5:54:85:b4:75:9a:c1:3e:56:99:af:ae:26:5f:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 57:c6:1f:0a:45:0f:53:96:f0:38:38:f0:e4:d3:b2:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:d8:8b:54:ac:b6:d3:a7:95:ee:ea:7d:30:ee:b1:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:f7:3d:27:41:e2:83:f6:da:ca:9a:e9:d6:1b:36:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b0:1e:1f:fe:cb:67:9a:6b:60:59:6d:7e:09:f4:74:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:51:53 2023 Not After : Mon Mar 20 18:51:53 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:a5:09:ae:a0:18:7e:10:61:6f:b7:56:d9:6b:14: 49:bc:2f:cd:e5:35:f6:b2:f2:b5:b5:36:0e:6f:fc:f7: 3e:1c:b1:41:14:ba:88:a0:6a:0d:45:d1:c8:18:63:f2: 78:8e:2d:68:c8:1a:7b:02:5e:eb:b7:92:a1:c2:fb:28: e1:45:3b:af:f1:67:97:ec:f9:a4:c3:57:8f:c6:0a:b0: 12:78:4b:fd:f5:cb:1c:3a:75:56:4e:9c:93:fb:fd:22: d5:17:94:09:78:b1:14:eb:15:14:f1:9f:33:6e:eb:bc: f5:ee:7e:fb:61:78:49:99:b0:18:dd:27:1d:7f:f5:5d: 46:be:94:f4:c6:44:a4:15:c4:84:3c:69:74:a0:12:00: 9b:dd:33:e9:f6:ba:21:1d:a2:4a:84:d8:31:1b:38:2c: 0b:fe:c9:34:cf:c7:db:f9:8a:68:ef:9d:56:75:62:85: 08:5f:4a:ea:08:ac:6e:72:9f:ae:35:b1:f1:34:6a:0b: 7e:2a:8d:ea:bb:57:57:28:39:66:5a:c2:92:3a:55:37: 8a:a3:32:67:6e:dc:06:ee:12:55:ff:eb:08:b8:b2:af: d4:3f:72:b8:e6:68:3c:d1:e5:b5:5e:ca:3f:11:e5:60: f9:76:d8:5a:55:28:26:8f:83:82:48:81:c1:d0:8e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:4d:7e:d0:83:0f:d7:24:ee:64:49:00:df:8e:83:9b: 5c:c9:3c:44:82:03:2a:c0:c2:26:1a:f5:90:60:e3:be: 4a:2f:56:b5:ea:3f:ac:57:36:66:43:81:e5:a7:9f:c8: 58:07:ef:80:e4:ef:a5:00:89:f2:8b:e5:54:9b:5f:6b: 42:32:4f:c5:59:37:45:84:97:71:15:7f:e9:cb:32:4d: 40:2f:e4:95:72:b0:e9:67:7b:20:4b:a8:e8:b8:1c:c3: 60:21:ed:a1:03:8b:29:ba:aa:f6:7d:4c:e6:34:10:24: b5:79:29:b0:fa:d4:fd:ba:e0:66:93:60:07:93:0a:57: a3:c4:b2:a6:5e:b9:3d:1c:52:74:16:b2:2d:f8:03:4e: fc:cc:b8:9d:a6:39:ce:56:05:59:53:44:19:79:1d:d4: ea:91:14:ad:67:fc:fc:91:7e:41:08:38:ae:e1:b9:53: 56:e2:9a:a3:de:f8:da:34:dd:42:e9:d3:e2:65:cc:9a: e7:0c:53:f2:b4:e9:ca:0c:1e:3d:c1:a0:5d:52:dd:33: da:ee:b7:4e:b2:da:25:55:a9:ae:58:c0:e6:98:08:ef: 41:67:70:3c:7d:42:cc:cb:98:d7:98:2b:69:b3:32:45: b7:03:e7:d8:07:fc:15:7f:e7:9f:52:a5:51:d6:d8:39 Fingerprint (SHA-256): E6:75:B0:BF:41:D5:03:A2:B6:83:89:81:D5:71:D5:A2:C5:19:80:32:AD:5F:7A:FA:6A:9B:82:B5:93:97:0C:65 Fingerprint (SHA1): DA:88:9C:5D:B6:B3:43:8C:67:D5:03:06:8C:0C:E6:71:89:B6:64:6E Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:52:22 2023 Not After : Mon Mar 20 18:52:22 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cb:c4:59:2f:32:9a:49:bc:f4:62:7e:5e:2a:c8:b7: fe:81:7e:8e:c2:15:46:d3:cf:d4:60:33:a6:80:24:98: 26:02:02:95:77:c6:21:d0:a7:8c:3c:b7:60:45:f1:17: ce:57:07:98:91:1a:98:d2:37:2f:c0:8d:af:de:18:3b: e0:66:b6:4f:ec:d0:f6:22:50:c2:fd:ab:2c:91:98:87: a7:ba:66:6e:c2:e9:b9:c5:a5:13:21:cc:94:e7:37:97: f6:0f:9f:f4:74:ce:fb:76:0a:5f:cd:b5:6a:10:58:0c: f8:7f:56:14:12:b5:d0:40:bf:ae:2b:ab:eb:dc:ae:68: ba:17:f4:cc:03:7b:6c:fa:3e:3b:2f:01:af:a2:6e:c1: 98:c4:0e:ed:72:56:db:c8:4d:1d:75:cc:73:1f:54:74: d4:61:aa:f4:e3:2b:20:ec:47:0a:4c:ae:0e:34:a5:cf: 31:2a:31:5a:f6:04:f1:f5:b4:12:c9:28:81:bb:7f:97: 22:71:6a:c8:f6:3a:39:22:b9:6c:ae:15:41:d9:fb:13: 13:b4:06:a6:79:e8:0c:ed:cf:30:3c:44:7c:09:30:74: eb:61:30:4d:39:9f:9b:44:15:b2:07:3d:23:45:60:90: fa:0e:e7:12:50:c5:0a:8c:2f:6a:2a:ab:92:d3:81:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5c:0b:32:54:a3:d7:2f:5a:8a:c9:ab:92:f9:c8:51: d4:c2:1b:1d:1b:d1:c1:47:a2:bd:5c:f2:fc:1c:03:ec: 5a:c4:64:89:82:07:fe:4c:2d:2e:57:34:72:7d:66:e3: 94:91:74:25:f6:dc:78:ed:5e:02:f0:f6:e4:7a:e0:d4: 66:7e:f4:ae:58:3e:03:04:d6:54:a4:22:dd:38:c5:40: 92:5d:81:50:ac:20:0a:be:f8:59:e1:dc:2a:ee:df:16: 79:ae:0d:c3:c1:9a:52:f9:2a:fe:27:b7:0f:b5:32:54: fc:65:11:06:62:e3:a4:18:8a:25:82:d7:89:32:ff:5a: 89:8c:f5:82:04:47:74:88:1e:5d:3f:ef:3b:61:86:59: 7f:21:48:e5:36:d3:56:72:d6:1e:a3:b7:87:54:fd:43: c6:bf:09:e9:74:84:13:08:87:58:c5:01:80:7d:f8:01: 88:d6:80:7d:b2:e8:3c:c9:ec:6f:06:e8:25:7b:91:88: 85:af:c6:19:da:a1:9e:ec:30:ed:f5:34:ff:c3:89:8e: 43:d9:0f:36:47:0f:51:9a:9a:aa:48:a4:42:dc:79:18: 0f:a0:50:b1:11:be:e6:f2:ab:0f:34:b6:8d:79:7f:3b: 44:fe:23:8a:b3:14:de:59:78:ac:dd:53:45:2b:74:47 Fingerprint (SHA-256): 12:C0:82:41:72:FE:52:4E:1C:F7:00:95:48:25:37:EC:39:23:E6:3C:38:EE:46:2A:E6:7E:A3:44:31:33:D1:20 Fingerprint (SHA1): 03:1F:D1:B0:3D:68:F5:32:E8:18:CA:88:99:51:DB:D0:63:47:45:01 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Mon Mar 20 20:38:30 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 20 20:38:30 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 220c05089bdcd0a7e842e521894225b7e910445e FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 220c05089bdcd0a7e842e521894225b7e910445e FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 220c05089bdcd0a7e842e521894225b7e910445e FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 - merging object Type 0x00000002 id=0x15c69f29 updateID= - merging object Type 0x00000002 id=0x15db50f5 updateID= - merging object Type 0x00000002 id=0x17eea9b1 updateID= - merging object Type 0x00000003 id=0x0dc69f29 updateID= - merging object Type 0x00000003 id=0x0ddb50f5 updateID= - merging object Type 0x00000003 id=0x0feea9b1 updateID= **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 - merging object Type 0x00000002 id=0x106c0a3c updateID= - merging object Type 0x00000002 id=0x1382441d updateID= - merging object Type 0x00000002 id=0x1212ebe1 updateID= - merging object Type 0x00000003 id=0x086c0a3c updateID= - merging object Type 0x00000003 id=0x0b82441d updateID= - merging object Type 0x00000003 id=0x0a12ebe1 updateID= **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x0005139c (332700): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 20 20:38:51 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 20 20:38:51 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 20 20:38:52 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 20 20:38:52 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 20 20:39:23 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 20 20:39:23 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36817 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36817 found at Mon Mar 20 20:39:23 UTC 2023 selfserv_9887 with PID 36817 started at Mon Mar 20 20:39:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36817 at Mon Mar 20 20:39:24 UTC 2023 kill -USR1 36817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36817 killed at Mon Mar 20 20:39:24 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36869 found at Mon Mar 20 20:39:24 UTC 2023 selfserv_9887 with PID 36869 started at Mon Mar 20 20:39:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36869 at Mon Mar 20 20:39:25 UTC 2023 kill -USR1 36869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36869 killed at Mon Mar 20 20:39:25 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36921 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36921 found at Mon Mar 20 20:39:25 UTC 2023 selfserv_9887 with PID 36921 started at Mon Mar 20 20:39:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36921 at Mon Mar 20 20:39:26 UTC 2023 kill -USR1 36921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36921 killed at Mon Mar 20 20:39:26 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36987 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36987 found at Mon Mar 20 20:39:26 UTC 2023 selfserv_9887 with PID 36987 started at Mon Mar 20 20:39:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36987 at Mon Mar 20 20:39:27 UTC 2023 kill -USR1 36987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36987 killed at Mon Mar 20 20:39:27 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37039 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37039 found at Mon Mar 20 20:39:27 UTC 2023 selfserv_9887 with PID 37039 started at Mon Mar 20 20:39:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37039 at Mon Mar 20 20:39:28 UTC 2023 kill -USR1 37039 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37039 killed at Mon Mar 20 20:39:28 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37091 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37091 found at Mon Mar 20 20:39:28 UTC 2023 selfserv_9887 with PID 37091 started at Mon Mar 20 20:39:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37091 at Mon Mar 20 20:39:29 UTC 2023 kill -USR1 37091 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37091 killed at Mon Mar 20 20:39:29 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37157 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37157 found at Mon Mar 20 20:39:29 UTC 2023 selfserv_9887 with PID 37157 started at Mon Mar 20 20:39:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37157 at Mon Mar 20 20:39:30 UTC 2023 kill -USR1 37157 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37157 killed at Mon Mar 20 20:39:30 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37209 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37209 found at Mon Mar 20 20:39:30 UTC 2023 selfserv_9887 with PID 37209 started at Mon Mar 20 20:39:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37209 at Mon Mar 20 20:39:31 UTC 2023 kill -USR1 37209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37209 killed at Mon Mar 20 20:39:31 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37261 found at Mon Mar 20 20:39:31 UTC 2023 selfserv_9887 with PID 37261 started at Mon Mar 20 20:39:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37261 at Mon Mar 20 20:39:32 UTC 2023 kill -USR1 37261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37261 killed at Mon Mar 20 20:39:32 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37327 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37327 found at Mon Mar 20 20:39:32 UTC 2023 selfserv_9887 with PID 37327 started at Mon Mar 20 20:39:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37327 at Mon Mar 20 20:39:32 UTC 2023 kill -USR1 37327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37327 killed at Mon Mar 20 20:39:33 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37379 found at Mon Mar 20 20:39:33 UTC 2023 selfserv_9887 with PID 37379 started at Mon Mar 20 20:39:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37379 at Mon Mar 20 20:39:33 UTC 2023 kill -USR1 37379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37379 killed at Mon Mar 20 20:39:33 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37431 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37431 found at Mon Mar 20 20:39:34 UTC 2023 selfserv_9887 with PID 37431 started at Mon Mar 20 20:39:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37431 at Mon Mar 20 20:39:34 UTC 2023 kill -USR1 37431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37431 killed at Mon Mar 20 20:39:34 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37497 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37497 found at Mon Mar 20 20:39:34 UTC 2023 selfserv_9887 with PID 37497 started at Mon Mar 20 20:39:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37497 at Mon Mar 20 20:39:35 UTC 2023 kill -USR1 37497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37497 killed at Mon Mar 20 20:39:35 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37549 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37549 found at Mon Mar 20 20:39:35 UTC 2023 selfserv_9887 with PID 37549 started at Mon Mar 20 20:39:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37549 at Mon Mar 20 20:39:36 UTC 2023 kill -USR1 37549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37549 killed at Mon Mar 20 20:39:36 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37601 found at Mon Mar 20 20:39:36 UTC 2023 selfserv_9887 with PID 37601 started at Mon Mar 20 20:39:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37601 at Mon Mar 20 20:39:37 UTC 2023 kill -USR1 37601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37601 killed at Mon Mar 20 20:39:37 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37668 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37668 found at Mon Mar 20 20:39:37 UTC 2023 selfserv_9887 with PID 37668 started at Mon Mar 20 20:39:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37668 at Mon Mar 20 20:39:37 UTC 2023 kill -USR1 37668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37668 killed at Mon Mar 20 20:39:38 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37720 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37720 found at Mon Mar 20 20:39:38 UTC 2023 selfserv_9887 with PID 37720 started at Mon Mar 20 20:39:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37720 at Mon Mar 20 20:39:38 UTC 2023 kill -USR1 37720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37720 killed at Mon Mar 20 20:39:39 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37772 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37772 found at Mon Mar 20 20:39:39 UTC 2023 selfserv_9887 with PID 37772 started at Mon Mar 20 20:39:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37772 at Mon Mar 20 20:39:39 UTC 2023 kill -USR1 37772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37772 killed at Mon Mar 20 20:39:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37838 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37838 found at Mon Mar 20 20:39:40 UTC 2023 selfserv_9887 with PID 37838 started at Mon Mar 20 20:39:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37838 at Mon Mar 20 20:39:40 UTC 2023 kill -USR1 37838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37838 killed at Mon Mar 20 20:39:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37893 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37893 found at Mon Mar 20 20:39:40 UTC 2023 selfserv_9887 with PID 37893 started at Mon Mar 20 20:39:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37893 at Mon Mar 20 20:39:41 UTC 2023 kill -USR1 37893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37893 killed at Mon Mar 20 20:39:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37958 found at Mon Mar 20 20:39:41 UTC 2023 selfserv_9887 with PID 37958 started at Mon Mar 20 20:39:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37958 at Mon Mar 20 20:39:42 UTC 2023 kill -USR1 37958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37958 killed at Mon Mar 20 20:39:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38025 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38025 found at Mon Mar 20 20:39:42 UTC 2023 selfserv_9887 with PID 38025 started at Mon Mar 20 20:39:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38025 at Mon Mar 20 20:39:42 UTC 2023 kill -USR1 38025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38025 killed at Mon Mar 20 20:39:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38077 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38077 found at Mon Mar 20 20:39:43 UTC 2023 selfserv_9887 with PID 38077 started at Mon Mar 20 20:39:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38077 at Mon Mar 20 20:39:43 UTC 2023 kill -USR1 38077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38077 killed at Mon Mar 20 20:39:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38129 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38129 found at Mon Mar 20 20:39:43 UTC 2023 selfserv_9887 with PID 38129 started at Mon Mar 20 20:39:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38129 at Mon Mar 20 20:39:44 UTC 2023 kill -USR1 38129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38129 killed at Mon Mar 20 20:39:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38195 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38195 found at Mon Mar 20 20:39:44 UTC 2023 selfserv_9887 with PID 38195 started at Mon Mar 20 20:39:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38195 at Mon Mar 20 20:39:44 UTC 2023 kill -USR1 38195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38195 killed at Mon Mar 20 20:39:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38247 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38247 found at Mon Mar 20 20:39:45 UTC 2023 selfserv_9887 with PID 38247 started at Mon Mar 20 20:39:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38247 at Mon Mar 20 20:39:45 UTC 2023 kill -USR1 38247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38247 killed at Mon Mar 20 20:39:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38299 found at Mon Mar 20 20:39:45 UTC 2023 selfserv_9887 with PID 38299 started at Mon Mar 20 20:39:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38299 at Mon Mar 20 20:39:46 UTC 2023 kill -USR1 38299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38299 killed at Mon Mar 20 20:39:46 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38365 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38365 found at Mon Mar 20 20:39:46 UTC 2023 selfserv_9887 with PID 38365 started at Mon Mar 20 20:39:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38365 at Mon Mar 20 20:39:47 UTC 2023 kill -USR1 38365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38365 killed at Mon Mar 20 20:39:47 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38417 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38417 found at Mon Mar 20 20:39:47 UTC 2023 selfserv_9887 with PID 38417 started at Mon Mar 20 20:39:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38417 at Mon Mar 20 20:39:47 UTC 2023 kill -USR1 38417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38417 killed at Mon Mar 20 20:39:47 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38469 found at Mon Mar 20 20:39:48 UTC 2023 selfserv_9887 with PID 38469 started at Mon Mar 20 20:39:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38469 at Mon Mar 20 20:39:48 UTC 2023 kill -USR1 38469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38469 killed at Mon Mar 20 20:39:48 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38535 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38535 found at Mon Mar 20 20:39:48 UTC 2023 selfserv_9887 with PID 38535 started at Mon Mar 20 20:39:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38535 at Mon Mar 20 20:39:49 UTC 2023 kill -USR1 38535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38535 killed at Mon Mar 20 20:39:49 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38587 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38587 found at Mon Mar 20 20:39:49 UTC 2023 selfserv_9887 with PID 38587 started at Mon Mar 20 20:39:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38587 at Mon Mar 20 20:39:49 UTC 2023 kill -USR1 38587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38587 killed at Mon Mar 20 20:39:49 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38639 found at Mon Mar 20 20:39:50 UTC 2023 selfserv_9887 with PID 38639 started at Mon Mar 20 20:39:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38639 at Mon Mar 20 20:39:50 UTC 2023 kill -USR1 38639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38639 killed at Mon Mar 20 20:39:50 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38705 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38705 found at Mon Mar 20 20:39:50 UTC 2023 selfserv_9887 with PID 38705 started at Mon Mar 20 20:39:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38705 at Mon Mar 20 20:39:51 UTC 2023 kill -USR1 38705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38705 killed at Mon Mar 20 20:39:51 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38757 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38757 found at Mon Mar 20 20:39:51 UTC 2023 selfserv_9887 with PID 38757 started at Mon Mar 20 20:39:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38757 at Mon Mar 20 20:39:51 UTC 2023 kill -USR1 38757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38757 killed at Mon Mar 20 20:39:52 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38809 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38809 found at Mon Mar 20 20:39:52 UTC 2023 selfserv_9887 with PID 38809 started at Mon Mar 20 20:39:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38809 at Mon Mar 20 20:39:52 UTC 2023 kill -USR1 38809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38809 killed at Mon Mar 20 20:39:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38875 found at Mon Mar 20 20:39:52 UTC 2023 selfserv_9887 with PID 38875 started at Mon Mar 20 20:39:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38875 at Mon Mar 20 20:39:53 UTC 2023 kill -USR1 38875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38875 killed at Mon Mar 20 20:39:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38928 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38928 found at Mon Mar 20 20:39:54 UTC 2023 selfserv_9887 with PID 38928 started at Mon Mar 20 20:39:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38928 at Mon Mar 20 20:39:54 UTC 2023 kill -USR1 38928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38928 killed at Mon Mar 20 20:39:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38980 found at Mon Mar 20 20:39:55 UTC 2023 selfserv_9887 with PID 38980 started at Mon Mar 20 20:39:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38980 at Mon Mar 20 20:39:56 UTC 2023 kill -USR1 38980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38980 killed at Mon Mar 20 20:39:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39046 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39046 found at Mon Mar 20 20:39:56 UTC 2023 selfserv_9887 with PID 39046 started at Mon Mar 20 20:39:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39046 at Mon Mar 20 20:39:57 UTC 2023 kill -USR1 39046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39046 killed at Mon Mar 20 20:39:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39098 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39098 found at Mon Mar 20 20:39:57 UTC 2023 selfserv_9887 with PID 39098 started at Mon Mar 20 20:39:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39098 at Mon Mar 20 20:39:58 UTC 2023 kill -USR1 39098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39098 killed at Mon Mar 20 20:39:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:39:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39150 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39150 found at Mon Mar 20 20:39:58 UTC 2023 selfserv_9887 with PID 39150 started at Mon Mar 20 20:39:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39150 at Mon Mar 20 20:39:59 UTC 2023 kill -USR1 39150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39150 killed at Mon Mar 20 20:39:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:39:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:39:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39216 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39216 found at Mon Mar 20 20:39:59 UTC 2023 selfserv_9887 with PID 39216 started at Mon Mar 20 20:39:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39216 at Mon Mar 20 20:40:00 UTC 2023 kill -USR1 39216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39216 killed at Mon Mar 20 20:40:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39270 found at Mon Mar 20 20:40:00 UTC 2023 selfserv_9887 with PID 39270 started at Mon Mar 20 20:40:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39270 at Mon Mar 20 20:40:01 UTC 2023 kill -USR1 39270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39270 killed at Mon Mar 20 20:40:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39322 found at Mon Mar 20 20:40:02 UTC 2023 selfserv_9887 with PID 39322 started at Mon Mar 20 20:40:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39322 at Mon Mar 20 20:40:02 UTC 2023 kill -USR1 39322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39322 killed at Mon Mar 20 20:40:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39388 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39388 found at Mon Mar 20 20:40:03 UTC 2023 selfserv_9887 with PID 39388 started at Mon Mar 20 20:40:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39388 at Mon Mar 20 20:40:04 UTC 2023 kill -USR1 39388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39388 killed at Mon Mar 20 20:40:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39440 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39440 found at Mon Mar 20 20:40:04 UTC 2023 selfserv_9887 with PID 39440 started at Mon Mar 20 20:40:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39440 at Mon Mar 20 20:40:05 UTC 2023 kill -USR1 39440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39440 killed at Mon Mar 20 20:40:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39492 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39492 found at Mon Mar 20 20:40:05 UTC 2023 selfserv_9887 with PID 39492 started at Mon Mar 20 20:40:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39492 at Mon Mar 20 20:40:06 UTC 2023 kill -USR1 39492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39492 killed at Mon Mar 20 20:40:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39559 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39559 found at Mon Mar 20 20:40:06 UTC 2023 selfserv_9887 with PID 39559 started at Mon Mar 20 20:40:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39559 at Mon Mar 20 20:40:07 UTC 2023 kill -USR1 39559 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39559 killed at Mon Mar 20 20:40:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39611 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39611 found at Mon Mar 20 20:40:07 UTC 2023 selfserv_9887 with PID 39611 started at Mon Mar 20 20:40:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39611 at Mon Mar 20 20:40:08 UTC 2023 kill -USR1 39611 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39611 killed at Mon Mar 20 20:40:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39663 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39663 found at Mon Mar 20 20:40:08 UTC 2023 selfserv_9887 with PID 39663 started at Mon Mar 20 20:40:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39663 at Mon Mar 20 20:40:09 UTC 2023 kill -USR1 39663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39663 killed at Mon Mar 20 20:40:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39729 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39729 found at Mon Mar 20 20:40:09 UTC 2023 selfserv_9887 with PID 39729 started at Mon Mar 20 20:40:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39729 at Mon Mar 20 20:40:10 UTC 2023 kill -USR1 39729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39729 killed at Mon Mar 20 20:40:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39781 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39781 found at Mon Mar 20 20:40:10 UTC 2023 selfserv_9887 with PID 39781 started at Mon Mar 20 20:40:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39781 at Mon Mar 20 20:40:11 UTC 2023 kill -USR1 39781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39781 killed at Mon Mar 20 20:40:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39833 found at Mon Mar 20 20:40:12 UTC 2023 selfserv_9887 with PID 39833 started at Mon Mar 20 20:40:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39833 at Mon Mar 20 20:40:13 UTC 2023 kill -USR1 39833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39833 killed at Mon Mar 20 20:40:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39900 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39900 found at Mon Mar 20 20:40:13 UTC 2023 selfserv_9887 with PID 39900 started at Mon Mar 20 20:40:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39900 at Mon Mar 20 20:40:14 UTC 2023 kill -USR1 39900 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39900 killed at Mon Mar 20 20:40:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39952 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39952 found at Mon Mar 20 20:40:14 UTC 2023 selfserv_9887 with PID 39952 started at Mon Mar 20 20:40:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39952 at Mon Mar 20 20:40:15 UTC 2023 kill -USR1 39952 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39952 killed at Mon Mar 20 20:40:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40004 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40004 found at Mon Mar 20 20:40:15 UTC 2023 selfserv_9887 with PID 40004 started at Mon Mar 20 20:40:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40004 at Mon Mar 20 20:40:16 UTC 2023 kill -USR1 40004 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40004 killed at Mon Mar 20 20:40:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40074 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40074 found at Mon Mar 20 20:40:16 UTC 2023 selfserv_9887 with PID 40074 started at Mon Mar 20 20:40:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40074 at Mon Mar 20 20:40:17 UTC 2023 kill -USR1 40074 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40074 killed at Mon Mar 20 20:40:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40127 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40127 found at Mon Mar 20 20:40:17 UTC 2023 selfserv_9887 with PID 40127 started at Mon Mar 20 20:40:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40127 at Mon Mar 20 20:40:18 UTC 2023 kill -USR1 40127 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40127 killed at Mon Mar 20 20:40:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40179 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40179 found at Mon Mar 20 20:40:19 UTC 2023 selfserv_9887 with PID 40179 started at Mon Mar 20 20:40:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40179 at Mon Mar 20 20:40:19 UTC 2023 kill -USR1 40179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40179 killed at Mon Mar 20 20:40:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40245 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40245 found at Mon Mar 20 20:40:20 UTC 2023 selfserv_9887 with PID 40245 started at Mon Mar 20 20:40:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40245 at Mon Mar 20 20:40:21 UTC 2023 kill -USR1 40245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40245 killed at Mon Mar 20 20:40:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40297 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40297 found at Mon Mar 20 20:40:21 UTC 2023 selfserv_9887 with PID 40297 started at Mon Mar 20 20:40:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40297 at Mon Mar 20 20:40:22 UTC 2023 kill -USR1 40297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40297 killed at Mon Mar 20 20:40:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40349 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40349 found at Mon Mar 20 20:40:22 UTC 2023 selfserv_9887 with PID 40349 started at Mon Mar 20 20:40:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40349 at Mon Mar 20 20:40:23 UTC 2023 kill -USR1 40349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40349 killed at Mon Mar 20 20:40:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40415 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40415 found at Mon Mar 20 20:40:23 UTC 2023 selfserv_9887 with PID 40415 started at Mon Mar 20 20:40:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40415 at Mon Mar 20 20:40:24 UTC 2023 kill -USR1 40415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40415 killed at Mon Mar 20 20:40:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40467 found at Mon Mar 20 20:40:24 UTC 2023 selfserv_9887 with PID 40467 started at Mon Mar 20 20:40:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40467 at Mon Mar 20 20:40:25 UTC 2023 kill -USR1 40467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40467 killed at Mon Mar 20 20:40:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40519 found at Mon Mar 20 20:40:25 UTC 2023 selfserv_9887 with PID 40519 started at Mon Mar 20 20:40:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40519 at Mon Mar 20 20:40:26 UTC 2023 kill -USR1 40519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40519 killed at Mon Mar 20 20:40:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40585 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40585 found at Mon Mar 20 20:40:27 UTC 2023 selfserv_9887 with PID 40585 started at Mon Mar 20 20:40:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40585 at Mon Mar 20 20:40:27 UTC 2023 kill -USR1 40585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40585 killed at Mon Mar 20 20:40:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40637 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40637 found at Mon Mar 20 20:40:28 UTC 2023 selfserv_9887 with PID 40637 started at Mon Mar 20 20:40:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40637 at Mon Mar 20 20:40:28 UTC 2023 kill -USR1 40637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40637 killed at Mon Mar 20 20:40:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40689 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40689 found at Mon Mar 20 20:40:29 UTC 2023 selfserv_9887 with PID 40689 started at Mon Mar 20 20:40:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40689 at Mon Mar 20 20:40:29 UTC 2023 kill -USR1 40689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40689 killed at Mon Mar 20 20:40:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40755 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40755 found at Mon Mar 20 20:40:30 UTC 2023 selfserv_9887 with PID 40755 started at Mon Mar 20 20:40:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40755 at Mon Mar 20 20:40:31 UTC 2023 kill -USR1 40755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40755 killed at Mon Mar 20 20:40:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40807 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40807 found at Mon Mar 20 20:40:31 UTC 2023 selfserv_9887 with PID 40807 started at Mon Mar 20 20:40:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40807 at Mon Mar 20 20:40:32 UTC 2023 kill -USR1 40807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40807 killed at Mon Mar 20 20:40:32 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40859 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40859 found at Mon Mar 20 20:40:32 UTC 2023 selfserv_9887 with PID 40859 started at Mon Mar 20 20:40:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40859 at Mon Mar 20 20:40:33 UTC 2023 kill -USR1 40859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40859 killed at Mon Mar 20 20:40:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40925 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40925 found at Mon Mar 20 20:40:33 UTC 2023 selfserv_9887 with PID 40925 started at Mon Mar 20 20:40:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40925 at Mon Mar 20 20:40:34 UTC 2023 kill -USR1 40925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40925 killed at Mon Mar 20 20:40:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 318 found at Mon Mar 20 20:40:34 UTC 2023 selfserv_9887 with PID 318 started at Mon Mar 20 20:40:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 318 at Mon Mar 20 20:40:35 UTC 2023 kill -USR1 318 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 318 killed at Mon Mar 20 20:40:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 370 found at Mon Mar 20 20:40:35 UTC 2023 selfserv_9887 with PID 370 started at Mon Mar 20 20:40:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 370 at Mon Mar 20 20:40:36 UTC 2023 kill -USR1 370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 370 killed at Mon Mar 20 20:40:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 436 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 436 found at Mon Mar 20 20:40:36 UTC 2023 selfserv_9887 with PID 436 started at Mon Mar 20 20:40:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 436 at Mon Mar 20 20:40:36 UTC 2023 kill -USR1 436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 436 killed at Mon Mar 20 20:40:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 488 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 488 found at Mon Mar 20 20:40:36 UTC 2023 selfserv_9887 with PID 488 started at Mon Mar 20 20:40:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 488 at Mon Mar 20 20:40:37 UTC 2023 kill -USR1 488 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 488 killed at Mon Mar 20 20:40:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 540 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 540 found at Mon Mar 20 20:40:37 UTC 2023 selfserv_9887 with PID 540 started at Mon Mar 20 20:40:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 540 at Mon Mar 20 20:40:38 UTC 2023 kill -USR1 540 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 540 killed at Mon Mar 20 20:40:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 606 found at Mon Mar 20 20:40:38 UTC 2023 selfserv_9887 with PID 606 started at Mon Mar 20 20:40:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 606 at Mon Mar 20 20:40:38 UTC 2023 kill -USR1 606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 606 killed at Mon Mar 20 20:40:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 658 found at Mon Mar 20 20:40:39 UTC 2023 selfserv_9887 with PID 658 started at Mon Mar 20 20:40:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 658 at Mon Mar 20 20:40:39 UTC 2023 kill -USR1 658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 658 killed at Mon Mar 20 20:40:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 710 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 710 found at Mon Mar 20 20:40:39 UTC 2023 selfserv_9887 with PID 710 started at Mon Mar 20 20:40:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 710 at Mon Mar 20 20:40:40 UTC 2023 kill -USR1 710 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 710 killed at Mon Mar 20 20:40:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 776 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 776 found at Mon Mar 20 20:40:40 UTC 2023 selfserv_9887 with PID 776 started at Mon Mar 20 20:40:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 776 at Mon Mar 20 20:40:41 UTC 2023 kill -USR1 776 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 776 killed at Mon Mar 20 20:40:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 832 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 832 found at Mon Mar 20 20:40:41 UTC 2023 selfserv_9887 with PID 832 started at Mon Mar 20 20:40:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 832 at Mon Mar 20 20:40:42 UTC 2023 kill -USR1 832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 832 killed at Mon Mar 20 20:40:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 896 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 896 found at Mon Mar 20 20:40:42 UTC 2023 selfserv_9887 with PID 896 started at Mon Mar 20 20:40:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 896 at Mon Mar 20 20:40:42 UTC 2023 kill -USR1 896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 896 killed at Mon Mar 20 20:40:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 964 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 964 found at Mon Mar 20 20:40:43 UTC 2023 selfserv_9887 with PID 964 started at Mon Mar 20 20:40:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 964 at Mon Mar 20 20:40:43 UTC 2023 kill -USR1 964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 964 killed at Mon Mar 20 20:40:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1016 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1016 found at Mon Mar 20 20:40:43 UTC 2023 selfserv_9887 with PID 1016 started at Mon Mar 20 20:40:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1016 at Mon Mar 20 20:40:44 UTC 2023 kill -USR1 1016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1016 killed at Mon Mar 20 20:40:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:40:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1068 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1068 found at Mon Mar 20 20:40:44 UTC 2023 selfserv_9887 with PID 1068 started at Mon Mar 20 20:40:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1068 at Mon Mar 20 20:40:44 UTC 2023 kill -USR1 1068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1068 killed at Mon Mar 20 20:40:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1134 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1134 found at Mon Mar 20 20:40:45 UTC 2023 selfserv_9887 with PID 1134 started at Mon Mar 20 20:40:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1134 at Mon Mar 20 20:40:45 UTC 2023 kill -USR1 1134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1134 killed at Mon Mar 20 20:40:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1187 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1187 found at Mon Mar 20 20:40:45 UTC 2023 selfserv_9887 with PID 1187 started at Mon Mar 20 20:40:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1187 at Mon Mar 20 20:40:46 UTC 2023 kill -USR1 1187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1187 killed at Mon Mar 20 20:40:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1239 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1239 found at Mon Mar 20 20:40:46 UTC 2023 selfserv_9887 with PID 1239 started at Mon Mar 20 20:40:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1239 at Mon Mar 20 20:40:47 UTC 2023 kill -USR1 1239 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1239 killed at Mon Mar 20 20:40:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1307 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1307 found at Mon Mar 20 20:40:47 UTC 2023 selfserv_9887 with PID 1307 started at Mon Mar 20 20:40:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1307 at Mon Mar 20 20:40:47 UTC 2023 kill -USR1 1307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1307 killed at Mon Mar 20 20:40:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1359 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1359 found at Mon Mar 20 20:40:48 UTC 2023 selfserv_9887 with PID 1359 started at Mon Mar 20 20:40:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1359 at Mon Mar 20 20:40:48 UTC 2023 kill -USR1 1359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1359 killed at Mon Mar 20 20:40:48 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1411 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1411 found at Mon Mar 20 20:40:48 UTC 2023 selfserv_9887 with PID 1411 started at Mon Mar 20 20:40:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1411 at Mon Mar 20 20:40:49 UTC 2023 kill -USR1 1411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1411 killed at Mon Mar 20 20:40:49 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1477 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1477 found at Mon Mar 20 20:40:49 UTC 2023 selfserv_9887 with PID 1477 started at Mon Mar 20 20:40:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1477 at Mon Mar 20 20:40:49 UTC 2023 kill -USR1 1477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1477 killed at Mon Mar 20 20:40:49 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1529 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1529 found at Mon Mar 20 20:40:50 UTC 2023 selfserv_9887 with PID 1529 started at Mon Mar 20 20:40:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1529 at Mon Mar 20 20:40:50 UTC 2023 kill -USR1 1529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1529 killed at Mon Mar 20 20:40:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1581 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1581 found at Mon Mar 20 20:40:50 UTC 2023 selfserv_9887 with PID 1581 started at Mon Mar 20 20:40:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1581 at Mon Mar 20 20:40:51 UTC 2023 kill -USR1 1581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1581 killed at Mon Mar 20 20:40:51 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1647 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1647 found at Mon Mar 20 20:40:51 UTC 2023 selfserv_9887 with PID 1647 started at Mon Mar 20 20:40:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1647 at Mon Mar 20 20:40:51 UTC 2023 kill -USR1 1647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1647 killed at Mon Mar 20 20:40:52 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1699 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1699 found at Mon Mar 20 20:40:52 UTC 2023 selfserv_9887 with PID 1699 started at Mon Mar 20 20:40:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1699 at Mon Mar 20 20:40:52 UTC 2023 kill -USR1 1699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1699 killed at Mon Mar 20 20:40:52 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1751 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1751 found at Mon Mar 20 20:40:52 UTC 2023 selfserv_9887 with PID 1751 started at Mon Mar 20 20:40:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1751 at Mon Mar 20 20:40:53 UTC 2023 kill -USR1 1751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1751 killed at Mon Mar 20 20:40:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1817 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1817 found at Mon Mar 20 20:40:53 UTC 2023 selfserv_9887 with PID 1817 started at Mon Mar 20 20:40:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1817 at Mon Mar 20 20:40:54 UTC 2023 kill -USR1 1817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1817 killed at Mon Mar 20 20:40:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1869 found at Mon Mar 20 20:40:54 UTC 2023 selfserv_9887 with PID 1869 started at Mon Mar 20 20:40:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1869 at Mon Mar 20 20:40:54 UTC 2023 kill -USR1 1869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1869 killed at Mon Mar 20 20:40:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1921 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1921 found at Mon Mar 20 20:40:55 UTC 2023 selfserv_9887 with PID 1921 started at Mon Mar 20 20:40:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1921 at Mon Mar 20 20:40:55 UTC 2023 kill -USR1 1921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1921 killed at Mon Mar 20 20:40:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1987 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1987 found at Mon Mar 20 20:40:55 UTC 2023 selfserv_9887 with PID 1987 started at Mon Mar 20 20:40:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1987 at Mon Mar 20 20:40:56 UTC 2023 kill -USR1 1987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1987 killed at Mon Mar 20 20:40:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2040 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2040 found at Mon Mar 20 20:40:56 UTC 2023 selfserv_9887 with PID 2040 started at Mon Mar 20 20:40:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2040 at Mon Mar 20 20:40:56 UTC 2023 kill -USR1 2040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2040 killed at Mon Mar 20 20:40:57 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2092 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2092 found at Mon Mar 20 20:40:57 UTC 2023 selfserv_9887 with PID 2092 started at Mon Mar 20 20:40:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2092 at Mon Mar 20 20:40:57 UTC 2023 kill -USR1 2092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2092 killed at Mon Mar 20 20:40:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2158 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2158 found at Mon Mar 20 20:40:57 UTC 2023 selfserv_9887 with PID 2158 started at Mon Mar 20 20:40:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2158 at Mon Mar 20 20:40:58 UTC 2023 kill -USR1 2158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2158 killed at Mon Mar 20 20:40:58 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2210 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2210 found at Mon Mar 20 20:40:58 UTC 2023 selfserv_9887 with PID 2210 started at Mon Mar 20 20:40:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2210 at Mon Mar 20 20:40:59 UTC 2023 kill -USR1 2210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2210 killed at Mon Mar 20 20:40:59 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:40:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:40:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2262 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2262 found at Mon Mar 20 20:40:59 UTC 2023 selfserv_9887 with PID 2262 started at Mon Mar 20 20:40:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2262 at Mon Mar 20 20:41:00 UTC 2023 kill -USR1 2262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2262 killed at Mon Mar 20 20:41:00 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2328 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2328 found at Mon Mar 20 20:41:00 UTC 2023 selfserv_9887 with PID 2328 started at Mon Mar 20 20:41:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2328 at Mon Mar 20 20:41:00 UTC 2023 kill -USR1 2328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2328 killed at Mon Mar 20 20:41:01 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2380 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2380 found at Mon Mar 20 20:41:01 UTC 2023 selfserv_9887 with PID 2380 started at Mon Mar 20 20:41:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2380 at Mon Mar 20 20:41:01 UTC 2023 kill -USR1 2380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2380 killed at Mon Mar 20 20:41:01 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2432 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2432 found at Mon Mar 20 20:41:02 UTC 2023 selfserv_9887 with PID 2432 started at Mon Mar 20 20:41:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2432 at Mon Mar 20 20:41:02 UTC 2023 kill -USR1 2432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2432 killed at Mon Mar 20 20:41:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2499 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2499 found at Mon Mar 20 20:41:02 UTC 2023 selfserv_9887 with PID 2499 started at Mon Mar 20 20:41:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2499 at Mon Mar 20 20:41:03 UTC 2023 kill -USR1 2499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2499 killed at Mon Mar 20 20:41:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2551 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2551 found at Mon Mar 20 20:41:03 UTC 2023 selfserv_9887 with PID 2551 started at Mon Mar 20 20:41:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2551 at Mon Mar 20 20:41:04 UTC 2023 kill -USR1 2551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2551 killed at Mon Mar 20 20:41:04 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2603 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2603 found at Mon Mar 20 20:41:04 UTC 2023 selfserv_9887 with PID 2603 started at Mon Mar 20 20:41:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2603 at Mon Mar 20 20:41:05 UTC 2023 kill -USR1 2603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2603 killed at Mon Mar 20 20:41:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2669 found at Mon Mar 20 20:41:05 UTC 2023 selfserv_9887 with PID 2669 started at Mon Mar 20 20:41:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2669 at Mon Mar 20 20:41:06 UTC 2023 kill -USR1 2669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2669 killed at Mon Mar 20 20:41:06 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2721 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2721 found at Mon Mar 20 20:41:06 UTC 2023 selfserv_9887 with PID 2721 started at Mon Mar 20 20:41:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2721 at Mon Mar 20 20:41:06 UTC 2023 kill -USR1 2721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2721 killed at Mon Mar 20 20:41:06 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2774 found at Mon Mar 20 20:41:07 UTC 2023 selfserv_9887 with PID 2774 started at Mon Mar 20 20:41:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2774 at Mon Mar 20 20:41:07 UTC 2023 kill -USR1 2774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2774 killed at Mon Mar 20 20:41:07 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2840 found at Mon Mar 20 20:41:07 UTC 2023 selfserv_9887 with PID 2840 started at Mon Mar 20 20:41:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2840 at Mon Mar 20 20:41:08 UTC 2023 kill -USR1 2840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2840 killed at Mon Mar 20 20:41:08 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2892 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2892 found at Mon Mar 20 20:41:08 UTC 2023 selfserv_9887 with PID 2892 started at Mon Mar 20 20:41:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2892 at Mon Mar 20 20:41:09 UTC 2023 kill -USR1 2892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2892 killed at Mon Mar 20 20:41:09 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2944 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2944 found at Mon Mar 20 20:41:09 UTC 2023 selfserv_9887 with PID 2944 started at Mon Mar 20 20:41:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2944 at Mon Mar 20 20:41:10 UTC 2023 kill -USR1 2944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2944 killed at Mon Mar 20 20:41:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3010 found at Mon Mar 20 20:41:10 UTC 2023 selfserv_9887 with PID 3010 started at Mon Mar 20 20:41:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3010 at Mon Mar 20 20:41:10 UTC 2023 kill -USR1 3010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3010 killed at Mon Mar 20 20:41:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3062 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3062 found at Mon Mar 20 20:41:11 UTC 2023 selfserv_9887 with PID 3062 started at Mon Mar 20 20:41:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3062 at Mon Mar 20 20:41:11 UTC 2023 kill -USR1 3062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3062 killed at Mon Mar 20 20:41:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3114 found at Mon Mar 20 20:41:11 UTC 2023 selfserv_9887 with PID 3114 started at Mon Mar 20 20:41:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3114 at Mon Mar 20 20:41:12 UTC 2023 kill -USR1 3114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3114 killed at Mon Mar 20 20:41:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3181 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3181 found at Mon Mar 20 20:41:12 UTC 2023 selfserv_9887 with PID 3181 started at Mon Mar 20 20:41:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3181 at Mon Mar 20 20:41:12 UTC 2023 kill -USR1 3181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3181 killed at Mon Mar 20 20:41:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3233 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3233 found at Mon Mar 20 20:41:13 UTC 2023 selfserv_9887 with PID 3233 started at Mon Mar 20 20:41:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3233 at Mon Mar 20 20:41:13 UTC 2023 kill -USR1 3233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3233 killed at Mon Mar 20 20:41:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3285 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3285 found at Mon Mar 20 20:41:13 UTC 2023 selfserv_9887 with PID 3285 started at Mon Mar 20 20:41:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3285 at Mon Mar 20 20:41:14 UTC 2023 kill -USR1 3285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3285 killed at Mon Mar 20 20:41:14 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3351 found at Mon Mar 20 20:41:14 UTC 2023 selfserv_9887 with PID 3351 started at Mon Mar 20 20:41:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3351 at Mon Mar 20 20:41:15 UTC 2023 kill -USR1 3351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3351 killed at Mon Mar 20 20:41:15 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3403 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3403 found at Mon Mar 20 20:41:15 UTC 2023 selfserv_9887 with PID 3403 started at Mon Mar 20 20:41:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3403 at Mon Mar 20 20:41:15 UTC 2023 kill -USR1 3403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3403 killed at Mon Mar 20 20:41:15 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3455 found at Mon Mar 20 20:41:15 UTC 2023 selfserv_9887 with PID 3455 started at Mon Mar 20 20:41:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3455 at Mon Mar 20 20:41:16 UTC 2023 kill -USR1 3455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3455 killed at Mon Mar 20 20:41:16 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3522 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3522 found at Mon Mar 20 20:41:16 UTC 2023 selfserv_9887 with PID 3522 started at Mon Mar 20 20:41:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3522 at Mon Mar 20 20:41:17 UTC 2023 kill -USR1 3522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3522 killed at Mon Mar 20 20:41:17 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3574 found at Mon Mar 20 20:41:17 UTC 2023 selfserv_9887 with PID 3574 started at Mon Mar 20 20:41:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3574 at Mon Mar 20 20:41:17 UTC 2023 kill -USR1 3574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3574 killed at Mon Mar 20 20:41:17 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3626 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3626 found at Mon Mar 20 20:41:18 UTC 2023 selfserv_9887 with PID 3626 started at Mon Mar 20 20:41:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3626 at Mon Mar 20 20:41:18 UTC 2023 kill -USR1 3626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3626 killed at Mon Mar 20 20:41:18 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3700 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3700 found at Mon Mar 20 20:41:18 UTC 2023 selfserv_9887 with PID 3700 started at Mon Mar 20 20:41:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3700 at Mon Mar 20 20:41:19 UTC 2023 kill -USR1 3700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3700 killed at Mon Mar 20 20:41:19 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3753 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3753 found at Mon Mar 20 20:41:19 UTC 2023 selfserv_9887 with PID 3753 started at Mon Mar 20 20:41:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3753 at Mon Mar 20 20:41:20 UTC 2023 kill -USR1 3753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3753 killed at Mon Mar 20 20:41:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3805 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3805 found at Mon Mar 20 20:41:21 UTC 2023 selfserv_9887 with PID 3805 started at Mon Mar 20 20:41:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3805 at Mon Mar 20 20:41:21 UTC 2023 kill -USR1 3805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3805 killed at Mon Mar 20 20:41:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3883 found at Mon Mar 20 20:41:22 UTC 2023 selfserv_9887 with PID 3883 started at Mon Mar 20 20:41:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3883 at Mon Mar 20 20:41:22 UTC 2023 kill -USR1 3883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3883 killed at Mon Mar 20 20:41:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3935 found at Mon Mar 20 20:41:23 UTC 2023 selfserv_9887 with PID 3935 started at Mon Mar 20 20:41:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3935 at Mon Mar 20 20:41:24 UTC 2023 kill -USR1 3935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3935 killed at Mon Mar 20 20:41:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3987 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3987 found at Mon Mar 20 20:41:24 UTC 2023 selfserv_9887 with PID 3987 started at Mon Mar 20 20:41:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3987 at Mon Mar 20 20:41:25 UTC 2023 kill -USR1 3987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3987 killed at Mon Mar 20 20:41:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4054 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4054 found at Mon Mar 20 20:41:25 UTC 2023 selfserv_9887 with PID 4054 started at Mon Mar 20 20:41:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4054 at Mon Mar 20 20:41:26 UTC 2023 kill -USR1 4054 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4054 killed at Mon Mar 20 20:41:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4106 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4106 found at Mon Mar 20 20:41:26 UTC 2023 selfserv_9887 with PID 4106 started at Mon Mar 20 20:41:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4106 at Mon Mar 20 20:41:27 UTC 2023 kill -USR1 4106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4106 killed at Mon Mar 20 20:41:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4159 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4159 found at Mon Mar 20 20:41:27 UTC 2023 selfserv_9887 with PID 4159 started at Mon Mar 20 20:41:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4159 at Mon Mar 20 20:41:28 UTC 2023 kill -USR1 4159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4159 killed at Mon Mar 20 20:41:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4225 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4225 found at Mon Mar 20 20:41:28 UTC 2023 selfserv_9887 with PID 4225 started at Mon Mar 20 20:41:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4225 at Mon Mar 20 20:41:29 UTC 2023 kill -USR1 4225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4225 killed at Mon Mar 20 20:41:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4278 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4278 found at Mon Mar 20 20:41:29 UTC 2023 selfserv_9887 with PID 4278 started at Mon Mar 20 20:41:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4278 at Mon Mar 20 20:41:30 UTC 2023 kill -USR1 4278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4278 killed at Mon Mar 20 20:41:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4332 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4332 found at Mon Mar 20 20:41:30 UTC 2023 selfserv_9887 with PID 4332 started at Mon Mar 20 20:41:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4332 at Mon Mar 20 20:41:31 UTC 2023 kill -USR1 4332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4332 killed at Mon Mar 20 20:41:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4399 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4399 found at Mon Mar 20 20:41:31 UTC 2023 selfserv_9887 with PID 4399 started at Mon Mar 20 20:41:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4399 at Mon Mar 20 20:41:32 UTC 2023 kill -USR1 4399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4399 killed at Mon Mar 20 20:41:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4451 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4451 found at Mon Mar 20 20:41:32 UTC 2023 selfserv_9887 with PID 4451 started at Mon Mar 20 20:41:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4451 at Mon Mar 20 20:41:33 UTC 2023 kill -USR1 4451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4451 killed at Mon Mar 20 20:41:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4503 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4503 found at Mon Mar 20 20:41:33 UTC 2023 selfserv_9887 with PID 4503 started at Mon Mar 20 20:41:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4503 at Mon Mar 20 20:41:34 UTC 2023 kill -USR1 4503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4503 killed at Mon Mar 20 20:41:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4569 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4569 found at Mon Mar 20 20:41:35 UTC 2023 selfserv_9887 with PID 4569 started at Mon Mar 20 20:41:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4569 at Mon Mar 20 20:41:35 UTC 2023 kill -USR1 4569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4569 killed at Mon Mar 20 20:41:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4621 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4621 found at Mon Mar 20 20:41:36 UTC 2023 selfserv_9887 with PID 4621 started at Mon Mar 20 20:41:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4621 at Mon Mar 20 20:41:36 UTC 2023 kill -USR1 4621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4621 killed at Mon Mar 20 20:41:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4673 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4673 found at Mon Mar 20 20:41:37 UTC 2023 selfserv_9887 with PID 4673 started at Mon Mar 20 20:41:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4673 at Mon Mar 20 20:41:38 UTC 2023 kill -USR1 4673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4673 killed at Mon Mar 20 20:41:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4740 found at Mon Mar 20 20:41:38 UTC 2023 selfserv_9887 with PID 4740 started at Mon Mar 20 20:41:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4740 at Mon Mar 20 20:41:39 UTC 2023 kill -USR1 4740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4740 killed at Mon Mar 20 20:41:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4792 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4792 found at Mon Mar 20 20:41:39 UTC 2023 selfserv_9887 with PID 4792 started at Mon Mar 20 20:41:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4792 at Mon Mar 20 20:41:40 UTC 2023 kill -USR1 4792 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4792 killed at Mon Mar 20 20:41:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4844 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4844 found at Mon Mar 20 20:41:40 UTC 2023 selfserv_9887 with PID 4844 started at Mon Mar 20 20:41:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4844 at Mon Mar 20 20:41:41 UTC 2023 kill -USR1 4844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4844 killed at Mon Mar 20 20:41:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4914 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4914 found at Mon Mar 20 20:41:41 UTC 2023 selfserv_9887 with PID 4914 started at Mon Mar 20 20:41:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4914 at Mon Mar 20 20:41:42 UTC 2023 kill -USR1 4914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4914 killed at Mon Mar 20 20:41:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4978 found at Mon Mar 20 20:41:42 UTC 2023 selfserv_9887 with PID 4978 started at Mon Mar 20 20:41:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4978 at Mon Mar 20 20:41:43 UTC 2023 kill -USR1 4978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4978 killed at Mon Mar 20 20:41:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5030 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5030 found at Mon Mar 20 20:41:43 UTC 2023 selfserv_9887 with PID 5030 started at Mon Mar 20 20:41:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5030 at Mon Mar 20 20:41:44 UTC 2023 kill -USR1 5030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5030 killed at Mon Mar 20 20:41:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5096 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5096 found at Mon Mar 20 20:41:44 UTC 2023 selfserv_9887 with PID 5096 started at Mon Mar 20 20:41:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5096 at Mon Mar 20 20:41:45 UTC 2023 kill -USR1 5096 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5096 killed at Mon Mar 20 20:41:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5148 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5148 found at Mon Mar 20 20:41:45 UTC 2023 selfserv_9887 with PID 5148 started at Mon Mar 20 20:41:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5148 at Mon Mar 20 20:41:45 UTC 2023 kill -USR1 5148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5148 killed at Mon Mar 20 20:41:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5200 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5200 found at Mon Mar 20 20:41:46 UTC 2023 selfserv_9887 with PID 5200 started at Mon Mar 20 20:41:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5200 at Mon Mar 20 20:41:46 UTC 2023 kill -USR1 5200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5200 killed at Mon Mar 20 20:41:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5266 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5266 found at Mon Mar 20 20:41:46 UTC 2023 selfserv_9887 with PID 5266 started at Mon Mar 20 20:41:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5266 at Mon Mar 20 20:41:47 UTC 2023 kill -USR1 5266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5266 killed at Mon Mar 20 20:41:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5318 found at Mon Mar 20 20:41:47 UTC 2023 selfserv_9887 with PID 5318 started at Mon Mar 20 20:41:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5318 at Mon Mar 20 20:41:48 UTC 2023 kill -USR1 5318 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5318 killed at Mon Mar 20 20:41:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5372 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5372 found at Mon Mar 20 20:41:48 UTC 2023 selfserv_9887 with PID 5372 started at Mon Mar 20 20:41:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5372 at Mon Mar 20 20:41:48 UTC 2023 kill -USR1 5372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5372 killed at Mon Mar 20 20:41:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5438 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5438 found at Mon Mar 20 20:41:49 UTC 2023 selfserv_9887 with PID 5438 started at Mon Mar 20 20:41:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5438 at Mon Mar 20 20:41:49 UTC 2023 kill -USR1 5438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5438 killed at Mon Mar 20 20:41:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5490 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5490 found at Mon Mar 20 20:41:49 UTC 2023 selfserv_9887 with PID 5490 started at Mon Mar 20 20:41:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5490 at Mon Mar 20 20:41:50 UTC 2023 kill -USR1 5490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5490 killed at Mon Mar 20 20:41:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:41:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5542 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5542 found at Mon Mar 20 20:41:50 UTC 2023 selfserv_9887 with PID 5542 started at Mon Mar 20 20:41:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5542 at Mon Mar 20 20:41:51 UTC 2023 kill -USR1 5542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5542 killed at Mon Mar 20 20:41:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5608 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5608 found at Mon Mar 20 20:41:51 UTC 2023 selfserv_9887 with PID 5608 started at Mon Mar 20 20:41:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5608 at Mon Mar 20 20:41:51 UTC 2023 kill -USR1 5608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5608 killed at Mon Mar 20 20:41:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5660 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5660 found at Mon Mar 20 20:41:52 UTC 2023 selfserv_9887 with PID 5660 started at Mon Mar 20 20:41:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5660 at Mon Mar 20 20:41:52 UTC 2023 kill -USR1 5660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5660 killed at Mon Mar 20 20:41:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5712 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5712 found at Mon Mar 20 20:41:53 UTC 2023 selfserv_9887 with PID 5712 started at Mon Mar 20 20:41:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5712 at Mon Mar 20 20:41:53 UTC 2023 kill -USR1 5712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5712 killed at Mon Mar 20 20:41:53 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5778 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5778 found at Mon Mar 20 20:41:53 UTC 2023 selfserv_9887 with PID 5778 started at Mon Mar 20 20:41:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5778 at Mon Mar 20 20:41:54 UTC 2023 kill -USR1 5778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5778 killed at Mon Mar 20 20:41:54 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5830 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5830 found at Mon Mar 20 20:41:55 UTC 2023 selfserv_9887 with PID 5830 started at Mon Mar 20 20:41:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5830 at Mon Mar 20 20:41:55 UTC 2023 kill -USR1 5830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5830 killed at Mon Mar 20 20:41:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5882 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5882 found at Mon Mar 20 20:41:56 UTC 2023 selfserv_9887 with PID 5882 started at Mon Mar 20 20:41:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5882 at Mon Mar 20 20:41:57 UTC 2023 kill -USR1 5882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5882 killed at Mon Mar 20 20:41:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5948 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5948 found at Mon Mar 20 20:41:57 UTC 2023 selfserv_9887 with PID 5948 started at Mon Mar 20 20:41:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5948 at Mon Mar 20 20:41:57 UTC 2023 kill -USR1 5948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5948 killed at Mon Mar 20 20:41:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6000 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6000 found at Mon Mar 20 20:41:58 UTC 2023 selfserv_9887 with PID 6000 started at Mon Mar 20 20:41:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6000 at Mon Mar 20 20:41:58 UTC 2023 kill -USR1 6000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6000 killed at Mon Mar 20 20:41:58 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:41:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6052 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6052 found at Mon Mar 20 20:41:58 UTC 2023 selfserv_9887 with PID 6052 started at Mon Mar 20 20:41:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6052 at Mon Mar 20 20:41:59 UTC 2023 kill -USR1 6052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6052 killed at Mon Mar 20 20:41:59 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9887 starting at Mon Mar 20 20:41:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:41:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:41:59 UTC 2023 selfserv_9887 with PID 6123 started at Mon Mar 20 20:41:59 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:00 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:01 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:01 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:02 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:02 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:03 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:03 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:04 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:04 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:05 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:05 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:06 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:06 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:07 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:08 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:08 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:09 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:09 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:10 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:10 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:11 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:11 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:12 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:12 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:13 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:13 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:14 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:15 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:15 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:16 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:16 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:17 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:17 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:18 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:18 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:19 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:19 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:20 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6123 found at Mon Mar 20 20:42:20 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6123 at Mon Mar 20 20:42:20 UTC 2023 kill -USR1 6123 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6123 killed at Mon Mar 20 20:42:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:42:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:42:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:21 UTC 2023 selfserv_9887 with PID 7456 started at Mon Mar 20 20:42:21 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:21 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:21 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:22 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:22 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:22 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:22 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:23 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:23 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:23 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:24 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:24 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:24 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:24 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:25 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:25 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:26 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:26 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:26 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:26 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:27 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:27 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:27 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:28 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:28 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:28 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:28 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:29 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:29 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:30 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:30 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:30 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:30 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:31 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:31 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:31 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:31 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:32 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:32 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7456 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7456 found at Mon Mar 20 20:42:32 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7456 at Mon Mar 20 20:42:32 UTC 2023 kill -USR1 7456 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7456 killed at Mon Mar 20 20:42:32 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:42:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:42:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:32 UTC 2023 selfserv_9887 with PID 8731 started at Mon Mar 20 20:42:32 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:33 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:34 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:34 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:34 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:35 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:35 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:36 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:36 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:36 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:37 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:37 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:38 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:38 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:39 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:39 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:40 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:40 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:40 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:41 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:41 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:42 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:42 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:42 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:43 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:43 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:44 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:44 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:45 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:45 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:45 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:46 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:46 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:47 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:47 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:47 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:48 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:48 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:48 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8731 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8731 found at Mon Mar 20 20:42:49 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8731 at Mon Mar 20 20:42:49 UTC 2023 kill -USR1 8731 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8731 killed at Mon Mar 20 20:42:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:42:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:42:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:49 UTC 2023 selfserv_9887 with PID 10007 started at Mon Mar 20 20:42:49 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:50 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:50 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:50 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:51 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:51 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:51 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:52 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:52 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:52 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:53 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:53 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:53 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:54 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:54 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:55 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:55 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:55 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:56 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:56 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:56 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:57 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:57 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:57 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:58 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:58 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:58 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:59 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:42:59 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:00 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:00 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:00 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:01 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:01 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:01 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:02 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:02 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:02 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:03 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10007 found at Mon Mar 20 20:43:03 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 10007 at Mon Mar 20 20:43:03 UTC 2023 kill -USR1 10007 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10007 killed at Mon Mar 20 20:43:03 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:43:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:43:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11267 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11267 found at Mon Mar 20 20:43:03 UTC 2023 selfserv_9887 with PID 11267 started at Mon Mar 20 20:43:03 UTC 2023 trying to kill selfserv_9887 with PID 11267 at Mon Mar 20 20:43:03 UTC 2023 kill -USR1 11267 ./ssl.sh: line 228: 11267 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9887 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11267 killed at Mon Mar 20 20:43:03 UTC 2023 selfserv_9887 starting at Mon Mar 20 20:43:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:43:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:03 UTC 2023 selfserv_9887 with PID 11309 started at Mon Mar 20 20:43:03 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:04 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:05 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:06 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:06 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:07 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:08 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:08 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:09 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:10 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:11 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:11 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:12 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:13 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:14 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:15 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:15 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:16 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:17 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:17 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:18 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:19 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:20 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:20 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:21 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:22 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:22 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:24 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:24 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:25 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:26 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:26 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:27 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:28 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:28 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:29 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:30 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:31 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:31 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11309 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11309 found at Mon Mar 20 20:43:32 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11309 at Mon Mar 20 20:43:32 UTC 2023 kill -USR1 11309 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11309 killed at Mon Mar 20 20:43:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:43:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:43:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:32 UTC 2023 selfserv_9887 with PID 12571 started at Mon Mar 20 20:43:32 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:33 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:34 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:35 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:35 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:36 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:37 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:38 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:38 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:39 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:40 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:41 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:41 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:42 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:43 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:44 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:45 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:46 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:46 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:47 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:48 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:49 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:49 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:50 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:51 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:51 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:52 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:54 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:54 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:55 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:56 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:57 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:57 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:58 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:59 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:43:59 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:44:00 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:44:01 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:44:02 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12571 found at Mon Mar 20 20:44:02 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12571 at Mon Mar 20 20:44:02 UTC 2023 kill -USR1 12571 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12571 killed at Mon Mar 20 20:44:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:44:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:44:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:03 UTC 2023 selfserv_9887 with PID 13864 started at Mon Mar 20 20:44:03 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:03 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:03 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:04 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:04 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:04 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:05 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:05 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:05 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:06 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:06 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:06 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:07 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:07 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:08 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:08 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:09 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:09 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:09 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:09 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:10 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:10 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:10 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:11 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:11 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:11 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:12 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:13 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:13 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:13 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:14 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:14 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:14 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:15 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:15 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:15 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:15 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:16 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:16 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13864 found at Mon Mar 20 20:44:16 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13864 at Mon Mar 20 20:44:16 UTC 2023 kill -USR1 13864 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13864 killed at Mon Mar 20 20:44:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:44:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:44:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:17 UTC 2023 selfserv_9887 with PID 15131 started at Mon Mar 20 20:44:17 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:17 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:18 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:19 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:19 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:20 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:20 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:21 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:22 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:22 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:23 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:23 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:24 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:25 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:26 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:26 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:27 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:28 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:28 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:29 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:29 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:30 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:30 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:31 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:32 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:32 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:33 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:34 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:35 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:35 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:36 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:36 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:37 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:37 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:38 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:38 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:39 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:40 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:40 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15131 found at Mon Mar 20 20:44:41 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15131 at Mon Mar 20 20:44:41 UTC 2023 kill -USR1 15131 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15131 killed at Mon Mar 20 20:44:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:44:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:44:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:41 UTC 2023 selfserv_9887 with PID 16395 started at Mon Mar 20 20:44:41 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:42 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:42 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:43 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:44 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:44 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:45 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:46 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:46 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:47 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:48 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:48 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:49 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:50 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:51 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:51 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:52 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:53 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:53 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:54 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:54 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:55 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:56 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:56 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:57 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:58 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:58 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:44:59 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:00 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:01 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:01 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:02 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:02 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:03 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:04 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:04 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:05 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:05 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:06 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16395 found at Mon Mar 20 20:45:07 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16395 at Mon Mar 20 20:45:07 UTC 2023 kill -USR1 16395 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16395 killed at Mon Mar 20 20:45:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:45:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:45:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:07 UTC 2023 selfserv_9887 with PID 17675 started at Mon Mar 20 20:45:07 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:07 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:08 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:08 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:09 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:09 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:09 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:10 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:10 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:11 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:11 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:11 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:12 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:12 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:13 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:14 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:14 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:14 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:15 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:15 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:16 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:16 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:16 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:17 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:17 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:18 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:18 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:19 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:19 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:20 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:20 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:20 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:21 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:21 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:22 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:22 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:22 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:23 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:23 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17675 found at Mon Mar 20 20:45:24 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17675 at Mon Mar 20 20:45:24 UTC 2023 kill -USR1 17675 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17675 killed at Mon Mar 20 20:45:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:45:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:45:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18936 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18936 found at Mon Mar 20 20:45:24 UTC 2023 selfserv_9887 with PID 18936 started at Mon Mar 20 20:45:24 UTC 2023 trying to kill selfserv_9887 with PID 18936 at Mon Mar 20 20:45:24 UTC 2023 kill -USR1 18936 ./ssl.sh: line 228: 18936 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9887 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18936 killed at Mon Mar 20 20:45:24 UTC 2023 selfserv_9887 starting at Mon Mar 20 20:45:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:45:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:24 UTC 2023 selfserv_9887 with PID 18978 started at Mon Mar 20 20:45:24 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:25 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:26 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:26 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:27 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:28 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:28 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:29 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:30 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:31 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:31 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:32 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:33 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:33 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:35 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:35 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:36 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:37 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:38 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:38 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:39 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:40 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:40 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:41 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:42 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:42 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:43 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:44 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:45 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:46 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:47 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:47 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:48 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:49 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:49 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:50 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:51 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:51 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:52 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18978 found at Mon Mar 20 20:45:53 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18978 at Mon Mar 20 20:45:53 UTC 2023 kill -USR1 18978 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18978 killed at Mon Mar 20 20:45:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:45:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:45:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:53 UTC 2023 selfserv_9887 with PID 20260 started at Mon Mar 20 20:45:53 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:54 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:55 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:55 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:56 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:57 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:58 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:58 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:45:59 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:00 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:01 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:01 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:02 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:03 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:04 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:04 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:05 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:06 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:06 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:07 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:08 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:09 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:09 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:10 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:11 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:11 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:12 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:13 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:14 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:15 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:16 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:17 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:17 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:18 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:19 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:19 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:20 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:21 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:22 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:22 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20260 found at Mon Mar 20 20:46:23 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20260 at Mon Mar 20 20:46:23 UTC 2023 kill -USR1 20260 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20260 killed at Mon Mar 20 20:46:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:46:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:46:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:23 UTC 2023 selfserv_9887 with PID 21523 started at Mon Mar 20 20:46:23 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:24 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:24 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:24 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:25 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:25 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:25 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:26 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:26 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:26 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:27 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:27 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:27 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:28 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:29 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:29 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:29 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:30 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:30 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:30 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:31 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:31 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:31 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:32 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:32 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:32 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:32 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:33 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:34 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:34 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:34 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:35 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:35 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:35 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:36 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:36 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:36 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:37 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:37 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21523 found at Mon Mar 20 20:46:37 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21523 at Mon Mar 20 20:46:37 UTC 2023 kill -USR1 21523 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21523 killed at Mon Mar 20 20:46:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:46:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:46:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:38 UTC 2023 selfserv_9887 with PID 22788 started at Mon Mar 20 20:46:38 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:38 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:39 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:39 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:40 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:41 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:41 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:42 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:42 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:43 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:44 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:44 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:45 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:46 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:46 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:47 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:47 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:48 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:48 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:49 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:50 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:50 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:51 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:51 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:52 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:52 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:53 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:54 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:55 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:55 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:56 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:57 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:57 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:58 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:58 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:59 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:46:59 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:47:00 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:47:00 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:47:01 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22788 found at Mon Mar 20 20:47:02 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22788 at Mon Mar 20 20:47:02 UTC 2023 kill -USR1 22788 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22788 killed at Mon Mar 20 20:47:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:47:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:47:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:02 UTC 2023 selfserv_9887 with PID 24066 started at Mon Mar 20 20:47:02 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:03 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:03 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:04 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:05 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:05 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:06 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:06 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:07 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:08 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:08 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:09 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:10 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:10 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:12 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:12 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:13 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:13 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:14 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:15 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:15 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:16 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:16 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:17 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:18 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:18 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:19 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:20 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:21 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:21 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:22 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:23 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:23 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:24 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:24 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:25 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:26 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:26 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:27 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24066 found at Mon Mar 20 20:47:27 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24066 at Mon Mar 20 20:47:27 UTC 2023 kill -USR1 24066 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24066 killed at Mon Mar 20 20:47:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:47:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:47:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:28 UTC 2023 selfserv_9887 with PID 25331 started at Mon Mar 20 20:47:28 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:28 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:29 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:29 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:29 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:30 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:30 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:31 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:31 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:31 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:32 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:32 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:33 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:33 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:34 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:35 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:35 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:35 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:36 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:36 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:36 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:37 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:37 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:38 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:38 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:38 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:39 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:40 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:40 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:41 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:41 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:41 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:42 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:42 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:42 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:43 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:43 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:44 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:44 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25331 found at Mon Mar 20 20:47:44 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25331 at Mon Mar 20 20:47:44 UTC 2023 kill -USR1 25331 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25331 killed at Mon Mar 20 20:47:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:47:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:47:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26613 found at Mon Mar 20 20:47:45 UTC 2023 selfserv_9887 with PID 26613 started at Mon Mar 20 20:47:45 UTC 2023 trying to kill selfserv_9887 with PID 26613 at Mon Mar 20 20:47:45 UTC 2023 kill -USR1 26613 ./ssl.sh: line 228: 26613 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9887 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26613 killed at Mon Mar 20 20:47:45 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:47:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:47:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 26658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26658 found at Mon Mar 20 20:47:45 UTC 2023 selfserv_9887 with PID 26658 started at Mon Mar 20 20:47:45 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 26658 at Mon Mar 20 20:47:54 UTC 2023 kill -USR1 26658 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26658 killed at Mon Mar 20 20:47:54 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:47:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:47:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 27209 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27209 found at Mon Mar 20 20:47:54 UTC 2023 selfserv_9887 with PID 27209 started at Mon Mar 20 20:47:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27209 at Mon Mar 20 20:48:13 UTC 2023 kill -USR1 27209 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27209 killed at Mon Mar 20 20:48:13 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:48:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28011 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28011 found at Mon Mar 20 20:48:13 UTC 2023 selfserv_9887 with PID 28011 started at Mon Mar 20 20:48:13 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28011 at Mon Mar 20 20:48:13 UTC 2023 kill -USR1 28011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28011 killed at Mon Mar 20 20:48:13 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28077 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28077 found at Mon Mar 20 20:48:14 UTC 2023 selfserv_9887 with PID 28077 started at Mon Mar 20 20:48:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28077 at Mon Mar 20 20:48:14 UTC 2023 kill -USR1 28077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28077 killed at Mon Mar 20 20:48:14 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28129 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28129 found at Mon Mar 20 20:48:15 UTC 2023 selfserv_9887 with PID 28129 started at Mon Mar 20 20:48:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28129 at Mon Mar 20 20:48:15 UTC 2023 kill -USR1 28129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28129 killed at Mon Mar 20 20:48:15 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28182 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28182 found at Mon Mar 20 20:48:15 UTC 2023 selfserv_9887 with PID 28182 started at Mon Mar 20 20:48:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28182 at Mon Mar 20 20:48:16 UTC 2023 kill -USR1 28182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28182 killed at Mon Mar 20 20:48:16 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28235 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28235 found at Mon Mar 20 20:48:17 UTC 2023 selfserv_9887 with PID 28235 started at Mon Mar 20 20:48:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28235 at Mon Mar 20 20:48:17 UTC 2023 kill -USR1 28235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28235 killed at Mon Mar 20 20:48:17 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28287 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28287 found at Mon Mar 20 20:48:17 UTC 2023 selfserv_9887 with PID 28287 started at Mon Mar 20 20:48:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28287 at Mon Mar 20 20:48:18 UTC 2023 kill -USR1 28287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28287 killed at Mon Mar 20 20:48:18 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28339 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28339 found at Mon Mar 20 20:48:18 UTC 2023 selfserv_9887 with PID 28339 started at Mon Mar 20 20:48:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28339 at Mon Mar 20 20:48:19 UTC 2023 kill -USR1 28339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28339 killed at Mon Mar 20 20:48:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28391 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28391 found at Mon Mar 20 20:48:19 UTC 2023 selfserv_9887 with PID 28391 started at Mon Mar 20 20:48:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28391 at Mon Mar 20 20:48:20 UTC 2023 kill -USR1 28391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28391 killed at Mon Mar 20 20:48:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28444 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28444 found at Mon Mar 20 20:48:20 UTC 2023 selfserv_9887 with PID 28444 started at Mon Mar 20 20:48:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28444 at Mon Mar 20 20:48:20 UTC 2023 kill -USR1 28444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28444 killed at Mon Mar 20 20:48:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28497 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28497 found at Mon Mar 20 20:48:21 UTC 2023 selfserv_9887 with PID 28497 started at Mon Mar 20 20:48:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28497 at Mon Mar 20 20:48:21 UTC 2023 kill -USR1 28497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28497 killed at Mon Mar 20 20:48:21 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28549 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28549 found at Mon Mar 20 20:48:21 UTC 2023 selfserv_9887 with PID 28549 started at Mon Mar 20 20:48:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28549 at Mon Mar 20 20:48:22 UTC 2023 kill -USR1 28549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28549 killed at Mon Mar 20 20:48:22 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28601 found at Mon Mar 20 20:48:22 UTC 2023 selfserv_9887 with PID 28601 started at Mon Mar 20 20:48:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28601 at Mon Mar 20 20:48:23 UTC 2023 kill -USR1 28601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28601 killed at Mon Mar 20 20:48:23 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28653 found at Mon Mar 20 20:48:23 UTC 2023 selfserv_9887 with PID 28653 started at Mon Mar 20 20:48:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28653 at Mon Mar 20 20:48:23 UTC 2023 kill -USR1 28653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28653 killed at Mon Mar 20 20:48:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28706 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28706 found at Mon Mar 20 20:48:24 UTC 2023 selfserv_9887 with PID 28706 started at Mon Mar 20 20:48:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28706 at Mon Mar 20 20:48:24 UTC 2023 kill -USR1 28706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28706 killed at Mon Mar 20 20:48:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28758 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28758 found at Mon Mar 20 20:48:25 UTC 2023 selfserv_9887 with PID 28758 started at Mon Mar 20 20:48:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28758 at Mon Mar 20 20:48:25 UTC 2023 kill -USR1 28758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28758 killed at Mon Mar 20 20:48:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28810 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28810 found at Mon Mar 20 20:48:26 UTC 2023 selfserv_9887 with PID 28810 started at Mon Mar 20 20:48:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28810 at Mon Mar 20 20:48:27 UTC 2023 kill -USR1 28810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28810 killed at Mon Mar 20 20:48:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28862 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28862 found at Mon Mar 20 20:48:27 UTC 2023 selfserv_9887 with PID 28862 started at Mon Mar 20 20:48:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28862 at Mon Mar 20 20:48:28 UTC 2023 kill -USR1 28862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28862 killed at Mon Mar 20 20:48:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28914 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28914 found at Mon Mar 20 20:48:28 UTC 2023 selfserv_9887 with PID 28914 started at Mon Mar 20 20:48:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28914 at Mon Mar 20 20:48:29 UTC 2023 kill -USR1 28914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28914 killed at Mon Mar 20 20:48:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28968 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28968 found at Mon Mar 20 20:48:29 UTC 2023 selfserv_9887 with PID 28968 started at Mon Mar 20 20:48:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28968 at Mon Mar 20 20:48:30 UTC 2023 kill -USR1 28968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28968 killed at Mon Mar 20 20:48:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29020 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29020 found at Mon Mar 20 20:48:30 UTC 2023 selfserv_9887 with PID 29020 started at Mon Mar 20 20:48:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29020 at Mon Mar 20 20:48:31 UTC 2023 kill -USR1 29020 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29020 killed at Mon Mar 20 20:48:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29072 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29072 found at Mon Mar 20 20:48:32 UTC 2023 selfserv_9887 with PID 29072 started at Mon Mar 20 20:48:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29072 at Mon Mar 20 20:48:32 UTC 2023 kill -USR1 29072 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29072 killed at Mon Mar 20 20:48:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29124 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29124 found at Mon Mar 20 20:48:33 UTC 2023 selfserv_9887 with PID 29124 started at Mon Mar 20 20:48:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29124 at Mon Mar 20 20:48:34 UTC 2023 kill -USR1 29124 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29124 killed at Mon Mar 20 20:48:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29176 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29176 found at Mon Mar 20 20:48:34 UTC 2023 selfserv_9887 with PID 29176 started at Mon Mar 20 20:48:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29176 at Mon Mar 20 20:48:35 UTC 2023 kill -USR1 29176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29176 killed at Mon Mar 20 20:48:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29228 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29228 found at Mon Mar 20 20:48:35 UTC 2023 selfserv_9887 with PID 29228 started at Mon Mar 20 20:48:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29228 at Mon Mar 20 20:48:36 UTC 2023 kill -USR1 29228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29228 killed at Mon Mar 20 20:48:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29280 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29280 found at Mon Mar 20 20:48:36 UTC 2023 selfserv_9887 with PID 29280 started at Mon Mar 20 20:48:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29280 at Mon Mar 20 20:48:37 UTC 2023 kill -USR1 29280 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29280 killed at Mon Mar 20 20:48:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29332 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29332 found at Mon Mar 20 20:48:37 UTC 2023 selfserv_9887 with PID 29332 started at Mon Mar 20 20:48:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29332 at Mon Mar 20 20:48:38 UTC 2023 kill -USR1 29332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29332 killed at Mon Mar 20 20:48:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29385 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29385 found at Mon Mar 20 20:48:38 UTC 2023 selfserv_9887 with PID 29385 started at Mon Mar 20 20:48:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29385 at Mon Mar 20 20:48:38 UTC 2023 kill -USR1 29385 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29385 killed at Mon Mar 20 20:48:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29437 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29437 found at Mon Mar 20 20:48:39 UTC 2023 selfserv_9887 with PID 29437 started at Mon Mar 20 20:48:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29437 at Mon Mar 20 20:48:39 UTC 2023 kill -USR1 29437 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29437 killed at Mon Mar 20 20:48:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29489 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29489 found at Mon Mar 20 20:48:39 UTC 2023 selfserv_9887 with PID 29489 started at Mon Mar 20 20:48:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29489 at Mon Mar 20 20:48:40 UTC 2023 kill -USR1 29489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29489 killed at Mon Mar 20 20:48:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29544 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29544 found at Mon Mar 20 20:48:40 UTC 2023 selfserv_9887 with PID 29544 started at Mon Mar 20 20:48:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29544 at Mon Mar 20 20:48:41 UTC 2023 kill -USR1 29544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29544 killed at Mon Mar 20 20:48:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29601 found at Mon Mar 20 20:48:41 UTC 2023 selfserv_9887 with PID 29601 started at Mon Mar 20 20:48:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29601 at Mon Mar 20 20:48:41 UTC 2023 kill -USR1 29601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29601 killed at Mon Mar 20 20:48:42 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29653 found at Mon Mar 20 20:48:42 UTC 2023 selfserv_9887 with PID 29653 started at Mon Mar 20 20:48:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29653 at Mon Mar 20 20:48:42 UTC 2023 kill -USR1 29653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29653 killed at Mon Mar 20 20:48:42 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29712 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29712 found at Mon Mar 20 20:48:42 UTC 2023 selfserv_9887 with PID 29712 started at Mon Mar 20 20:48:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29712 at Mon Mar 20 20:48:43 UTC 2023 kill -USR1 29712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29712 killed at Mon Mar 20 20:48:43 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29764 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29764 found at Mon Mar 20 20:48:43 UTC 2023 selfserv_9887 with PID 29764 started at Mon Mar 20 20:48:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29764 at Mon Mar 20 20:48:44 UTC 2023 kill -USR1 29764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29764 killed at Mon Mar 20 20:48:44 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29816 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29816 found at Mon Mar 20 20:48:44 UTC 2023 selfserv_9887 with PID 29816 started at Mon Mar 20 20:48:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29816 at Mon Mar 20 20:48:44 UTC 2023 kill -USR1 29816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29816 killed at Mon Mar 20 20:48:44 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29868 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29868 found at Mon Mar 20 20:48:45 UTC 2023 selfserv_9887 with PID 29868 started at Mon Mar 20 20:48:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29868 at Mon Mar 20 20:48:45 UTC 2023 kill -USR1 29868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29868 killed at Mon Mar 20 20:48:45 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29921 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29921 found at Mon Mar 20 20:48:45 UTC 2023 selfserv_9887 with PID 29921 started at Mon Mar 20 20:48:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29921 at Mon Mar 20 20:48:46 UTC 2023 kill -USR1 29921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29921 killed at Mon Mar 20 20:48:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29975 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29975 found at Mon Mar 20 20:48:46 UTC 2023 selfserv_9887 with PID 29975 started at Mon Mar 20 20:48:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29975 at Mon Mar 20 20:48:47 UTC 2023 kill -USR1 29975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29975 killed at Mon Mar 20 20:48:47 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30027 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30027 found at Mon Mar 20 20:48:47 UTC 2023 selfserv_9887 with PID 30027 started at Mon Mar 20 20:48:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30027 at Mon Mar 20 20:48:48 UTC 2023 kill -USR1 30027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30027 killed at Mon Mar 20 20:48:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30079 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30079 found at Mon Mar 20 20:48:48 UTC 2023 selfserv_9887 with PID 30079 started at Mon Mar 20 20:48:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30079 at Mon Mar 20 20:48:48 UTC 2023 kill -USR1 30079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30079 killed at Mon Mar 20 20:48:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30131 found at Mon Mar 20 20:48:49 UTC 2023 selfserv_9887 with PID 30131 started at Mon Mar 20 20:48:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30131 at Mon Mar 20 20:48:49 UTC 2023 kill -USR1 30131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30131 killed at Mon Mar 20 20:48:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30184 found at Mon Mar 20 20:48:50 UTC 2023 selfserv_9887 with PID 30184 started at Mon Mar 20 20:48:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30184 at Mon Mar 20 20:48:50 UTC 2023 kill -USR1 30184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30184 killed at Mon Mar 20 20:48:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30236 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30236 found at Mon Mar 20 20:48:50 UTC 2023 selfserv_9887 with PID 30236 started at Mon Mar 20 20:48:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30236 at Mon Mar 20 20:48:51 UTC 2023 kill -USR1 30236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30236 killed at Mon Mar 20 20:48:51 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30288 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30288 found at Mon Mar 20 20:48:51 UTC 2023 selfserv_9887 with PID 30288 started at Mon Mar 20 20:48:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30288 at Mon Mar 20 20:48:51 UTC 2023 kill -USR1 30288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30288 killed at Mon Mar 20 20:48:51 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30341 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30341 found at Mon Mar 20 20:48:52 UTC 2023 selfserv_9887 with PID 30341 started at Mon Mar 20 20:48:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30341 at Mon Mar 20 20:48:52 UTC 2023 kill -USR1 30341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30341 killed at Mon Mar 20 20:48:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30394 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30394 found at Mon Mar 20 20:48:52 UTC 2023 selfserv_9887 with PID 30394 started at Mon Mar 20 20:48:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30394 at Mon Mar 20 20:48:53 UTC 2023 kill -USR1 30394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30394 killed at Mon Mar 20 20:48:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30446 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30446 found at Mon Mar 20 20:48:53 UTC 2023 selfserv_9887 with PID 30446 started at Mon Mar 20 20:48:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30446 at Mon Mar 20 20:48:54 UTC 2023 kill -USR1 30446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30446 killed at Mon Mar 20 20:48:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30499 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30499 found at Mon Mar 20 20:48:55 UTC 2023 selfserv_9887 with PID 30499 started at Mon Mar 20 20:48:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30499 at Mon Mar 20 20:48:55 UTC 2023 kill -USR1 30499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30499 killed at Mon Mar 20 20:48:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30553 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30553 found at Mon Mar 20 20:48:56 UTC 2023 selfserv_9887 with PID 30553 started at Mon Mar 20 20:48:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30553 at Mon Mar 20 20:48:57 UTC 2023 kill -USR1 30553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30553 killed at Mon Mar 20 20:48:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30605 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30605 found at Mon Mar 20 20:48:57 UTC 2023 selfserv_9887 with PID 30605 started at Mon Mar 20 20:48:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30605 at Mon Mar 20 20:48:58 UTC 2023 kill -USR1 30605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30605 killed at Mon Mar 20 20:48:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:48:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30659 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30659 found at Mon Mar 20 20:48:58 UTC 2023 selfserv_9887 with PID 30659 started at Mon Mar 20 20:48:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30659 at Mon Mar 20 20:48:59 UTC 2023 kill -USR1 30659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30659 killed at Mon Mar 20 20:48:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:48:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:48:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30711 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30711 found at Mon Mar 20 20:48:59 UTC 2023 selfserv_9887 with PID 30711 started at Mon Mar 20 20:48:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30711 at Mon Mar 20 20:49:00 UTC 2023 kill -USR1 30711 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30711 killed at Mon Mar 20 20:49:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:49:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30763 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30763 found at Mon Mar 20 20:49:00 UTC 2023 selfserv_9887 with PID 30763 started at Mon Mar 20 20:49:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30763 at Mon Mar 20 20:49:01 UTC 2023 kill -USR1 30763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30763 killed at Mon Mar 20 20:49:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:49:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30815 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30815 found at Mon Mar 20 20:49:01 UTC 2023 selfserv_9887 with PID 30815 started at Mon Mar 20 20:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30815 at Mon Mar 20 20:49:02 UTC 2023 kill -USR1 30815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30815 killed at Mon Mar 20 20:49:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:49:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30867 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30867 found at Mon Mar 20 20:49:02 UTC 2023 selfserv_9887 with PID 30867 started at Mon Mar 20 20:49:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30867 at Mon Mar 20 20:49:02 UTC 2023 kill -USR1 30867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30867 killed at Mon Mar 20 20:49:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:49:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30919 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30919 found at Mon Mar 20 20:49:03 UTC 2023 selfserv_9887 with PID 30919 started at Mon Mar 20 20:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30919 at Mon Mar 20 20:49:03 UTC 2023 kill -USR1 30919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30919 killed at Mon Mar 20 20:49:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:49:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30971 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30971 found at Mon Mar 20 20:49:03 UTC 2023 selfserv_9887 with PID 30971 started at Mon Mar 20 20:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30971 at Mon Mar 20 20:49:04 UTC 2023 kill -USR1 30971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30971 killed at Mon Mar 20 20:49:04 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:49:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31023 found at Mon Mar 20 20:49:04 UTC 2023 selfserv_9887 with PID 31023 started at Mon Mar 20 20:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31023 at Mon Mar 20 20:49:05 UTC 2023 kill -USR1 31023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31023 killed at Mon Mar 20 20:49:05 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:49:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31075 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31075 found at Mon Mar 20 20:49:05 UTC 2023 selfserv_9887 with PID 31075 started at Mon Mar 20 20:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31075 at Mon Mar 20 20:49:06 UTC 2023 kill -USR1 31075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31075 killed at Mon Mar 20 20:49:06 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:49:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31133 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31133 found at Mon Mar 20 20:49:06 UTC 2023 selfserv_9887 with PID 31133 started at Mon Mar 20 20:49:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31133 at Mon Mar 20 20:49:07 UTC 2023 kill -USR1 31133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31133 killed at Mon Mar 20 20:49:07 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:49:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31191 found at Mon Mar 20 20:49:07 UTC 2023 selfserv_9887 with PID 31191 started at Mon Mar 20 20:49:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31191 at Mon Mar 20 20:49:07 UTC 2023 kill -USR1 31191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31191 killed at Mon Mar 20 20:49:07 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:49:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31249 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31249 found at Mon Mar 20 20:49:08 UTC 2023 selfserv_9887 with PID 31249 started at Mon Mar 20 20:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31249 at Mon Mar 20 20:49:08 UTC 2023 kill -USR1 31249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31249 killed at Mon Mar 20 20:49:08 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:49:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31307 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31307 found at Mon Mar 20 20:49:08 UTC 2023 selfserv_9887 with PID 31307 started at Mon Mar 20 20:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31307 at Mon Mar 20 20:49:09 UTC 2023 kill -USR1 31307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31307 killed at Mon Mar 20 20:49:09 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 20:49:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31365 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31365 found at Mon Mar 20 20:49:09 UTC 2023 selfserv_9887 with PID 31365 started at Mon Mar 20 20:49:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31365 at Mon Mar 20 20:49:09 UTC 2023 kill -USR1 31365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31365 killed at Mon Mar 20 20:49:09 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:49:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31423 found at Mon Mar 20 20:49:09 UTC 2023 selfserv_9887 with PID 31423 started at Mon Mar 20 20:49:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31423 at Mon Mar 20 20:49:10 UTC 2023 kill -USR1 31423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31423 killed at Mon Mar 20 20:49:10 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:49:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31481 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31481 found at Mon Mar 20 20:49:10 UTC 2023 selfserv_9887 with PID 31481 started at Mon Mar 20 20:49:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31481 at Mon Mar 20 20:49:11 UTC 2023 kill -USR1 31481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31481 killed at Mon Mar 20 20:49:11 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:49:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31539 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31539 found at Mon Mar 20 20:49:11 UTC 2023 selfserv_9887 with PID 31539 started at Mon Mar 20 20:49:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31539 at Mon Mar 20 20:49:11 UTC 2023 kill -USR1 31539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31539 killed at Mon Mar 20 20:49:11 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:49:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31597 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31597 found at Mon Mar 20 20:49:12 UTC 2023 selfserv_9887 with PID 31597 started at Mon Mar 20 20:49:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31597 at Mon Mar 20 20:49:12 UTC 2023 kill -USR1 31597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31597 killed at Mon Mar 20 20:49:12 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:49:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31656 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31656 found at Mon Mar 20 20:49:12 UTC 2023 selfserv_9887 with PID 31656 started at Mon Mar 20 20:49:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31656 at Mon Mar 20 20:49:12 UTC 2023 kill -USR1 31656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31656 killed at Mon Mar 20 20:49:13 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 20:49:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31698 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31698 found at Mon Mar 20 20:49:13 UTC 2023 selfserv_9887 with PID 31698 started at Mon Mar 20 20:49:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31698 at Mon Mar 20 20:49:13 UTC 2023 kill -USR1 31698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31698 killed at Mon Mar 20 20:49:13 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 20:49:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31740 found at Mon Mar 20 20:49:13 UTC 2023 selfserv_9887 with PID 31740 started at Mon Mar 20 20:49:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 31740 at Mon Mar 20 20:49:14 UTC 2023 kill -USR1 31740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31740 killed at Mon Mar 20 20:49:14 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 20:49:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31782 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31782 found at Mon Mar 20 20:49:14 UTC 2023 selfserv_9887 with PID 31782 started at Mon Mar 20 20:49:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 31782 at Mon Mar 20 20:49:14 UTC 2023 kill -USR1 31782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31782 killed at Mon Mar 20 20:49:15 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 20:49:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31824 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31824 found at Mon Mar 20 20:49:15 UTC 2023 selfserv_9887 with PID 31824 started at Mon Mar 20 20:49:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 31824 at Mon Mar 20 20:49:15 UTC 2023 kill -USR1 31824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31824 killed at Mon Mar 20 20:49:15 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 20:49:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31866 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31866 found at Mon Mar 20 20:49:15 UTC 2023 selfserv_9887 with PID 31866 started at Mon Mar 20 20:49:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 31866 at Mon Mar 20 20:49:16 UTC 2023 kill -USR1 31866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31866 killed at Mon Mar 20 20:49:16 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 20:49:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31908 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31908 found at Mon Mar 20 20:49:16 UTC 2023 selfserv_9887 with PID 31908 started at Mon Mar 20 20:49:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 31908 at Mon Mar 20 20:49:16 UTC 2023 kill -USR1 31908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31908 killed at Mon Mar 20 20:49:16 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 20:49:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31950 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31950 found at Mon Mar 20 20:49:16 UTC 2023 selfserv_9887 with PID 31950 started at Mon Mar 20 20:49:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 31950 at Mon Mar 20 20:49:17 UTC 2023 kill -USR1 31950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31950 killed at Mon Mar 20 20:49:17 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 20:49:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:49:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31993 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31993 found at Mon Mar 20 20:49:17 UTC 2023 selfserv_9887 with PID 31993 started at Mon Mar 20 20:49:17 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 20:49:17 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 20:50:29 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 31993 at Mon Mar 20 20:50:29 UTC 2023 kill -USR1 31993 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31993 killed at Mon Mar 20 20:50:29 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:50:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32061 found at Mon Mar 20 20:50:30 UTC 2023 selfserv_9887 with PID 32061 started at Mon Mar 20 20:50:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32061 at Mon Mar 20 20:50:30 UTC 2023 kill -USR1 32061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32061 killed at Mon Mar 20 20:50:30 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32103 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32103 found at Mon Mar 20 20:50:30 UTC 2023 selfserv_9887 with PID 32103 started at Mon Mar 20 20:50:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32103 at Mon Mar 20 20:50:31 UTC 2023 kill -USR1 32103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32103 killed at Mon Mar 20 20:50:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32142 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32142 found at Mon Mar 20 20:50:31 UTC 2023 selfserv_9887 with PID 32142 started at Mon Mar 20 20:50:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32142 at Mon Mar 20 20:50:31 UTC 2023 kill -USR1 32142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32142 killed at Mon Mar 20 20:50:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32181 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32181 found at Mon Mar 20 20:50:31 UTC 2023 selfserv_9887 with PID 32181 started at Mon Mar 20 20:50:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32181 at Mon Mar 20 20:50:32 UTC 2023 kill -USR1 32181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32181 killed at Mon Mar 20 20:50:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32220 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32220 found at Mon Mar 20 20:50:32 UTC 2023 selfserv_9887 with PID 32220 started at Mon Mar 20 20:50:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32220 at Mon Mar 20 20:50:32 UTC 2023 kill -USR1 32220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32220 killed at Mon Mar 20 20:50:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32259 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32259 found at Mon Mar 20 20:50:32 UTC 2023 selfserv_9887 with PID 32259 started at Mon Mar 20 20:50:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32259 at Mon Mar 20 20:50:33 UTC 2023 kill -USR1 32259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32259 killed at Mon Mar 20 20:50:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32298 found at Mon Mar 20 20:50:33 UTC 2023 selfserv_9887 with PID 32298 started at Mon Mar 20 20:50:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32298 at Mon Mar 20 20:50:33 UTC 2023 kill -USR1 32298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32298 killed at Mon Mar 20 20:50:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32345 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32345 found at Mon Mar 20 20:50:33 UTC 2023 selfserv_9887 with PID 32345 started at Mon Mar 20 20:50:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32345 at Mon Mar 20 20:50:34 UTC 2023 kill -USR1 32345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32345 killed at Mon Mar 20 20:50:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32384 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32384 found at Mon Mar 20 20:50:34 UTC 2023 selfserv_9887 with PID 32384 started at Mon Mar 20 20:50:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32384 at Mon Mar 20 20:50:34 UTC 2023 kill -USR1 32384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32384 killed at Mon Mar 20 20:50:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32423 found at Mon Mar 20 20:50:34 UTC 2023 selfserv_9887 with PID 32423 started at Mon Mar 20 20:50:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32423 at Mon Mar 20 20:50:35 UTC 2023 kill -USR1 32423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32423 killed at Mon Mar 20 20:50:35 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32462 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32462 found at Mon Mar 20 20:50:35 UTC 2023 selfserv_9887 with PID 32462 started at Mon Mar 20 20:50:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32462 at Mon Mar 20 20:50:35 UTC 2023 kill -USR1 32462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32462 killed at Mon Mar 20 20:50:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32502 found at Mon Mar 20 20:50:35 UTC 2023 selfserv_9887 with PID 32502 started at Mon Mar 20 20:50:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32502 at Mon Mar 20 20:50:35 UTC 2023 kill -USR1 32502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32502 killed at Mon Mar 20 20:50:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32543 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32543 found at Mon Mar 20 20:50:36 UTC 2023 selfserv_9887 with PID 32543 started at Mon Mar 20 20:50:36 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32543 at Mon Mar 20 20:50:36 UTC 2023 kill -USR1 32543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32543 killed at Mon Mar 20 20:50:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32583 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32583 found at Mon Mar 20 20:50:36 UTC 2023 selfserv_9887 with PID 32583 started at Mon Mar 20 20:50:36 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32583 at Mon Mar 20 20:50:36 UTC 2023 kill -USR1 32583 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32583 killed at Mon Mar 20 20:50:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32623 found at Mon Mar 20 20:50:37 UTC 2023 selfserv_9887 with PID 32623 started at Mon Mar 20 20:50:37 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32623 at Mon Mar 20 20:50:37 UTC 2023 kill -USR1 32623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32623 killed at Mon Mar 20 20:50:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32663 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32663 found at Mon Mar 20 20:50:37 UTC 2023 selfserv_9887 with PID 32663 started at Mon Mar 20 20:50:37 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32663 at Mon Mar 20 20:50:37 UTC 2023 kill -USR1 32663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32663 killed at Mon Mar 20 20:50:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32703 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32703 found at Mon Mar 20 20:50:38 UTC 2023 selfserv_9887 with PID 32703 started at Mon Mar 20 20:50:38 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32703 at Mon Mar 20 20:50:38 UTC 2023 kill -USR1 32703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32703 killed at Mon Mar 20 20:50:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32743 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32743 found at Mon Mar 20 20:50:38 UTC 2023 selfserv_9887 with PID 32743 started at Mon Mar 20 20:50:38 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32743 at Mon Mar 20 20:50:38 UTC 2023 kill -USR1 32743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32743 killed at Mon Mar 20 20:50:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:50:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32783 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32783 found at Mon Mar 20 20:50:39 UTC 2023 selfserv_9887 with PID 32783 started at Mon Mar 20 20:50:39 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32783 at Mon Mar 20 20:50:39 UTC 2023 kill -USR1 32783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32783 killed at Mon Mar 20 20:50:39 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:50:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 32823 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32823 found at Mon Mar 20 20:50:39 UTC 2023 selfserv_9887 with PID 32823 started at Mon Mar 20 20:50:39 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 32823 at Mon Mar 20 20:50:49 UTC 2023 kill -USR1 32823 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32823 killed at Mon Mar 20 20:50:49 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:50:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:50:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 33398 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33398 found at Mon Mar 20 20:50:49 UTC 2023 selfserv_9887 with PID 33398 started at Mon Mar 20 20:50:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33398 at Mon Mar 20 20:51:04 UTC 2023 kill -USR1 33398 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33398 killed at Mon Mar 20 20:51:04 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34214 found at Mon Mar 20 20:51:04 UTC 2023 selfserv_9887 with PID 34214 started at Mon Mar 20 20:51:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34214 at Mon Mar 20 20:51:05 UTC 2023 kill -USR1 34214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34214 killed at Mon Mar 20 20:51:05 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34266 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34266 found at Mon Mar 20 20:51:06 UTC 2023 selfserv_9887 with PID 34266 started at Mon Mar 20 20:51:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34266 at Mon Mar 20 20:51:07 UTC 2023 kill -USR1 34266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34266 killed at Mon Mar 20 20:51:07 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34318 found at Mon Mar 20 20:51:07 UTC 2023 selfserv_9887 with PID 34318 started at Mon Mar 20 20:51:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34318 at Mon Mar 20 20:51:08 UTC 2023 kill -USR1 34318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34318 killed at Mon Mar 20 20:51:08 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34370 found at Mon Mar 20 20:51:09 UTC 2023 selfserv_9887 with PID 34370 started at Mon Mar 20 20:51:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34370 at Mon Mar 20 20:51:10 UTC 2023 kill -USR1 34370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34370 killed at Mon Mar 20 20:51:10 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34424 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34424 found at Mon Mar 20 20:51:10 UTC 2023 selfserv_9887 with PID 34424 started at Mon Mar 20 20:51:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34424 at Mon Mar 20 20:51:11 UTC 2023 kill -USR1 34424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34424 killed at Mon Mar 20 20:51:11 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34476 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34476 found at Mon Mar 20 20:51:11 UTC 2023 selfserv_9887 with PID 34476 started at Mon Mar 20 20:51:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34476 at Mon Mar 20 20:51:13 UTC 2023 kill -USR1 34476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34476 killed at Mon Mar 20 20:51:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34529 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34529 found at Mon Mar 20 20:51:13 UTC 2023 selfserv_9887 with PID 34529 started at Mon Mar 20 20:51:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34529 at Mon Mar 20 20:51:14 UTC 2023 kill -USR1 34529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34529 killed at Mon Mar 20 20:51:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34581 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34581 found at Mon Mar 20 20:51:14 UTC 2023 selfserv_9887 with PID 34581 started at Mon Mar 20 20:51:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34581 at Mon Mar 20 20:51:15 UTC 2023 kill -USR1 34581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34581 killed at Mon Mar 20 20:51:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34633 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34633 found at Mon Mar 20 20:51:16 UTC 2023 selfserv_9887 with PID 34633 started at Mon Mar 20 20:51:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34633 at Mon Mar 20 20:51:17 UTC 2023 kill -USR1 34633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34633 killed at Mon Mar 20 20:51:17 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34685 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34685 found at Mon Mar 20 20:51:17 UTC 2023 selfserv_9887 with PID 34685 started at Mon Mar 20 20:51:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34685 at Mon Mar 20 20:51:18 UTC 2023 kill -USR1 34685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34685 killed at Mon Mar 20 20:51:18 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34737 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34737 found at Mon Mar 20 20:51:19 UTC 2023 selfserv_9887 with PID 34737 started at Mon Mar 20 20:51:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34737 at Mon Mar 20 20:51:20 UTC 2023 kill -USR1 34737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34737 killed at Mon Mar 20 20:51:20 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34790 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34790 found at Mon Mar 20 20:51:20 UTC 2023 selfserv_9887 with PID 34790 started at Mon Mar 20 20:51:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34790 at Mon Mar 20 20:51:21 UTC 2023 kill -USR1 34790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34790 killed at Mon Mar 20 20:51:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34842 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34842 found at Mon Mar 20 20:51:22 UTC 2023 selfserv_9887 with PID 34842 started at Mon Mar 20 20:51:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34842 at Mon Mar 20 20:51:23 UTC 2023 kill -USR1 34842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34842 killed at Mon Mar 20 20:51:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34894 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34894 found at Mon Mar 20 20:51:23 UTC 2023 selfserv_9887 with PID 34894 started at Mon Mar 20 20:51:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34894 at Mon Mar 20 20:51:24 UTC 2023 kill -USR1 34894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34894 killed at Mon Mar 20 20:51:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34946 found at Mon Mar 20 20:51:24 UTC 2023 selfserv_9887 with PID 34946 started at Mon Mar 20 20:51:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34946 at Mon Mar 20 20:51:26 UTC 2023 kill -USR1 34946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34946 killed at Mon Mar 20 20:51:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34998 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34998 found at Mon Mar 20 20:51:26 UTC 2023 selfserv_9887 with PID 34998 started at Mon Mar 20 20:51:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34998 at Mon Mar 20 20:51:27 UTC 2023 kill -USR1 34998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34998 killed at Mon Mar 20 20:51:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35050 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35050 found at Mon Mar 20 20:51:27 UTC 2023 selfserv_9887 with PID 35050 started at Mon Mar 20 20:51:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35050 at Mon Mar 20 20:51:28 UTC 2023 kill -USR1 35050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35050 killed at Mon Mar 20 20:51:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35102 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35102 found at Mon Mar 20 20:51:29 UTC 2023 selfserv_9887 with PID 35102 started at Mon Mar 20 20:51:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35102 at Mon Mar 20 20:51:30 UTC 2023 kill -USR1 35102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35102 killed at Mon Mar 20 20:51:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35155 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35155 found at Mon Mar 20 20:51:30 UTC 2023 selfserv_9887 with PID 35155 started at Mon Mar 20 20:51:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35155 at Mon Mar 20 20:51:32 UTC 2023 kill -USR1 35155 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35155 killed at Mon Mar 20 20:51:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35208 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35208 found at Mon Mar 20 20:51:32 UTC 2023 selfserv_9887 with PID 35208 started at Mon Mar 20 20:51:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35208 at Mon Mar 20 20:51:33 UTC 2023 kill -USR1 35208 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35208 killed at Mon Mar 20 20:51:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35260 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35260 found at Mon Mar 20 20:51:33 UTC 2023 selfserv_9887 with PID 35260 started at Mon Mar 20 20:51:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35260 at Mon Mar 20 20:51:35 UTC 2023 kill -USR1 35260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35260 killed at Mon Mar 20 20:51:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35312 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35312 found at Mon Mar 20 20:51:35 UTC 2023 selfserv_9887 with PID 35312 started at Mon Mar 20 20:51:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35312 at Mon Mar 20 20:51:36 UTC 2023 kill -USR1 35312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35312 killed at Mon Mar 20 20:51:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35364 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35364 found at Mon Mar 20 20:51:36 UTC 2023 selfserv_9887 with PID 35364 started at Mon Mar 20 20:51:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35364 at Mon Mar 20 20:51:38 UTC 2023 kill -USR1 35364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35364 killed at Mon Mar 20 20:51:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35416 found at Mon Mar 20 20:51:38 UTC 2023 selfserv_9887 with PID 35416 started at Mon Mar 20 20:51:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35416 at Mon Mar 20 20:51:39 UTC 2023 kill -USR1 35416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35416 killed at Mon Mar 20 20:51:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35468 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35468 found at Mon Mar 20 20:51:40 UTC 2023 selfserv_9887 with PID 35468 started at Mon Mar 20 20:51:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35468 at Mon Mar 20 20:51:41 UTC 2023 kill -USR1 35468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35468 killed at Mon Mar 20 20:51:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35524 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35524 found at Mon Mar 20 20:51:41 UTC 2023 selfserv_9887 with PID 35524 started at Mon Mar 20 20:51:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35524 at Mon Mar 20 20:51:42 UTC 2023 kill -USR1 35524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35524 killed at Mon Mar 20 20:51:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35587 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35587 found at Mon Mar 20 20:51:42 UTC 2023 selfserv_9887 with PID 35587 started at Mon Mar 20 20:51:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35587 at Mon Mar 20 20:51:44 UTC 2023 kill -USR1 35587 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35587 killed at Mon Mar 20 20:51:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35639 found at Mon Mar 20 20:51:44 UTC 2023 selfserv_9887 with PID 35639 started at Mon Mar 20 20:51:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35639 at Mon Mar 20 20:51:45 UTC 2023 kill -USR1 35639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35639 killed at Mon Mar 20 20:51:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35691 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35691 found at Mon Mar 20 20:51:45 UTC 2023 selfserv_9887 with PID 35691 started at Mon Mar 20 20:51:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35691 at Mon Mar 20 20:51:47 UTC 2023 kill -USR1 35691 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35691 killed at Mon Mar 20 20:51:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35743 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35743 found at Mon Mar 20 20:51:47 UTC 2023 selfserv_9887 with PID 35743 started at Mon Mar 20 20:51:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35743 at Mon Mar 20 20:51:48 UTC 2023 kill -USR1 35743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35743 killed at Mon Mar 20 20:51:48 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35795 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35795 found at Mon Mar 20 20:51:48 UTC 2023 selfserv_9887 with PID 35795 started at Mon Mar 20 20:51:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35795 at Mon Mar 20 20:51:50 UTC 2023 kill -USR1 35795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35795 killed at Mon Mar 20 20:51:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35847 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35847 found at Mon Mar 20 20:51:50 UTC 2023 selfserv_9887 with PID 35847 started at Mon Mar 20 20:51:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35847 at Mon Mar 20 20:51:51 UTC 2023 kill -USR1 35847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35847 killed at Mon Mar 20 20:51:51 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35899 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35899 found at Mon Mar 20 20:51:52 UTC 2023 selfserv_9887 with PID 35899 started at Mon Mar 20 20:51:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35899 at Mon Mar 20 20:51:53 UTC 2023 kill -USR1 35899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35899 killed at Mon Mar 20 20:51:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35952 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35952 found at Mon Mar 20 20:51:53 UTC 2023 selfserv_9887 with PID 35952 started at Mon Mar 20 20:51:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35952 at Mon Mar 20 20:51:54 UTC 2023 kill -USR1 35952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35952 killed at Mon Mar 20 20:51:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36005 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36005 found at Mon Mar 20 20:51:54 UTC 2023 selfserv_9887 with PID 36005 started at Mon Mar 20 20:51:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36005 at Mon Mar 20 20:51:56 UTC 2023 kill -USR1 36005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36005 killed at Mon Mar 20 20:51:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36057 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36057 found at Mon Mar 20 20:51:56 UTC 2023 selfserv_9887 with PID 36057 started at Mon Mar 20 20:51:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36057 at Mon Mar 20 20:51:57 UTC 2023 kill -USR1 36057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36057 killed at Mon Mar 20 20:51:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:51:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36109 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36109 found at Mon Mar 20 20:51:57 UTC 2023 selfserv_9887 with PID 36109 started at Mon Mar 20 20:51:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36109 at Mon Mar 20 20:51:59 UTC 2023 kill -USR1 36109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36109 killed at Mon Mar 20 20:51:59 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:51:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:51:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36161 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36161 found at Mon Mar 20 20:51:59 UTC 2023 selfserv_9887 with PID 36161 started at Mon Mar 20 20:51:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36161 at Mon Mar 20 20:52:00 UTC 2023 kill -USR1 36161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36161 killed at Mon Mar 20 20:52:00 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36213 found at Mon Mar 20 20:52:00 UTC 2023 selfserv_9887 with PID 36213 started at Mon Mar 20 20:52:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36213 at Mon Mar 20 20:52:02 UTC 2023 kill -USR1 36213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36213 killed at Mon Mar 20 20:52:02 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36265 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36265 found at Mon Mar 20 20:52:02 UTC 2023 selfserv_9887 with PID 36265 started at Mon Mar 20 20:52:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36265 at Mon Mar 20 20:52:03 UTC 2023 kill -USR1 36265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36265 killed at Mon Mar 20 20:52:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36317 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36317 found at Mon Mar 20 20:52:03 UTC 2023 selfserv_9887 with PID 36317 started at Mon Mar 20 20:52:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36317 at Mon Mar 20 20:52:04 UTC 2023 kill -USR1 36317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36317 killed at Mon Mar 20 20:52:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36369 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36369 found at Mon Mar 20 20:52:05 UTC 2023 selfserv_9887 with PID 36369 started at Mon Mar 20 20:52:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36369 at Mon Mar 20 20:52:06 UTC 2023 kill -USR1 36369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36369 killed at Mon Mar 20 20:52:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36421 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36421 found at Mon Mar 20 20:52:06 UTC 2023 selfserv_9887 with PID 36421 started at Mon Mar 20 20:52:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36421 at Mon Mar 20 20:52:07 UTC 2023 kill -USR1 36421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36421 killed at Mon Mar 20 20:52:07 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36473 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36473 found at Mon Mar 20 20:52:08 UTC 2023 selfserv_9887 with PID 36473 started at Mon Mar 20 20:52:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36473 at Mon Mar 20 20:52:09 UTC 2023 kill -USR1 36473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36473 killed at Mon Mar 20 20:52:09 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36525 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36525 found at Mon Mar 20 20:52:09 UTC 2023 selfserv_9887 with PID 36525 started at Mon Mar 20 20:52:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36525 at Mon Mar 20 20:52:10 UTC 2023 kill -USR1 36525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36525 killed at Mon Mar 20 20:52:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36577 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36577 found at Mon Mar 20 20:52:11 UTC 2023 selfserv_9887 with PID 36577 started at Mon Mar 20 20:52:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36577 at Mon Mar 20 20:52:12 UTC 2023 kill -USR1 36577 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36577 killed at Mon Mar 20 20:52:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36630 found at Mon Mar 20 20:52:12 UTC 2023 selfserv_9887 with PID 36630 started at Mon Mar 20 20:52:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36630 at Mon Mar 20 20:52:13 UTC 2023 kill -USR1 36630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36630 killed at Mon Mar 20 20:52:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36682 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36682 found at Mon Mar 20 20:52:14 UTC 2023 selfserv_9887 with PID 36682 started at Mon Mar 20 20:52:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36682 at Mon Mar 20 20:52:15 UTC 2023 kill -USR1 36682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36682 killed at Mon Mar 20 20:52:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36734 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36734 found at Mon Mar 20 20:52:15 UTC 2023 selfserv_9887 with PID 36734 started at Mon Mar 20 20:52:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36734 at Mon Mar 20 20:52:16 UTC 2023 kill -USR1 36734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36734 killed at Mon Mar 20 20:52:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36787 found at Mon Mar 20 20:52:17 UTC 2023 selfserv_9887 with PID 36787 started at Mon Mar 20 20:52:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36787 at Mon Mar 20 20:52:18 UTC 2023 kill -USR1 36787 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36787 killed at Mon Mar 20 20:52:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36839 found at Mon Mar 20 20:52:18 UTC 2023 selfserv_9887 with PID 36839 started at Mon Mar 20 20:52:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36839 at Mon Mar 20 20:52:20 UTC 2023 kill -USR1 36839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36839 killed at Mon Mar 20 20:52:20 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36891 found at Mon Mar 20 20:52:20 UTC 2023 selfserv_9887 with PID 36891 started at Mon Mar 20 20:52:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36891 at Mon Mar 20 20:52:21 UTC 2023 kill -USR1 36891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36891 killed at Mon Mar 20 20:52:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36945 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36945 found at Mon Mar 20 20:52:22 UTC 2023 selfserv_9887 with PID 36945 started at Mon Mar 20 20:52:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36945 at Mon Mar 20 20:52:23 UTC 2023 kill -USR1 36945 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36945 killed at Mon Mar 20 20:52:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36997 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36997 found at Mon Mar 20 20:52:23 UTC 2023 selfserv_9887 with PID 36997 started at Mon Mar 20 20:52:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36997 at Mon Mar 20 20:52:24 UTC 2023 kill -USR1 36997 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36997 killed at Mon Mar 20 20:52:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:52:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37049 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37049 found at Mon Mar 20 20:52:25 UTC 2023 selfserv_9887 with PID 37049 started at Mon Mar 20 20:52:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37049 at Mon Mar 20 20:52:26 UTC 2023 kill -USR1 37049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37049 killed at Mon Mar 20 20:52:26 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37101 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37101 found at Mon Mar 20 20:52:26 UTC 2023 selfserv_9887 with PID 37101 started at Mon Mar 20 20:52:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37101 at Mon Mar 20 20:52:27 UTC 2023 kill -USR1 37101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37101 killed at Mon Mar 20 20:52:27 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37153 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37153 found at Mon Mar 20 20:52:28 UTC 2023 selfserv_9887 with PID 37153 started at Mon Mar 20 20:52:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37153 at Mon Mar 20 20:52:29 UTC 2023 kill -USR1 37153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37153 killed at Mon Mar 20 20:52:29 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:52:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37205 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37205 found at Mon Mar 20 20:52:29 UTC 2023 selfserv_9887 with PID 37205 started at Mon Mar 20 20:52:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37205 at Mon Mar 20 20:52:31 UTC 2023 kill -USR1 37205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37205 killed at Mon Mar 20 20:52:31 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:52:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37287 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37287 found at Mon Mar 20 20:52:31 UTC 2023 selfserv_9887 with PID 37287 started at Mon Mar 20 20:52:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37287 at Mon Mar 20 20:52:32 UTC 2023 kill -USR1 37287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37287 killed at Mon Mar 20 20:52:32 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37329 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37329 found at Mon Mar 20 20:52:32 UTC 2023 selfserv_9887 with PID 37329 started at Mon Mar 20 20:52:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37329 at Mon Mar 20 20:52:32 UTC 2023 kill -USR1 37329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37329 killed at Mon Mar 20 20:52:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37368 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37368 found at Mon Mar 20 20:52:33 UTC 2023 selfserv_9887 with PID 37368 started at Mon Mar 20 20:52:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37368 at Mon Mar 20 20:52:33 UTC 2023 kill -USR1 37368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37368 killed at Mon Mar 20 20:52:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37407 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37407 found at Mon Mar 20 20:52:33 UTC 2023 selfserv_9887 with PID 37407 started at Mon Mar 20 20:52:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37407 at Mon Mar 20 20:52:34 UTC 2023 kill -USR1 37407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37407 killed at Mon Mar 20 20:52:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37446 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37446 found at Mon Mar 20 20:52:34 UTC 2023 selfserv_9887 with PID 37446 started at Mon Mar 20 20:52:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37446 at Mon Mar 20 20:52:35 UTC 2023 kill -USR1 37446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37446 killed at Mon Mar 20 20:52:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37485 found at Mon Mar 20 20:52:35 UTC 2023 selfserv_9887 with PID 37485 started at Mon Mar 20 20:52:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37485 at Mon Mar 20 20:52:35 UTC 2023 kill -USR1 37485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37485 killed at Mon Mar 20 20:52:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37524 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37524 found at Mon Mar 20 20:52:36 UTC 2023 selfserv_9887 with PID 37524 started at Mon Mar 20 20:52:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37524 at Mon Mar 20 20:52:36 UTC 2023 kill -USR1 37524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37524 killed at Mon Mar 20 20:52:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37563 found at Mon Mar 20 20:52:36 UTC 2023 selfserv_9887 with PID 37563 started at Mon Mar 20 20:52:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37563 at Mon Mar 20 20:52:37 UTC 2023 kill -USR1 37563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37563 killed at Mon Mar 20 20:52:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37602 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37602 found at Mon Mar 20 20:52:37 UTC 2023 selfserv_9887 with PID 37602 started at Mon Mar 20 20:52:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37602 at Mon Mar 20 20:52:38 UTC 2023 kill -USR1 37602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37602 killed at Mon Mar 20 20:52:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37644 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37644 found at Mon Mar 20 20:52:38 UTC 2023 selfserv_9887 with PID 37644 started at Mon Mar 20 20:52:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37644 at Mon Mar 20 20:52:38 UTC 2023 kill -USR1 37644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37644 killed at Mon Mar 20 20:52:38 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37683 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37683 found at Mon Mar 20 20:52:39 UTC 2023 selfserv_9887 with PID 37683 started at Mon Mar 20 20:52:39 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37683 at Mon Mar 20 20:52:39 UTC 2023 kill -USR1 37683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37683 killed at Mon Mar 20 20:52:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37723 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37723 found at Mon Mar 20 20:52:39 UTC 2023 selfserv_9887 with PID 37723 started at Mon Mar 20 20:52:39 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37723 at Mon Mar 20 20:52:40 UTC 2023 kill -USR1 37723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37723 killed at Mon Mar 20 20:52:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37766 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37766 found at Mon Mar 20 20:52:40 UTC 2023 selfserv_9887 with PID 37766 started at Mon Mar 20 20:52:40 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37766 at Mon Mar 20 20:52:41 UTC 2023 kill -USR1 37766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37766 killed at Mon Mar 20 20:52:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37806 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37806 found at Mon Mar 20 20:52:41 UTC 2023 selfserv_9887 with PID 37806 started at Mon Mar 20 20:52:41 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37806 at Mon Mar 20 20:52:41 UTC 2023 kill -USR1 37806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37806 killed at Mon Mar 20 20:52:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37851 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37851 found at Mon Mar 20 20:52:42 UTC 2023 selfserv_9887 with PID 37851 started at Mon Mar 20 20:52:42 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37851 at Mon Mar 20 20:52:42 UTC 2023 kill -USR1 37851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37851 killed at Mon Mar 20 20:52:42 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37898 found at Mon Mar 20 20:52:42 UTC 2023 selfserv_9887 with PID 37898 started at Mon Mar 20 20:52:42 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37898 at Mon Mar 20 20:52:43 UTC 2023 kill -USR1 37898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37898 killed at Mon Mar 20 20:52:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37939 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37939 found at Mon Mar 20 20:52:43 UTC 2023 selfserv_9887 with PID 37939 started at Mon Mar 20 20:52:43 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37939 at Mon Mar 20 20:52:44 UTC 2023 kill -USR1 37939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37939 killed at Mon Mar 20 20:52:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37979 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37979 found at Mon Mar 20 20:52:44 UTC 2023 selfserv_9887 with PID 37979 started at Mon Mar 20 20:52:44 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37979 at Mon Mar 20 20:52:44 UTC 2023 kill -USR1 37979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37979 killed at Mon Mar 20 20:52:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:52:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38020 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38020 found at Mon Mar 20 20:52:45 UTC 2023 selfserv_9887 with PID 38020 started at Mon Mar 20 20:52:45 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38020 at Mon Mar 20 20:52:45 UTC 2023 kill -USR1 38020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38020 killed at Mon Mar 20 20:52:45 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:52:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 38104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38104 found at Mon Mar 20 20:52:46 UTC 2023 selfserv_9887 with PID 38104 started at Mon Mar 20 20:52:46 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 38104 at Mon Mar 20 20:52:55 UTC 2023 kill -USR1 38104 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38104 killed at Mon Mar 20 20:52:56 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:52:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:52:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 38653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38653 found at Mon Mar 20 20:52:56 UTC 2023 selfserv_9887 with PID 38653 started at Mon Mar 20 20:52:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38653 at Mon Mar 20 20:53:14 UTC 2023 kill -USR1 38653 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38653 killed at Mon Mar 20 20:53:15 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:53:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39454 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39454 found at Mon Mar 20 20:53:15 UTC 2023 selfserv_9887 with PID 39454 started at Mon Mar 20 20:53:15 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39454 at Mon Mar 20 20:53:15 UTC 2023 kill -USR1 39454 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39454 killed at Mon Mar 20 20:53:15 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39520 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39520 found at Mon Mar 20 20:53:15 UTC 2023 selfserv_9887 with PID 39520 started at Mon Mar 20 20:53:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39520 at Mon Mar 20 20:53:16 UTC 2023 kill -USR1 39520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39520 killed at Mon Mar 20 20:53:16 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39573 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39573 found at Mon Mar 20 20:53:16 UTC 2023 selfserv_9887 with PID 39573 started at Mon Mar 20 20:53:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39573 at Mon Mar 20 20:53:17 UTC 2023 kill -USR1 39573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39573 killed at Mon Mar 20 20:53:17 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39625 found at Mon Mar 20 20:53:17 UTC 2023 selfserv_9887 with PID 39625 started at Mon Mar 20 20:53:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39625 at Mon Mar 20 20:53:18 UTC 2023 kill -USR1 39625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39625 killed at Mon Mar 20 20:53:18 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39677 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39677 found at Mon Mar 20 20:53:18 UTC 2023 selfserv_9887 with PID 39677 started at Mon Mar 20 20:53:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39677 at Mon Mar 20 20:53:19 UTC 2023 kill -USR1 39677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39677 killed at Mon Mar 20 20:53:19 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39729 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39729 found at Mon Mar 20 20:53:19 UTC 2023 selfserv_9887 with PID 39729 started at Mon Mar 20 20:53:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39729 at Mon Mar 20 20:53:20 UTC 2023 kill -USR1 39729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39729 killed at Mon Mar 20 20:53:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39781 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39781 found at Mon Mar 20 20:53:20 UTC 2023 selfserv_9887 with PID 39781 started at Mon Mar 20 20:53:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39781 at Mon Mar 20 20:53:21 UTC 2023 kill -USR1 39781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39781 killed at Mon Mar 20 20:53:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39833 found at Mon Mar 20 20:53:21 UTC 2023 selfserv_9887 with PID 39833 started at Mon Mar 20 20:53:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39833 at Mon Mar 20 20:53:22 UTC 2023 kill -USR1 39833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39833 killed at Mon Mar 20 20:53:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39885 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39885 found at Mon Mar 20 20:53:22 UTC 2023 selfserv_9887 with PID 39885 started at Mon Mar 20 20:53:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39885 at Mon Mar 20 20:53:22 UTC 2023 kill -USR1 39885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39885 killed at Mon Mar 20 20:53:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39938 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39938 found at Mon Mar 20 20:53:23 UTC 2023 selfserv_9887 with PID 39938 started at Mon Mar 20 20:53:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39938 at Mon Mar 20 20:53:23 UTC 2023 kill -USR1 39938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39938 killed at Mon Mar 20 20:53:23 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39990 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39990 found at Mon Mar 20 20:53:23 UTC 2023 selfserv_9887 with PID 39990 started at Mon Mar 20 20:53:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39990 at Mon Mar 20 20:53:24 UTC 2023 kill -USR1 39990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39990 killed at Mon Mar 20 20:53:24 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40046 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40046 found at Mon Mar 20 20:53:24 UTC 2023 selfserv_9887 with PID 40046 started at Mon Mar 20 20:53:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40046 at Mon Mar 20 20:53:24 UTC 2023 kill -USR1 40046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40046 killed at Mon Mar 20 20:53:25 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40098 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40098 found at Mon Mar 20 20:53:25 UTC 2023 selfserv_9887 with PID 40098 started at Mon Mar 20 20:53:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40098 at Mon Mar 20 20:53:25 UTC 2023 kill -USR1 40098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40098 killed at Mon Mar 20 20:53:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40155 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40155 found at Mon Mar 20 20:53:25 UTC 2023 selfserv_9887 with PID 40155 started at Mon Mar 20 20:53:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40155 at Mon Mar 20 20:53:26 UTC 2023 kill -USR1 40155 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40155 killed at Mon Mar 20 20:53:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40207 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40207 found at Mon Mar 20 20:53:27 UTC 2023 selfserv_9887 with PID 40207 started at Mon Mar 20 20:53:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40207 at Mon Mar 20 20:53:27 UTC 2023 kill -USR1 40207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40207 killed at Mon Mar 20 20:53:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40259 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40259 found at Mon Mar 20 20:53:28 UTC 2023 selfserv_9887 with PID 40259 started at Mon Mar 20 20:53:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40259 at Mon Mar 20 20:53:29 UTC 2023 kill -USR1 40259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40259 killed at Mon Mar 20 20:53:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40311 found at Mon Mar 20 20:53:29 UTC 2023 selfserv_9887 with PID 40311 started at Mon Mar 20 20:53:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40311 at Mon Mar 20 20:53:30 UTC 2023 kill -USR1 40311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40311 killed at Mon Mar 20 20:53:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40363 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40363 found at Mon Mar 20 20:53:30 UTC 2023 selfserv_9887 with PID 40363 started at Mon Mar 20 20:53:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40363 at Mon Mar 20 20:53:31 UTC 2023 kill -USR1 40363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40363 killed at Mon Mar 20 20:53:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40415 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40415 found at Mon Mar 20 20:53:31 UTC 2023 selfserv_9887 with PID 40415 started at Mon Mar 20 20:53:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40415 at Mon Mar 20 20:53:32 UTC 2023 kill -USR1 40415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40415 killed at Mon Mar 20 20:53:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40467 found at Mon Mar 20 20:53:32 UTC 2023 selfserv_9887 with PID 40467 started at Mon Mar 20 20:53:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40467 at Mon Mar 20 20:53:33 UTC 2023 kill -USR1 40467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40467 killed at Mon Mar 20 20:53:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40519 found at Mon Mar 20 20:53:34 UTC 2023 selfserv_9887 with PID 40519 started at Mon Mar 20 20:53:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40519 at Mon Mar 20 20:53:34 UTC 2023 kill -USR1 40519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40519 killed at Mon Mar 20 20:53:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40571 found at Mon Mar 20 20:53:35 UTC 2023 selfserv_9887 with PID 40571 started at Mon Mar 20 20:53:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40571 at Mon Mar 20 20:53:36 UTC 2023 kill -USR1 40571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40571 killed at Mon Mar 20 20:53:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40623 found at Mon Mar 20 20:53:36 UTC 2023 selfserv_9887 with PID 40623 started at Mon Mar 20 20:53:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40623 at Mon Mar 20 20:53:37 UTC 2023 kill -USR1 40623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40623 killed at Mon Mar 20 20:53:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40675 found at Mon Mar 20 20:53:37 UTC 2023 selfserv_9887 with PID 40675 started at Mon Mar 20 20:53:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40675 at Mon Mar 20 20:53:38 UTC 2023 kill -USR1 40675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40675 killed at Mon Mar 20 20:53:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40727 found at Mon Mar 20 20:53:38 UTC 2023 selfserv_9887 with PID 40727 started at Mon Mar 20 20:53:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40727 at Mon Mar 20 20:53:39 UTC 2023 kill -USR1 40727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40727 killed at Mon Mar 20 20:53:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40779 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40779 found at Mon Mar 20 20:53:39 UTC 2023 selfserv_9887 with PID 40779 started at Mon Mar 20 20:53:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40779 at Mon Mar 20 20:53:40 UTC 2023 kill -USR1 40779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40779 killed at Mon Mar 20 20:53:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40834 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40834 found at Mon Mar 20 20:53:40 UTC 2023 selfserv_9887 with PID 40834 started at Mon Mar 20 20:53:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40834 at Mon Mar 20 20:53:41 UTC 2023 kill -USR1 40834 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40834 killed at Mon Mar 20 20:53:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40886 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40886 found at Mon Mar 20 20:53:41 UTC 2023 selfserv_9887 with PID 40886 started at Mon Mar 20 20:53:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40886 at Mon Mar 20 20:53:41 UTC 2023 kill -USR1 40886 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40886 killed at Mon Mar 20 20:53:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40943 found at Mon Mar 20 20:53:42 UTC 2023 selfserv_9887 with PID 40943 started at Mon Mar 20 20:53:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40943 at Mon Mar 20 20:53:42 UTC 2023 kill -USR1 40943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40943 killed at Mon Mar 20 20:53:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 343 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 343 found at Mon Mar 20 20:53:43 UTC 2023 selfserv_9887 with PID 343 started at Mon Mar 20 20:53:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 343 at Mon Mar 20 20:53:43 UTC 2023 kill -USR1 343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 343 killed at Mon Mar 20 20:53:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 395 found at Mon Mar 20 20:53:43 UTC 2023 selfserv_9887 with PID 395 started at Mon Mar 20 20:53:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 395 at Mon Mar 20 20:53:44 UTC 2023 kill -USR1 395 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 395 killed at Mon Mar 20 20:53:44 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 451 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 451 found at Mon Mar 20 20:53:44 UTC 2023 selfserv_9887 with PID 451 started at Mon Mar 20 20:53:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 451 at Mon Mar 20 20:53:44 UTC 2023 kill -USR1 451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 451 killed at Mon Mar 20 20:53:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 503 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 503 found at Mon Mar 20 20:53:45 UTC 2023 selfserv_9887 with PID 503 started at Mon Mar 20 20:53:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 503 at Mon Mar 20 20:53:45 UTC 2023 kill -USR1 503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 503 killed at Mon Mar 20 20:53:45 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 555 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 555 found at Mon Mar 20 20:53:45 UTC 2023 selfserv_9887 with PID 555 started at Mon Mar 20 20:53:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 555 at Mon Mar 20 20:53:46 UTC 2023 kill -USR1 555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 555 killed at Mon Mar 20 20:53:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 607 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 607 found at Mon Mar 20 20:53:46 UTC 2023 selfserv_9887 with PID 607 started at Mon Mar 20 20:53:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 607 at Mon Mar 20 20:53:47 UTC 2023 kill -USR1 607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 607 killed at Mon Mar 20 20:53:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 659 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 659 found at Mon Mar 20 20:53:47 UTC 2023 selfserv_9887 with PID 659 started at Mon Mar 20 20:53:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 659 at Mon Mar 20 20:53:47 UTC 2023 kill -USR1 659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 659 killed at Mon Mar 20 20:53:47 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 711 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 711 found at Mon Mar 20 20:53:48 UTC 2023 selfserv_9887 with PID 711 started at Mon Mar 20 20:53:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 711 at Mon Mar 20 20:53:48 UTC 2023 kill -USR1 711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 711 killed at Mon Mar 20 20:53:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 763 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 763 found at Mon Mar 20 20:53:48 UTC 2023 selfserv_9887 with PID 763 started at Mon Mar 20 20:53:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 763 at Mon Mar 20 20:53:49 UTC 2023 kill -USR1 763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 763 killed at Mon Mar 20 20:53:49 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 816 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 816 found at Mon Mar 20 20:53:49 UTC 2023 selfserv_9887 with PID 816 started at Mon Mar 20 20:53:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 816 at Mon Mar 20 20:53:50 UTC 2023 kill -USR1 816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 816 killed at Mon Mar 20 20:53:50 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 868 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 868 found at Mon Mar 20 20:53:50 UTC 2023 selfserv_9887 with PID 868 started at Mon Mar 20 20:53:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 868 at Mon Mar 20 20:53:51 UTC 2023 kill -USR1 868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 868 killed at Mon Mar 20 20:53:51 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 920 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 920 found at Mon Mar 20 20:53:51 UTC 2023 selfserv_9887 with PID 920 started at Mon Mar 20 20:53:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 920 at Mon Mar 20 20:53:52 UTC 2023 kill -USR1 920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 920 killed at Mon Mar 20 20:53:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 974 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 974 found at Mon Mar 20 20:53:52 UTC 2023 selfserv_9887 with PID 974 started at Mon Mar 20 20:53:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 974 at Mon Mar 20 20:53:52 UTC 2023 kill -USR1 974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 974 killed at Mon Mar 20 20:53:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1026 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1026 found at Mon Mar 20 20:53:53 UTC 2023 selfserv_9887 with PID 1026 started at Mon Mar 20 20:53:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1026 at Mon Mar 20 20:53:53 UTC 2023 kill -USR1 1026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1026 killed at Mon Mar 20 20:53:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1078 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1078 found at Mon Mar 20 20:53:53 UTC 2023 selfserv_9887 with PID 1078 started at Mon Mar 20 20:53:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1078 at Mon Mar 20 20:53:54 UTC 2023 kill -USR1 1078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1078 killed at Mon Mar 20 20:53:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1130 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1130 found at Mon Mar 20 20:53:54 UTC 2023 selfserv_9887 with PID 1130 started at Mon Mar 20 20:53:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1130 at Mon Mar 20 20:53:55 UTC 2023 kill -USR1 1130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1130 killed at Mon Mar 20 20:53:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1183 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1183 found at Mon Mar 20 20:53:55 UTC 2023 selfserv_9887 with PID 1183 started at Mon Mar 20 20:53:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1183 at Mon Mar 20 20:53:56 UTC 2023 kill -USR1 1183 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1183 killed at Mon Mar 20 20:53:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1235 found at Mon Mar 20 20:53:56 UTC 2023 selfserv_9887 with PID 1235 started at Mon Mar 20 20:53:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1235 at Mon Mar 20 20:53:57 UTC 2023 kill -USR1 1235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1235 killed at Mon Mar 20 20:53:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1289 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1289 found at Mon Mar 20 20:53:57 UTC 2023 selfserv_9887 with PID 1289 started at Mon Mar 20 20:53:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1289 at Mon Mar 20 20:53:58 UTC 2023 kill -USR1 1289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1289 killed at Mon Mar 20 20:53:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:53:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1341 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1341 found at Mon Mar 20 20:53:58 UTC 2023 selfserv_9887 with PID 1341 started at Mon Mar 20 20:53:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1341 at Mon Mar 20 20:53:59 UTC 2023 kill -USR1 1341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1341 killed at Mon Mar 20 20:53:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:53:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:53:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1393 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1393 found at Mon Mar 20 20:53:59 UTC 2023 selfserv_9887 with PID 1393 started at Mon Mar 20 20:53:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1393 at Mon Mar 20 20:54:00 UTC 2023 kill -USR1 1393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1393 killed at Mon Mar 20 20:54:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:54:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1445 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1445 found at Mon Mar 20 20:54:00 UTC 2023 selfserv_9887 with PID 1445 started at Mon Mar 20 20:54:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1445 at Mon Mar 20 20:54:01 UTC 2023 kill -USR1 1445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1445 killed at Mon Mar 20 20:54:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:54:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1497 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1497 found at Mon Mar 20 20:54:01 UTC 2023 selfserv_9887 with PID 1497 started at Mon Mar 20 20:54:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1497 at Mon Mar 20 20:54:02 UTC 2023 kill -USR1 1497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1497 killed at Mon Mar 20 20:54:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:54:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1549 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1549 found at Mon Mar 20 20:54:03 UTC 2023 selfserv_9887 with PID 1549 started at Mon Mar 20 20:54:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1549 at Mon Mar 20 20:54:03 UTC 2023 kill -USR1 1549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1549 killed at Mon Mar 20 20:54:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:54:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1601 found at Mon Mar 20 20:54:04 UTC 2023 selfserv_9887 with PID 1601 started at Mon Mar 20 20:54:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1601 at Mon Mar 20 20:54:04 UTC 2023 kill -USR1 1601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1601 killed at Mon Mar 20 20:54:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:54:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1653 found at Mon Mar 20 20:54:04 UTC 2023 selfserv_9887 with PID 1653 started at Mon Mar 20 20:54:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1653 at Mon Mar 20 20:54:05 UTC 2023 kill -USR1 1653 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1653 killed at Mon Mar 20 20:54:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:54:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1705 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1705 found at Mon Mar 20 20:54:05 UTC 2023 selfserv_9887 with PID 1705 started at Mon Mar 20 20:54:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1705 at Mon Mar 20 20:54:06 UTC 2023 kill -USR1 1705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1705 killed at Mon Mar 20 20:54:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:54:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1757 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1757 found at Mon Mar 20 20:54:06 UTC 2023 selfserv_9887 with PID 1757 started at Mon Mar 20 20:54:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1757 at Mon Mar 20 20:54:07 UTC 2023 kill -USR1 1757 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1757 killed at Mon Mar 20 20:54:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:54:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1809 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1809 found at Mon Mar 20 20:54:07 UTC 2023 selfserv_9887 with PID 1809 started at Mon Mar 20 20:54:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1809 at Mon Mar 20 20:54:08 UTC 2023 kill -USR1 1809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1809 killed at Mon Mar 20 20:54:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:54:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1861 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1861 found at Mon Mar 20 20:54:08 UTC 2023 selfserv_9887 with PID 1861 started at Mon Mar 20 20:54:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1861 at Mon Mar 20 20:54:09 UTC 2023 kill -USR1 1861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1861 killed at Mon Mar 20 20:54:09 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:54:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1919 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1919 found at Mon Mar 20 20:54:09 UTC 2023 selfserv_9887 with PID 1919 started at Mon Mar 20 20:54:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1919 at Mon Mar 20 20:54:09 UTC 2023 kill -USR1 1919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1919 killed at Mon Mar 20 20:54:09 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:54:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1977 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1977 found at Mon Mar 20 20:54:10 UTC 2023 selfserv_9887 with PID 1977 started at Mon Mar 20 20:54:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1977 at Mon Mar 20 20:54:10 UTC 2023 kill -USR1 1977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1977 killed at Mon Mar 20 20:54:10 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:54:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2036 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2036 found at Mon Mar 20 20:54:10 UTC 2023 selfserv_9887 with PID 2036 started at Mon Mar 20 20:54:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2036 at Mon Mar 20 20:54:11 UTC 2023 kill -USR1 2036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2036 killed at Mon Mar 20 20:54:11 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:54:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2094 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2094 found at Mon Mar 20 20:54:11 UTC 2023 selfserv_9887 with PID 2094 started at Mon Mar 20 20:54:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2094 at Mon Mar 20 20:54:11 UTC 2023 kill -USR1 2094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2094 killed at Mon Mar 20 20:54:11 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 20:54:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2152 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2152 found at Mon Mar 20 20:54:12 UTC 2023 selfserv_9887 with PID 2152 started at Mon Mar 20 20:54:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2152 at Mon Mar 20 20:54:12 UTC 2023 kill -USR1 2152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2152 killed at Mon Mar 20 20:54:12 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 20:54:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2210 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2210 found at Mon Mar 20 20:54:12 UTC 2023 selfserv_9887 with PID 2210 started at Mon Mar 20 20:54:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2210 at Mon Mar 20 20:54:13 UTC 2023 kill -USR1 2210 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2210 killed at Mon Mar 20 20:54:13 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 20:54:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2268 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2268 found at Mon Mar 20 20:54:13 UTC 2023 selfserv_9887 with PID 2268 started at Mon Mar 20 20:54:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2268 at Mon Mar 20 20:54:13 UTC 2023 kill -USR1 2268 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2268 killed at Mon Mar 20 20:54:13 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:54:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2326 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2326 found at Mon Mar 20 20:54:14 UTC 2023 selfserv_9887 with PID 2326 started at Mon Mar 20 20:54:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2326 at Mon Mar 20 20:54:14 UTC 2023 kill -USR1 2326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2326 killed at Mon Mar 20 20:54:14 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 20:54:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2384 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2384 found at Mon Mar 20 20:54:14 UTC 2023 selfserv_9887 with PID 2384 started at Mon Mar 20 20:54:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2384 at Mon Mar 20 20:54:15 UTC 2023 kill -USR1 2384 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2384 killed at Mon Mar 20 20:54:15 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 20:54:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2443 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2443 found at Mon Mar 20 20:54:15 UTC 2023 selfserv_9887 with PID 2443 started at Mon Mar 20 20:54:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2443 at Mon Mar 20 20:54:15 UTC 2023 kill -USR1 2443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2443 killed at Mon Mar 20 20:54:15 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 20:54:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2485 found at Mon Mar 20 20:54:16 UTC 2023 selfserv_9887 with PID 2485 started at Mon Mar 20 20:54:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2485 at Mon Mar 20 20:54:16 UTC 2023 kill -USR1 2485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2485 killed at Mon Mar 20 20:54:16 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 20:54:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2527 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2527 found at Mon Mar 20 20:54:16 UTC 2023 selfserv_9887 with PID 2527 started at Mon Mar 20 20:54:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 2527 at Mon Mar 20 20:54:17 UTC 2023 kill -USR1 2527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2527 killed at Mon Mar 20 20:54:17 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 20:54:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2569 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2569 found at Mon Mar 20 20:54:17 UTC 2023 selfserv_9887 with PID 2569 started at Mon Mar 20 20:54:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 2569 at Mon Mar 20 20:54:17 UTC 2023 kill -USR1 2569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2569 killed at Mon Mar 20 20:54:17 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 20:54:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2611 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2611 found at Mon Mar 20 20:54:17 UTC 2023 selfserv_9887 with PID 2611 started at Mon Mar 20 20:54:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 2611 at Mon Mar 20 20:54:18 UTC 2023 kill -USR1 2611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2611 killed at Mon Mar 20 20:54:18 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 20:54:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2653 found at Mon Mar 20 20:54:18 UTC 2023 selfserv_9887 with PID 2653 started at Mon Mar 20 20:54:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 2653 at Mon Mar 20 20:54:18 UTC 2023 kill -USR1 2653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2653 killed at Mon Mar 20 20:54:18 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 20:54:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2695 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2695 found at Mon Mar 20 20:54:19 UTC 2023 selfserv_9887 with PID 2695 started at Mon Mar 20 20:54:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 2695 at Mon Mar 20 20:54:19 UTC 2023 kill -USR1 2695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2695 killed at Mon Mar 20 20:54:19 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 20:54:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2737 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2737 found at Mon Mar 20 20:54:19 UTC 2023 selfserv_9887 with PID 2737 started at Mon Mar 20 20:54:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 2737 at Mon Mar 20 20:54:20 UTC 2023 kill -USR1 2737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2737 killed at Mon Mar 20 20:54:20 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 20:54:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:54:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2780 found at Mon Mar 20 20:54:20 UTC 2023 selfserv_9887 with PID 2780 started at Mon Mar 20 20:54:20 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 20:54:20 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 20:55:32 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 2780 at Mon Mar 20 20:55:32 UTC 2023 kill -USR1 2780 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2780 killed at Mon Mar 20 20:55:32 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:55:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2848 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2848 found at Mon Mar 20 20:55:33 UTC 2023 selfserv_9887 with PID 2848 started at Mon Mar 20 20:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2848 at Mon Mar 20 20:55:33 UTC 2023 kill -USR1 2848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2848 killed at Mon Mar 20 20:55:33 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2890 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2890 found at Mon Mar 20 20:55:33 UTC 2023 selfserv_9887 with PID 2890 started at Mon Mar 20 20:55:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2890 at Mon Mar 20 20:55:34 UTC 2023 kill -USR1 2890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2890 killed at Mon Mar 20 20:55:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2929 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2929 found at Mon Mar 20 20:55:34 UTC 2023 selfserv_9887 with PID 2929 started at Mon Mar 20 20:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2929 at Mon Mar 20 20:55:34 UTC 2023 kill -USR1 2929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2929 killed at Mon Mar 20 20:55:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2968 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2968 found at Mon Mar 20 20:55:34 UTC 2023 selfserv_9887 with PID 2968 started at Mon Mar 20 20:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2968 at Mon Mar 20 20:55:35 UTC 2023 kill -USR1 2968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2968 killed at Mon Mar 20 20:55:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3007 found at Mon Mar 20 20:55:35 UTC 2023 selfserv_9887 with PID 3007 started at Mon Mar 20 20:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3007 at Mon Mar 20 20:55:35 UTC 2023 kill -USR1 3007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3007 killed at Mon Mar 20 20:55:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3046 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3046 found at Mon Mar 20 20:55:35 UTC 2023 selfserv_9887 with PID 3046 started at Mon Mar 20 20:55:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3046 at Mon Mar 20 20:55:36 UTC 2023 kill -USR1 3046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3046 killed at Mon Mar 20 20:55:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3085 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3085 found at Mon Mar 20 20:55:36 UTC 2023 selfserv_9887 with PID 3085 started at Mon Mar 20 20:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3085 at Mon Mar 20 20:55:36 UTC 2023 kill -USR1 3085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3085 killed at Mon Mar 20 20:55:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3124 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3124 found at Mon Mar 20 20:55:36 UTC 2023 selfserv_9887 with PID 3124 started at Mon Mar 20 20:55:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3124 at Mon Mar 20 20:55:37 UTC 2023 kill -USR1 3124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3124 killed at Mon Mar 20 20:55:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3164 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3164 found at Mon Mar 20 20:55:37 UTC 2023 selfserv_9887 with PID 3164 started at Mon Mar 20 20:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3164 at Mon Mar 20 20:55:37 UTC 2023 kill -USR1 3164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3164 killed at Mon Mar 20 20:55:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3203 found at Mon Mar 20 20:55:37 UTC 2023 selfserv_9887 with PID 3203 started at Mon Mar 20 20:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3203 at Mon Mar 20 20:55:38 UTC 2023 kill -USR1 3203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3203 killed at Mon Mar 20 20:55:38 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3242 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3242 found at Mon Mar 20 20:55:38 UTC 2023 selfserv_9887 with PID 3242 started at Mon Mar 20 20:55:38 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3242 at Mon Mar 20 20:55:38 UTC 2023 kill -USR1 3242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3242 killed at Mon Mar 20 20:55:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3282 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3282 found at Mon Mar 20 20:55:38 UTC 2023 selfserv_9887 with PID 3282 started at Mon Mar 20 20:55:38 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3282 at Mon Mar 20 20:55:39 UTC 2023 kill -USR1 3282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3282 killed at Mon Mar 20 20:55:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3322 found at Mon Mar 20 20:55:39 UTC 2023 selfserv_9887 with PID 3322 started at Mon Mar 20 20:55:39 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3322 at Mon Mar 20 20:55:39 UTC 2023 kill -USR1 3322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3322 killed at Mon Mar 20 20:55:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3362 found at Mon Mar 20 20:55:39 UTC 2023 selfserv_9887 with PID 3362 started at Mon Mar 20 20:55:39 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3362 at Mon Mar 20 20:55:39 UTC 2023 kill -USR1 3362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3362 killed at Mon Mar 20 20:55:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3402 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3402 found at Mon Mar 20 20:55:40 UTC 2023 selfserv_9887 with PID 3402 started at Mon Mar 20 20:55:40 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3402 at Mon Mar 20 20:55:40 UTC 2023 kill -USR1 3402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3402 killed at Mon Mar 20 20:55:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3442 found at Mon Mar 20 20:55:40 UTC 2023 selfserv_9887 with PID 3442 started at Mon Mar 20 20:55:40 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3442 at Mon Mar 20 20:55:40 UTC 2023 kill -USR1 3442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3442 killed at Mon Mar 20 20:55:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3486 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3486 found at Mon Mar 20 20:55:41 UTC 2023 selfserv_9887 with PID 3486 started at Mon Mar 20 20:55:41 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3486 at Mon Mar 20 20:55:41 UTC 2023 kill -USR1 3486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3486 killed at Mon Mar 20 20:55:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3526 found at Mon Mar 20 20:55:41 UTC 2023 selfserv_9887 with PID 3526 started at Mon Mar 20 20:55:41 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3526 at Mon Mar 20 20:55:41 UTC 2023 kill -USR1 3526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3526 killed at Mon Mar 20 20:55:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:55:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3571 found at Mon Mar 20 20:55:42 UTC 2023 selfserv_9887 with PID 3571 started at Mon Mar 20 20:55:42 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3571 at Mon Mar 20 20:55:42 UTC 2023 kill -USR1 3571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3571 killed at Mon Mar 20 20:55:42 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 20:55:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 3611 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3611 found at Mon Mar 20 20:55:42 UTC 2023 selfserv_9887 with PID 3611 started at Mon Mar 20 20:55:42 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 3611 at Mon Mar 20 20:55:52 UTC 2023 kill -USR1 3611 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3611 killed at Mon Mar 20 20:55:52 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:55:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 4190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4190 found at Mon Mar 20 20:55:52 UTC 2023 selfserv_9887 with PID 4190 started at Mon Mar 20 20:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4190 at Mon Mar 20 20:56:08 UTC 2023 kill -USR1 4190 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4190 killed at Mon Mar 20 20:56:08 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5006 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5006 found at Mon Mar 20 20:56:08 UTC 2023 selfserv_9887 with PID 5006 started at Mon Mar 20 20:56:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5006 at Mon Mar 20 20:56:09 UTC 2023 kill -USR1 5006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5006 killed at Mon Mar 20 20:56:09 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5058 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5058 found at Mon Mar 20 20:56:09 UTC 2023 selfserv_9887 with PID 5058 started at Mon Mar 20 20:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5058 at Mon Mar 20 20:56:10 UTC 2023 kill -USR1 5058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5058 killed at Mon Mar 20 20:56:10 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5110 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5110 found at Mon Mar 20 20:56:11 UTC 2023 selfserv_9887 with PID 5110 started at Mon Mar 20 20:56:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5110 at Mon Mar 20 20:56:12 UTC 2023 kill -USR1 5110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5110 killed at Mon Mar 20 20:56:12 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5162 found at Mon Mar 20 20:56:12 UTC 2023 selfserv_9887 with PID 5162 started at Mon Mar 20 20:56:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5162 at Mon Mar 20 20:56:13 UTC 2023 kill -USR1 5162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5162 killed at Mon Mar 20 20:56:13 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5214 found at Mon Mar 20 20:56:14 UTC 2023 selfserv_9887 with PID 5214 started at Mon Mar 20 20:56:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5214 at Mon Mar 20 20:56:15 UTC 2023 kill -USR1 5214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5214 killed at Mon Mar 20 20:56:15 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5266 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5266 found at Mon Mar 20 20:56:15 UTC 2023 selfserv_9887 with PID 5266 started at Mon Mar 20 20:56:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5266 at Mon Mar 20 20:56:16 UTC 2023 kill -USR1 5266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5266 killed at Mon Mar 20 20:56:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5318 found at Mon Mar 20 20:56:17 UTC 2023 selfserv_9887 with PID 5318 started at Mon Mar 20 20:56:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5318 at Mon Mar 20 20:56:18 UTC 2023 kill -USR1 5318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5318 killed at Mon Mar 20 20:56:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5372 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5372 found at Mon Mar 20 20:56:18 UTC 2023 selfserv_9887 with PID 5372 started at Mon Mar 20 20:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5372 at Mon Mar 20 20:56:19 UTC 2023 kill -USR1 5372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5372 killed at Mon Mar 20 20:56:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5424 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5424 found at Mon Mar 20 20:56:19 UTC 2023 selfserv_9887 with PID 5424 started at Mon Mar 20 20:56:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5424 at Mon Mar 20 20:56:21 UTC 2023 kill -USR1 5424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5424 killed at Mon Mar 20 20:56:21 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5476 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5476 found at Mon Mar 20 20:56:21 UTC 2023 selfserv_9887 with PID 5476 started at Mon Mar 20 20:56:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5476 at Mon Mar 20 20:56:22 UTC 2023 kill -USR1 5476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5476 killed at Mon Mar 20 20:56:22 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5528 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5528 found at Mon Mar 20 20:56:22 UTC 2023 selfserv_9887 with PID 5528 started at Mon Mar 20 20:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5528 at Mon Mar 20 20:56:24 UTC 2023 kill -USR1 5528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5528 killed at Mon Mar 20 20:56:24 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5580 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5580 found at Mon Mar 20 20:56:24 UTC 2023 selfserv_9887 with PID 5580 started at Mon Mar 20 20:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5580 at Mon Mar 20 20:56:25 UTC 2023 kill -USR1 5580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5580 killed at Mon Mar 20 20:56:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5632 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5632 found at Mon Mar 20 20:56:25 UTC 2023 selfserv_9887 with PID 5632 started at Mon Mar 20 20:56:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5632 at Mon Mar 20 20:56:27 UTC 2023 kill -USR1 5632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5632 killed at Mon Mar 20 20:56:27 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5688 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5688 found at Mon Mar 20 20:56:27 UTC 2023 selfserv_9887 with PID 5688 started at Mon Mar 20 20:56:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5688 at Mon Mar 20 20:56:28 UTC 2023 kill -USR1 5688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5688 killed at Mon Mar 20 20:56:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5740 found at Mon Mar 20 20:56:28 UTC 2023 selfserv_9887 with PID 5740 started at Mon Mar 20 20:56:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5740 at Mon Mar 20 20:56:30 UTC 2023 kill -USR1 5740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5740 killed at Mon Mar 20 20:56:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5792 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5792 found at Mon Mar 20 20:56:30 UTC 2023 selfserv_9887 with PID 5792 started at Mon Mar 20 20:56:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5792 at Mon Mar 20 20:56:31 UTC 2023 kill -USR1 5792 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5792 killed at Mon Mar 20 20:56:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5844 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5844 found at Mon Mar 20 20:56:31 UTC 2023 selfserv_9887 with PID 5844 started at Mon Mar 20 20:56:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5844 at Mon Mar 20 20:56:32 UTC 2023 kill -USR1 5844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5844 killed at Mon Mar 20 20:56:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5896 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5896 found at Mon Mar 20 20:56:33 UTC 2023 selfserv_9887 with PID 5896 started at Mon Mar 20 20:56:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5896 at Mon Mar 20 20:56:34 UTC 2023 kill -USR1 5896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5896 killed at Mon Mar 20 20:56:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5948 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5948 found at Mon Mar 20 20:56:34 UTC 2023 selfserv_9887 with PID 5948 started at Mon Mar 20 20:56:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5948 at Mon Mar 20 20:56:36 UTC 2023 kill -USR1 5948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5948 killed at Mon Mar 20 20:56:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6000 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6000 found at Mon Mar 20 20:56:36 UTC 2023 selfserv_9887 with PID 6000 started at Mon Mar 20 20:56:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6000 at Mon Mar 20 20:56:37 UTC 2023 kill -USR1 6000 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6000 killed at Mon Mar 20 20:56:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6052 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6052 found at Mon Mar 20 20:56:37 UTC 2023 selfserv_9887 with PID 6052 started at Mon Mar 20 20:56:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6052 at Mon Mar 20 20:56:39 UTC 2023 kill -USR1 6052 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6052 killed at Mon Mar 20 20:56:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6104 found at Mon Mar 20 20:56:39 UTC 2023 selfserv_9887 with PID 6104 started at Mon Mar 20 20:56:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6104 at Mon Mar 20 20:56:40 UTC 2023 kill -USR1 6104 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6104 killed at Mon Mar 20 20:56:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6159 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6159 found at Mon Mar 20 20:56:40 UTC 2023 selfserv_9887 with PID 6159 started at Mon Mar 20 20:56:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6159 at Mon Mar 20 20:56:42 UTC 2023 kill -USR1 6159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6159 killed at Mon Mar 20 20:56:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6216 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6216 found at Mon Mar 20 20:56:42 UTC 2023 selfserv_9887 with PID 6216 started at Mon Mar 20 20:56:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6216 at Mon Mar 20 20:56:43 UTC 2023 kill -USR1 6216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6216 killed at Mon Mar 20 20:56:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6286 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6286 found at Mon Mar 20 20:56:44 UTC 2023 selfserv_9887 with PID 6286 started at Mon Mar 20 20:56:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6286 at Mon Mar 20 20:56:45 UTC 2023 kill -USR1 6286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6286 killed at Mon Mar 20 20:56:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6340 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6340 found at Mon Mar 20 20:56:45 UTC 2023 selfserv_9887 with PID 6340 started at Mon Mar 20 20:56:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6340 at Mon Mar 20 20:56:46 UTC 2023 kill -USR1 6340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6340 killed at Mon Mar 20 20:56:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6394 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6394 found at Mon Mar 20 20:56:46 UTC 2023 selfserv_9887 with PID 6394 started at Mon Mar 20 20:56:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6394 at Mon Mar 20 20:56:48 UTC 2023 kill -USR1 6394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6394 killed at Mon Mar 20 20:56:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6450 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6450 found at Mon Mar 20 20:56:48 UTC 2023 selfserv_9887 with PID 6450 started at Mon Mar 20 20:56:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6450 at Mon Mar 20 20:56:49 UTC 2023 kill -USR1 6450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6450 killed at Mon Mar 20 20:56:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:56:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6508 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6508 found at Mon Mar 20 20:56:50 UTC 2023 selfserv_9887 with PID 6508 started at Mon Mar 20 20:56:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6508 at Mon Mar 20 20:56:51 UTC 2023 kill -USR1 6508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6508 killed at Mon Mar 20 20:56:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6562 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6562 found at Mon Mar 20 20:56:51 UTC 2023 selfserv_9887 with PID 6562 started at Mon Mar 20 20:56:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6562 at Mon Mar 20 20:56:53 UTC 2023 kill -USR1 6562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6562 killed at Mon Mar 20 20:56:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6619 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6619 found at Mon Mar 20 20:56:53 UTC 2023 selfserv_9887 with PID 6619 started at Mon Mar 20 20:56:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6619 at Mon Mar 20 20:56:54 UTC 2023 kill -USR1 6619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6619 killed at Mon Mar 20 20:56:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6679 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6679 found at Mon Mar 20 20:56:54 UTC 2023 selfserv_9887 with PID 6679 started at Mon Mar 20 20:56:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6679 at Mon Mar 20 20:56:56 UTC 2023 kill -USR1 6679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6679 killed at Mon Mar 20 20:56:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6733 found at Mon Mar 20 20:56:56 UTC 2023 selfserv_9887 with PID 6733 started at Mon Mar 20 20:56:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6733 at Mon Mar 20 20:56:57 UTC 2023 kill -USR1 6733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6733 killed at Mon Mar 20 20:56:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6796 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6796 found at Mon Mar 20 20:56:57 UTC 2023 selfserv_9887 with PID 6796 started at Mon Mar 20 20:56:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6796 at Mon Mar 20 20:56:58 UTC 2023 kill -USR1 6796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6796 killed at Mon Mar 20 20:56:58 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:56:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:56:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6853 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6853 found at Mon Mar 20 20:56:59 UTC 2023 selfserv_9887 with PID 6853 started at Mon Mar 20 20:56:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6853 at Mon Mar 20 20:57:00 UTC 2023 kill -USR1 6853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6853 killed at Mon Mar 20 20:57:00 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6905 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6905 found at Mon Mar 20 20:57:00 UTC 2023 selfserv_9887 with PID 6905 started at Mon Mar 20 20:57:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6905 at Mon Mar 20 20:57:02 UTC 2023 kill -USR1 6905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6905 killed at Mon Mar 20 20:57:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6959 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6959 found at Mon Mar 20 20:57:02 UTC 2023 selfserv_9887 with PID 6959 started at Mon Mar 20 20:57:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6959 at Mon Mar 20 20:57:03 UTC 2023 kill -USR1 6959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6959 killed at Mon Mar 20 20:57:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7012 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7012 found at Mon Mar 20 20:57:03 UTC 2023 selfserv_9887 with PID 7012 started at Mon Mar 20 20:57:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7012 at Mon Mar 20 20:57:05 UTC 2023 kill -USR1 7012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7012 killed at Mon Mar 20 20:57:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7066 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7066 found at Mon Mar 20 20:57:05 UTC 2023 selfserv_9887 with PID 7066 started at Mon Mar 20 20:57:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7066 at Mon Mar 20 20:57:06 UTC 2023 kill -USR1 7066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7066 killed at Mon Mar 20 20:57:06 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7118 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7118 found at Mon Mar 20 20:57:06 UTC 2023 selfserv_9887 with PID 7118 started at Mon Mar 20 20:57:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7118 at Mon Mar 20 20:57:08 UTC 2023 kill -USR1 7118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7118 killed at Mon Mar 20 20:57:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7170 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7170 found at Mon Mar 20 20:57:08 UTC 2023 selfserv_9887 with PID 7170 started at Mon Mar 20 20:57:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7170 at Mon Mar 20 20:57:09 UTC 2023 kill -USR1 7170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7170 killed at Mon Mar 20 20:57:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7222 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7222 found at Mon Mar 20 20:57:09 UTC 2023 selfserv_9887 with PID 7222 started at Mon Mar 20 20:57:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7222 at Mon Mar 20 20:57:11 UTC 2023 kill -USR1 7222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7222 killed at Mon Mar 20 20:57:11 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7274 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7274 found at Mon Mar 20 20:57:11 UTC 2023 selfserv_9887 with PID 7274 started at Mon Mar 20 20:57:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7274 at Mon Mar 20 20:57:12 UTC 2023 kill -USR1 7274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7274 killed at Mon Mar 20 20:57:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7326 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7326 found at Mon Mar 20 20:57:12 UTC 2023 selfserv_9887 with PID 7326 started at Mon Mar 20 20:57:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7326 at Mon Mar 20 20:57:14 UTC 2023 kill -USR1 7326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7326 killed at Mon Mar 20 20:57:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7378 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7378 found at Mon Mar 20 20:57:14 UTC 2023 selfserv_9887 with PID 7378 started at Mon Mar 20 20:57:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7378 at Mon Mar 20 20:57:15 UTC 2023 kill -USR1 7378 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7378 killed at Mon Mar 20 20:57:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7430 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7430 found at Mon Mar 20 20:57:15 UTC 2023 selfserv_9887 with PID 7430 started at Mon Mar 20 20:57:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7430 at Mon Mar 20 20:57:17 UTC 2023 kill -USR1 7430 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7430 killed at Mon Mar 20 20:57:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7483 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7483 found at Mon Mar 20 20:57:17 UTC 2023 selfserv_9887 with PID 7483 started at Mon Mar 20 20:57:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7483 at Mon Mar 20 20:57:18 UTC 2023 kill -USR1 7483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7483 killed at Mon Mar 20 20:57:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7535 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7535 found at Mon Mar 20 20:57:18 UTC 2023 selfserv_9887 with PID 7535 started at Mon Mar 20 20:57:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7535 at Mon Mar 20 20:57:20 UTC 2023 kill -USR1 7535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7535 killed at Mon Mar 20 20:57:20 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7589 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7589 found at Mon Mar 20 20:57:20 UTC 2023 selfserv_9887 with PID 7589 started at Mon Mar 20 20:57:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7589 at Mon Mar 20 20:57:21 UTC 2023 kill -USR1 7589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7589 killed at Mon Mar 20 20:57:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7642 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7642 found at Mon Mar 20 20:57:21 UTC 2023 selfserv_9887 with PID 7642 started at Mon Mar 20 20:57:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7642 at Mon Mar 20 20:57:23 UTC 2023 kill -USR1 7642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7642 killed at Mon Mar 20 20:57:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7694 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7694 found at Mon Mar 20 20:57:23 UTC 2023 selfserv_9887 with PID 7694 started at Mon Mar 20 20:57:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7694 at Mon Mar 20 20:57:24 UTC 2023 kill -USR1 7694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7694 killed at Mon Mar 20 20:57:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7752 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7752 found at Mon Mar 20 20:57:24 UTC 2023 selfserv_9887 with PID 7752 started at Mon Mar 20 20:57:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7752 at Mon Mar 20 20:57:26 UTC 2023 kill -USR1 7752 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7752 killed at Mon Mar 20 20:57:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7812 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7812 found at Mon Mar 20 20:57:26 UTC 2023 selfserv_9887 with PID 7812 started at Mon Mar 20 20:57:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7812 at Mon Mar 20 20:57:27 UTC 2023 kill -USR1 7812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7812 killed at Mon Mar 20 20:57:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7865 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7865 found at Mon Mar 20 20:57:28 UTC 2023 selfserv_9887 with PID 7865 started at Mon Mar 20 20:57:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7865 at Mon Mar 20 20:57:29 UTC 2023 kill -USR1 7865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7865 killed at Mon Mar 20 20:57:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:57:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7918 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7918 found at Mon Mar 20 20:57:29 UTC 2023 selfserv_9887 with PID 7918 started at Mon Mar 20 20:57:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7918 at Mon Mar 20 20:57:30 UTC 2023 kill -USR1 7918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7918 killed at Mon Mar 20 20:57:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7972 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7972 found at Mon Mar 20 20:57:31 UTC 2023 selfserv_9887 with PID 7972 started at Mon Mar 20 20:57:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7972 at Mon Mar 20 20:57:32 UTC 2023 kill -USR1 7972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7972 killed at Mon Mar 20 20:57:32 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8025 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8025 found at Mon Mar 20 20:57:32 UTC 2023 selfserv_9887 with PID 8025 started at Mon Mar 20 20:57:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8025 at Mon Mar 20 20:57:34 UTC 2023 kill -USR1 8025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8025 killed at Mon Mar 20 20:57:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:57:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8079 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8079 found at Mon Mar 20 20:57:34 UTC 2023 selfserv_9887 with PID 8079 started at Mon Mar 20 20:57:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8079 at Mon Mar 20 20:57:35 UTC 2023 kill -USR1 8079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8079 killed at Mon Mar 20 20:57:35 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 20:57:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8161 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8161 found at Mon Mar 20 20:57:36 UTC 2023 selfserv_9887 with PID 8161 started at Mon Mar 20 20:57:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8161 at Mon Mar 20 20:57:36 UTC 2023 kill -USR1 8161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8161 killed at Mon Mar 20 20:57:36 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8203 found at Mon Mar 20 20:57:37 UTC 2023 selfserv_9887 with PID 8203 started at Mon Mar 20 20:57:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8203 at Mon Mar 20 20:57:37 UTC 2023 kill -USR1 8203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8203 killed at Mon Mar 20 20:57:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8243 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8243 found at Mon Mar 20 20:57:37 UTC 2023 selfserv_9887 with PID 8243 started at Mon Mar 20 20:57:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8243 at Mon Mar 20 20:57:38 UTC 2023 kill -USR1 8243 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8243 killed at Mon Mar 20 20:57:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8282 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8282 found at Mon Mar 20 20:57:38 UTC 2023 selfserv_9887 with PID 8282 started at Mon Mar 20 20:57:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8282 at Mon Mar 20 20:57:39 UTC 2023 kill -USR1 8282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8282 killed at Mon Mar 20 20:57:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8322 found at Mon Mar 20 20:57:39 UTC 2023 selfserv_9887 with PID 8322 started at Mon Mar 20 20:57:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 8322 at Mon Mar 20 20:57:39 UTC 2023 kill -USR1 8322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8322 killed at Mon Mar 20 20:57:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8362 found at Mon Mar 20 20:57:40 UTC 2023 selfserv_9887 with PID 8362 started at Mon Mar 20 20:57:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8362 at Mon Mar 20 20:57:40 UTC 2023 kill -USR1 8362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8362 killed at Mon Mar 20 20:57:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8404 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8404 found at Mon Mar 20 20:57:40 UTC 2023 selfserv_9887 with PID 8404 started at Mon Mar 20 20:57:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8404 at Mon Mar 20 20:57:41 UTC 2023 kill -USR1 8404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8404 killed at Mon Mar 20 20:57:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8443 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8443 found at Mon Mar 20 20:57:41 UTC 2023 selfserv_9887 with PID 8443 started at Mon Mar 20 20:57:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8443 at Mon Mar 20 20:57:42 UTC 2023 kill -USR1 8443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8443 killed at Mon Mar 20 20:57:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8487 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8487 found at Mon Mar 20 20:57:42 UTC 2023 selfserv_9887 with PID 8487 started at Mon Mar 20 20:57:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8487 at Mon Mar 20 20:57:42 UTC 2023 kill -USR1 8487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8487 killed at Mon Mar 20 20:57:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8533 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8533 found at Mon Mar 20 20:57:43 UTC 2023 selfserv_9887 with PID 8533 started at Mon Mar 20 20:57:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8533 at Mon Mar 20 20:57:43 UTC 2023 kill -USR1 8533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8533 killed at Mon Mar 20 20:57:43 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8572 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8572 found at Mon Mar 20 20:57:43 UTC 2023 selfserv_9887 with PID 8572 started at Mon Mar 20 20:57:43 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8572 at Mon Mar 20 20:57:44 UTC 2023 kill -USR1 8572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8572 killed at Mon Mar 20 20:57:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8614 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8614 found at Mon Mar 20 20:57:44 UTC 2023 selfserv_9887 with PID 8614 started at Mon Mar 20 20:57:44 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8614 at Mon Mar 20 20:57:45 UTC 2023 kill -USR1 8614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8614 killed at Mon Mar 20 20:57:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8654 found at Mon Mar 20 20:57:45 UTC 2023 selfserv_9887 with PID 8654 started at Mon Mar 20 20:57:45 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8654 at Mon Mar 20 20:57:45 UTC 2023 kill -USR1 8654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8654 killed at Mon Mar 20 20:57:45 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8694 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8694 found at Mon Mar 20 20:57:46 UTC 2023 selfserv_9887 with PID 8694 started at Mon Mar 20 20:57:46 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8694 at Mon Mar 20 20:57:46 UTC 2023 kill -USR1 8694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8694 killed at Mon Mar 20 20:57:46 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8734 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8734 found at Mon Mar 20 20:57:46 UTC 2023 selfserv_9887 with PID 8734 started at Mon Mar 20 20:57:46 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8734 at Mon Mar 20 20:57:47 UTC 2023 kill -USR1 8734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8734 killed at Mon Mar 20 20:57:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8774 found at Mon Mar 20 20:57:47 UTC 2023 selfserv_9887 with PID 8774 started at Mon Mar 20 20:57:47 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8774 at Mon Mar 20 20:57:48 UTC 2023 kill -USR1 8774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8774 killed at Mon Mar 20 20:57:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8814 found at Mon Mar 20 20:57:48 UTC 2023 selfserv_9887 with PID 8814 started at Mon Mar 20 20:57:48 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8814 at Mon Mar 20 20:57:48 UTC 2023 kill -USR1 8814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8814 killed at Mon Mar 20 20:57:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8854 found at Mon Mar 20 20:57:49 UTC 2023 selfserv_9887 with PID 8854 started at Mon Mar 20 20:57:49 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8854 at Mon Mar 20 20:57:49 UTC 2023 kill -USR1 8854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8854 killed at Mon Mar 20 20:57:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 20:57:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8894 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8894 found at Mon Mar 20 20:57:49 UTC 2023 selfserv_9887 with PID 8894 started at Mon Mar 20 20:57:49 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8894 at Mon Mar 20 20:57:50 UTC 2023 kill -USR1 8894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8894 killed at Mon Mar 20 20:57:50 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 20:57:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:57:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 9017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9017 found at Mon Mar 20 20:57:52 UTC 2023 selfserv_9887 with PID 9017 started at Mon Mar 20 20:57:52 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 9017 at Mon Mar 20 20:58:05 UTC 2023 kill -USR1 9017 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9017 killed at Mon Mar 20 20:58:05 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 20:58:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:58:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 9567 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9567 found at Mon Mar 20 20:58:05 UTC 2023 selfserv_9887 with PID 9567 started at Mon Mar 20 20:58:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9567 at Mon Mar 20 20:58:31 UTC 2023 kill -USR1 9567 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9567 killed at Mon Mar 20 20:58:31 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 20:58:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:58:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10366 found at Mon Mar 20 20:58:31 UTC 2023 selfserv_9887 with PID 10366 started at Mon Mar 20 20:58:31 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10366 at Mon Mar 20 20:58:32 UTC 2023 kill -USR1 10366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10366 killed at Mon Mar 20 20:58:32 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:58:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:58:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10444 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10444 found at Mon Mar 20 20:58:32 UTC 2023 selfserv_9887 with PID 10444 started at Mon Mar 20 20:58:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10444 at Mon Mar 20 20:58:33 UTC 2023 kill -USR1 10444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10444 killed at Mon Mar 20 20:58:33 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:58:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:58:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10496 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10496 found at Mon Mar 20 20:58:33 UTC 2023 selfserv_9887 with PID 10496 started at Mon Mar 20 20:58:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10496 at Mon Mar 20 20:58:58 UTC 2023 kill -USR1 10496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10496 killed at Mon Mar 20 20:58:58 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:58:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:58:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10563 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10563 found at Mon Mar 20 20:58:58 UTC 2023 selfserv_9887 with PID 10563 started at Mon Mar 20 20:58:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10563 at Mon Mar 20 20:58:59 UTC 2023 kill -USR1 10563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10563 killed at Mon Mar 20 20:58:59 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:58:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:58:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10627 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10627 found at Mon Mar 20 20:58:59 UTC 2023 selfserv_9887 with PID 10627 started at Mon Mar 20 20:58:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10627 at Mon Mar 20 20:59:00 UTC 2023 kill -USR1 10627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10627 killed at Mon Mar 20 20:59:00 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:59:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10680 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10680 found at Mon Mar 20 20:59:00 UTC 2023 selfserv_9887 with PID 10680 started at Mon Mar 20 20:59:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10680 at Mon Mar 20 20:59:23 UTC 2023 kill -USR1 10680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10680 killed at Mon Mar 20 20:59:23 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:59:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10732 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10732 found at Mon Mar 20 20:59:24 UTC 2023 selfserv_9887 with PID 10732 started at Mon Mar 20 20:59:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10732 at Mon Mar 20 20:59:24 UTC 2023 kill -USR1 10732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10732 killed at Mon Mar 20 20:59:24 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:59:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10796 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10796 found at Mon Mar 20 20:59:24 UTC 2023 selfserv_9887 with PID 10796 started at Mon Mar 20 20:59:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10796 at Mon Mar 20 20:59:26 UTC 2023 kill -USR1 10796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10796 killed at Mon Mar 20 20:59:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:59:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10848 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10848 found at Mon Mar 20 20:59:26 UTC 2023 selfserv_9887 with PID 10848 started at Mon Mar 20 20:59:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10848 at Mon Mar 20 20:59:50 UTC 2023 kill -USR1 10848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10848 killed at Mon Mar 20 20:59:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 20:59:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10917 found at Mon Mar 20 20:59:50 UTC 2023 selfserv_9887 with PID 10917 started at Mon Mar 20 20:59:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10917 at Mon Mar 20 20:59:51 UTC 2023 kill -USR1 10917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10917 killed at Mon Mar 20 20:59:52 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 20:59:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10981 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10981 found at Mon Mar 20 20:59:52 UTC 2023 selfserv_9887 with PID 10981 started at Mon Mar 20 20:59:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10981 at Mon Mar 20 20:59:53 UTC 2023 kill -USR1 10981 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10981 killed at Mon Mar 20 20:59:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 20:59:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 20:59:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11033 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11033 found at Mon Mar 20 20:59:53 UTC 2023 selfserv_9887 with PID 11033 started at Mon Mar 20 20:59:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11033 at Mon Mar 20 21:00:17 UTC 2023 kill -USR1 11033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11033 killed at Mon Mar 20 21:00:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:00:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11167 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11167 found at Mon Mar 20 21:00:18 UTC 2023 selfserv_9887 with PID 11167 started at Mon Mar 20 21:00:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11167 at Mon Mar 20 21:00:19 UTC 2023 kill -USR1 11167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11167 killed at Mon Mar 20 21:00:19 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:00:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11231 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11231 found at Mon Mar 20 21:00:19 UTC 2023 selfserv_9887 with PID 11231 started at Mon Mar 20 21:00:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11231 at Mon Mar 20 21:00:20 UTC 2023 kill -USR1 11231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11231 killed at Mon Mar 20 21:00:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:00:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11283 found at Mon Mar 20 21:00:20 UTC 2023 selfserv_9887 with PID 11283 started at Mon Mar 20 21:00:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11283 at Mon Mar 20 21:00:43 UTC 2023 kill -USR1 11283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11283 killed at Mon Mar 20 21:00:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:00:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11351 found at Mon Mar 20 21:00:44 UTC 2023 selfserv_9887 with PID 11351 started at Mon Mar 20 21:00:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11351 at Mon Mar 20 21:00:44 UTC 2023 kill -USR1 11351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11351 killed at Mon Mar 20 21:00:44 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:00:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11407 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11407 found at Mon Mar 20 21:00:45 UTC 2023 selfserv_9887 with PID 11407 started at Mon Mar 20 21:00:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11407 at Mon Mar 20 21:00:45 UTC 2023 kill -USR1 11407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11407 killed at Mon Mar 20 21:00:45 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:00:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11463 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11463 found at Mon Mar 20 21:00:45 UTC 2023 selfserv_9887 with PID 11463 started at Mon Mar 20 21:00:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11463 at Mon Mar 20 21:00:46 UTC 2023 kill -USR1 11463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11463 killed at Mon Mar 20 21:00:46 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:00:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11520 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11520 found at Mon Mar 20 21:00:46 UTC 2023 selfserv_9887 with PID 11520 started at Mon Mar 20 21:00:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11520 at Mon Mar 20 21:00:47 UTC 2023 kill -USR1 11520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11520 killed at Mon Mar 20 21:00:47 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:00:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:00:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11580 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11580 found at Mon Mar 20 21:00:47 UTC 2023 selfserv_9887 with PID 11580 started at Mon Mar 20 21:00:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11580 at Mon Mar 20 21:01:12 UTC 2023 kill -USR1 11580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11580 killed at Mon Mar 20 21:01:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:01:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:01:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11647 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11647 found at Mon Mar 20 21:01:12 UTC 2023 selfserv_9887 with PID 11647 started at Mon Mar 20 21:01:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11647 at Mon Mar 20 21:01:13 UTC 2023 kill -USR1 11647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11647 killed at Mon Mar 20 21:01:13 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:01:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:01:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11707 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11707 found at Mon Mar 20 21:01:13 UTC 2023 selfserv_9887 with PID 11707 started at Mon Mar 20 21:01:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11707 at Mon Mar 20 21:01:36 UTC 2023 kill -USR1 11707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11707 killed at Mon Mar 20 21:01:36 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:01:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11760 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11760 found at Mon Mar 20 21:01:36 UTC 2023 selfserv_9887 with PID 11760 started at Mon Mar 20 21:01:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11760 at Mon Mar 20 21:01:37 UTC 2023 kill -USR1 11760 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11760 killed at Mon Mar 20 21:01:37 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:01:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:01:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11820 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11820 found at Mon Mar 20 21:01:37 UTC 2023 selfserv_9887 with PID 11820 started at Mon Mar 20 21:01:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11820 at Mon Mar 20 21:02:02 UTC 2023 kill -USR1 11820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11820 killed at Mon Mar 20 21:02:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:02:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11889 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11889 found at Mon Mar 20 21:02:02 UTC 2023 selfserv_9887 with PID 11889 started at Mon Mar 20 21:02:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11889 at Mon Mar 20 21:02:03 UTC 2023 kill -USR1 11889 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11889 killed at Mon Mar 20 21:02:03 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:02:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11949 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11949 found at Mon Mar 20 21:02:03 UTC 2023 selfserv_9887 with PID 11949 started at Mon Mar 20 21:02:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11949 at Mon Mar 20 21:02:27 UTC 2023 kill -USR1 11949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11949 killed at Mon Mar 20 21:02:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:02:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12001 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12001 found at Mon Mar 20 21:02:28 UTC 2023 selfserv_9887 with PID 12001 started at Mon Mar 20 21:02:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12001 at Mon Mar 20 21:02:28 UTC 2023 kill -USR1 12001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12001 killed at Mon Mar 20 21:02:29 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:02:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12061 found at Mon Mar 20 21:02:29 UTC 2023 selfserv_9887 with PID 12061 started at Mon Mar 20 21:02:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12061 at Mon Mar 20 21:02:52 UTC 2023 kill -USR1 12061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12061 killed at Mon Mar 20 21:02:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:02:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12128 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12128 found at Mon Mar 20 21:02:52 UTC 2023 selfserv_9887 with PID 12128 started at Mon Mar 20 21:02:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12128 at Mon Mar 20 21:02:53 UTC 2023 kill -USR1 12128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12128 killed at Mon Mar 20 21:02:53 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:02:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12180 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12180 found at Mon Mar 20 21:02:53 UTC 2023 selfserv_9887 with PID 12180 started at Mon Mar 20 21:02:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12180 at Mon Mar 20 21:02:54 UTC 2023 kill -USR1 12180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12180 killed at Mon Mar 20 21:02:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:02:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12232 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12232 found at Mon Mar 20 21:02:55 UTC 2023 selfserv_9887 with PID 12232 started at Mon Mar 20 21:02:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12232 at Mon Mar 20 21:02:55 UTC 2023 kill -USR1 12232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12232 killed at Mon Mar 20 21:02:56 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:02:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12290 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12290 found at Mon Mar 20 21:02:56 UTC 2023 selfserv_9887 with PID 12290 started at Mon Mar 20 21:02:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12290 at Mon Mar 20 21:02:56 UTC 2023 kill -USR1 12290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12290 killed at Mon Mar 20 21:02:56 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 21:02:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12348 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12348 found at Mon Mar 20 21:02:57 UTC 2023 selfserv_9887 with PID 12348 started at Mon Mar 20 21:02:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12348 at Mon Mar 20 21:02:57 UTC 2023 kill -USR1 12348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12348 killed at Mon Mar 20 21:02:57 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 21:02:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12406 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12406 found at Mon Mar 20 21:02:57 UTC 2023 selfserv_9887 with PID 12406 started at Mon Mar 20 21:02:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12406 at Mon Mar 20 21:02:58 UTC 2023 kill -USR1 12406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12406 killed at Mon Mar 20 21:02:58 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:02:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12464 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12464 found at Mon Mar 20 21:02:58 UTC 2023 selfserv_9887 with PID 12464 started at Mon Mar 20 21:02:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12464 at Mon Mar 20 21:02:58 UTC 2023 kill -USR1 12464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12464 killed at Mon Mar 20 21:02:59 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 21:02:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12522 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12522 found at Mon Mar 20 21:02:59 UTC 2023 selfserv_9887 with PID 12522 started at Mon Mar 20 21:02:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12522 at Mon Mar 20 21:02:59 UTC 2023 kill -USR1 12522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12522 killed at Mon Mar 20 21:02:59 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:02:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:02:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12582 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12582 found at Mon Mar 20 21:02:59 UTC 2023 selfserv_9887 with PID 12582 started at Mon Mar 20 21:02:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12582 at Mon Mar 20 21:03:00 UTC 2023 kill -USR1 12582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12582 killed at Mon Mar 20 21:03:00 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 21:03:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12640 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12640 found at Mon Mar 20 21:03:00 UTC 2023 selfserv_9887 with PID 12640 started at Mon Mar 20 21:03:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12640 at Mon Mar 20 21:03:01 UTC 2023 kill -USR1 12640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12640 killed at Mon Mar 20 21:03:01 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 21:03:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12704 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12704 found at Mon Mar 20 21:03:01 UTC 2023 selfserv_9887 with PID 12704 started at Mon Mar 20 21:03:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12704 at Mon Mar 20 21:03:02 UTC 2023 kill -USR1 12704 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12704 killed at Mon Mar 20 21:03:02 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 21:03:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12764 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12764 found at Mon Mar 20 21:03:02 UTC 2023 selfserv_9887 with PID 12764 started at Mon Mar 20 21:03:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12764 at Mon Mar 20 21:03:02 UTC 2023 kill -USR1 12764 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12764 killed at Mon Mar 20 21:03:02 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 21:03:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12824 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12824 found at Mon Mar 20 21:03:03 UTC 2023 selfserv_9887 with PID 12824 started at Mon Mar 20 21:03:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12824 at Mon Mar 20 21:03:03 UTC 2023 kill -USR1 12824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12824 killed at Mon Mar 20 21:03:03 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 21:03:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12869 found at Mon Mar 20 21:03:03 UTC 2023 selfserv_9887 with PID 12869 started at Mon Mar 20 21:03:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12869 at Mon Mar 20 21:03:04 UTC 2023 kill -USR1 12869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12869 killed at Mon Mar 20 21:03:04 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 21:03:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12911 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12911 found at Mon Mar 20 21:03:04 UTC 2023 selfserv_9887 with PID 12911 started at Mon Mar 20 21:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 12911 at Mon Mar 20 21:03:04 UTC 2023 kill -USR1 12911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12911 killed at Mon Mar 20 21:03:04 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 21:03:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12953 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12953 found at Mon Mar 20 21:03:05 UTC 2023 selfserv_9887 with PID 12953 started at Mon Mar 20 21:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 12953 at Mon Mar 20 21:03:05 UTC 2023 kill -USR1 12953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12953 killed at Mon Mar 20 21:03:05 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 21:03:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12995 found at Mon Mar 20 21:03:05 UTC 2023 selfserv_9887 with PID 12995 started at Mon Mar 20 21:03:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 12995 at Mon Mar 20 21:03:06 UTC 2023 kill -USR1 12995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12995 killed at Mon Mar 20 21:03:06 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 21:03:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13037 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13037 found at Mon Mar 20 21:03:06 UTC 2023 selfserv_9887 with PID 13037 started at Mon Mar 20 21:03:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 13037 at Mon Mar 20 21:03:06 UTC 2023 kill -USR1 13037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13037 killed at Mon Mar 20 21:03:07 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 21:03:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13079 found at Mon Mar 20 21:03:07 UTC 2023 selfserv_9887 with PID 13079 started at Mon Mar 20 21:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 13079 at Mon Mar 20 21:03:07 UTC 2023 kill -USR1 13079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13079 killed at Mon Mar 20 21:03:07 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 21:03:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13121 found at Mon Mar 20 21:03:07 UTC 2023 selfserv_9887 with PID 13121 started at Mon Mar 20 21:03:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 13121 at Mon Mar 20 21:03:08 UTC 2023 kill -USR1 13121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13121 killed at Mon Mar 20 21:03:08 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 21:03:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:03:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13163 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13163 found at Mon Mar 20 21:03:08 UTC 2023 selfserv_9887 with PID 13163 started at Mon Mar 20 21:03:08 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 21:03:08 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 21:04:21 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 13163 at Mon Mar 20 21:04:21 UTC 2023 kill -USR1 13163 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13163 killed at Mon Mar 20 21:04:21 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 21:04:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13233 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13233 found at Mon Mar 20 21:04:21 UTC 2023 selfserv_9887 with PID 13233 started at Mon Mar 20 21:04:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13233 at Mon Mar 20 21:04:22 UTC 2023 kill -USR1 13233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13233 killed at Mon Mar 20 21:04:22 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13275 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13275 found at Mon Mar 20 21:04:22 UTC 2023 selfserv_9887 with PID 13275 started at Mon Mar 20 21:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13275 at Mon Mar 20 21:04:23 UTC 2023 kill -USR1 13275 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13275 killed at Mon Mar 20 21:04:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13314 found at Mon Mar 20 21:04:23 UTC 2023 selfserv_9887 with PID 13314 started at Mon Mar 20 21:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 13314 at Mon Mar 20 21:04:23 UTC 2023 kill -USR1 13314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13314 killed at Mon Mar 20 21:04:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13353 found at Mon Mar 20 21:04:23 UTC 2023 selfserv_9887 with PID 13353 started at Mon Mar 20 21:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13353 at Mon Mar 20 21:04:24 UTC 2023 kill -USR1 13353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13353 killed at Mon Mar 20 21:04:24 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13392 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13392 found at Mon Mar 20 21:04:24 UTC 2023 selfserv_9887 with PID 13392 started at Mon Mar 20 21:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 13392 at Mon Mar 20 21:04:24 UTC 2023 kill -USR1 13392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13392 killed at Mon Mar 20 21:04:24 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13431 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13431 found at Mon Mar 20 21:04:24 UTC 2023 selfserv_9887 with PID 13431 started at Mon Mar 20 21:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13431 at Mon Mar 20 21:04:25 UTC 2023 kill -USR1 13431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13431 killed at Mon Mar 20 21:04:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13470 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13470 found at Mon Mar 20 21:04:25 UTC 2023 selfserv_9887 with PID 13470 started at Mon Mar 20 21:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13470 at Mon Mar 20 21:04:25 UTC 2023 kill -USR1 13470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13470 killed at Mon Mar 20 21:04:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13509 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13509 found at Mon Mar 20 21:04:26 UTC 2023 selfserv_9887 with PID 13509 started at Mon Mar 20 21:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13509 at Mon Mar 20 21:04:26 UTC 2023 kill -USR1 13509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13509 killed at Mon Mar 20 21:04:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13548 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13548 found at Mon Mar 20 21:04:26 UTC 2023 selfserv_9887 with PID 13548 started at Mon Mar 20 21:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13548 at Mon Mar 20 21:04:26 UTC 2023 kill -USR1 13548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13548 killed at Mon Mar 20 21:04:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13587 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13587 found at Mon Mar 20 21:04:27 UTC 2023 selfserv_9887 with PID 13587 started at Mon Mar 20 21:04:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13587 at Mon Mar 20 21:04:27 UTC 2023 kill -USR1 13587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13587 killed at Mon Mar 20 21:04:27 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13626 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13626 found at Mon Mar 20 21:04:27 UTC 2023 selfserv_9887 with PID 13626 started at Mon Mar 20 21:04:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13626 at Mon Mar 20 21:04:28 UTC 2023 kill -USR1 13626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13626 killed at Mon Mar 20 21:04:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13666 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13666 found at Mon Mar 20 21:04:28 UTC 2023 selfserv_9887 with PID 13666 started at Mon Mar 20 21:04:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13666 at Mon Mar 20 21:04:28 UTC 2023 kill -USR1 13666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13666 killed at Mon Mar 20 21:04:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13706 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13706 found at Mon Mar 20 21:04:28 UTC 2023 selfserv_9887 with PID 13706 started at Mon Mar 20 21:04:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13706 at Mon Mar 20 21:04:29 UTC 2023 kill -USR1 13706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13706 killed at Mon Mar 20 21:04:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13746 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13746 found at Mon Mar 20 21:04:29 UTC 2023 selfserv_9887 with PID 13746 started at Mon Mar 20 21:04:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13746 at Mon Mar 20 21:04:29 UTC 2023 kill -USR1 13746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13746 killed at Mon Mar 20 21:04:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13786 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13786 found at Mon Mar 20 21:04:29 UTC 2023 selfserv_9887 with PID 13786 started at Mon Mar 20 21:04:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13786 at Mon Mar 20 21:04:30 UTC 2023 kill -USR1 13786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13786 killed at Mon Mar 20 21:04:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13826 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13826 found at Mon Mar 20 21:04:30 UTC 2023 selfserv_9887 with PID 13826 started at Mon Mar 20 21:04:30 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13826 at Mon Mar 20 21:04:30 UTC 2023 kill -USR1 13826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13826 killed at Mon Mar 20 21:04:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13866 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13866 found at Mon Mar 20 21:04:30 UTC 2023 selfserv_9887 with PID 13866 started at Mon Mar 20 21:04:30 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13866 at Mon Mar 20 21:04:31 UTC 2023 kill -USR1 13866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13866 killed at Mon Mar 20 21:04:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13906 found at Mon Mar 20 21:04:31 UTC 2023 selfserv_9887 with PID 13906 started at Mon Mar 20 21:04:31 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13906 at Mon Mar 20 21:04:31 UTC 2023 kill -USR1 13906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13906 killed at Mon Mar 20 21:04:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:04:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13946 found at Mon Mar 20 21:04:32 UTC 2023 selfserv_9887 with PID 13946 started at Mon Mar 20 21:04:32 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13946 at Mon Mar 20 21:04:32 UTC 2023 kill -USR1 13946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13946 killed at Mon Mar 20 21:04:32 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 21:04:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 13986 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13986 found at Mon Mar 20 21:04:32 UTC 2023 selfserv_9887 with PID 13986 started at Mon Mar 20 21:04:32 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 13986 at Mon Mar 20 21:04:45 UTC 2023 kill -USR1 13986 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13986 killed at Mon Mar 20 21:04:45 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 21:04:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:04:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 14554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14554 found at Mon Mar 20 21:04:46 UTC 2023 selfserv_9887 with PID 14554 started at Mon Mar 20 21:04:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14554 at Mon Mar 20 21:05:07 UTC 2023 kill -USR1 14554 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14554 killed at Mon Mar 20 21:05:07 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:05:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:05:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15379 found at Mon Mar 20 21:05:07 UTC 2023 selfserv_9887 with PID 15379 started at Mon Mar 20 21:05:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15379 at Mon Mar 20 21:05:09 UTC 2023 kill -USR1 15379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15379 killed at Mon Mar 20 21:05:09 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:05:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:05:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15431 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15431 found at Mon Mar 20 21:05:09 UTC 2023 selfserv_9887 with PID 15431 started at Mon Mar 20 21:05:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15431 at Mon Mar 20 21:05:35 UTC 2023 kill -USR1 15431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15431 killed at Mon Mar 20 21:05:35 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:05:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:05:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:05:35 UTC 2023 selfserv_9887 with PID 15485 started at Mon Mar 20 21:05:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15485 at Mon Mar 20 21:05:36 UTC 2023 kill -USR1 15485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15485 killed at Mon Mar 20 21:05:36 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:05:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:05:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15550 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15550 found at Mon Mar 20 21:05:37 UTC 2023 selfserv_9887 with PID 15550 started at Mon Mar 20 21:05:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15550 at Mon Mar 20 21:05:39 UTC 2023 kill -USR1 15550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15550 killed at Mon Mar 20 21:05:39 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:05:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:05:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15602 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15602 found at Mon Mar 20 21:05:39 UTC 2023 selfserv_9887 with PID 15602 started at Mon Mar 20 21:05:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15602 at Mon Mar 20 21:06:02 UTC 2023 kill -USR1 15602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15602 killed at Mon Mar 20 21:06:03 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:06:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:06:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15669 found at Mon Mar 20 21:06:03 UTC 2023 selfserv_9887 with PID 15669 started at Mon Mar 20 21:06:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15669 at Mon Mar 20 21:06:04 UTC 2023 kill -USR1 15669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15669 killed at Mon Mar 20 21:06:04 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:06:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:06:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15733 found at Mon Mar 20 21:06:04 UTC 2023 selfserv_9887 with PID 15733 started at Mon Mar 20 21:06:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15733 at Mon Mar 20 21:06:07 UTC 2023 kill -USR1 15733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15733 killed at Mon Mar 20 21:06:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:06:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:06:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15785 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15785 found at Mon Mar 20 21:06:07 UTC 2023 selfserv_9887 with PID 15785 started at Mon Mar 20 21:06:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15785 at Mon Mar 20 21:06:32 UTC 2023 kill -USR1 15785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15785 killed at Mon Mar 20 21:06:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:06:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:06:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15840 found at Mon Mar 20 21:06:32 UTC 2023 selfserv_9887 with PID 15840 started at Mon Mar 20 21:06:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15840 at Mon Mar 20 21:06:34 UTC 2023 kill -USR1 15840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15840 killed at Mon Mar 20 21:06:34 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:06:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:06:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15904 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15904 found at Mon Mar 20 21:06:34 UTC 2023 selfserv_9887 with PID 15904 started at Mon Mar 20 21:06:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15904 at Mon Mar 20 21:06:36 UTC 2023 kill -USR1 15904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15904 killed at Mon Mar 20 21:06:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:06:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:06:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15956 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15956 found at Mon Mar 20 21:06:36 UTC 2023 selfserv_9887 with PID 15956 started at Mon Mar 20 21:06:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15956 at Mon Mar 20 21:07:02 UTC 2023 kill -USR1 15956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15956 killed at Mon Mar 20 21:07:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:07:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16024 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16024 found at Mon Mar 20 21:07:02 UTC 2023 selfserv_9887 with PID 16024 started at Mon Mar 20 21:07:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16024 at Mon Mar 20 21:07:03 UTC 2023 kill -USR1 16024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16024 killed at Mon Mar 20 21:07:04 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:07:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16088 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16088 found at Mon Mar 20 21:07:04 UTC 2023 selfserv_9887 with PID 16088 started at Mon Mar 20 21:07:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16088 at Mon Mar 20 21:07:06 UTC 2023 kill -USR1 16088 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16088 killed at Mon Mar 20 21:07:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:07:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16142 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16142 found at Mon Mar 20 21:07:06 UTC 2023 selfserv_9887 with PID 16142 started at Mon Mar 20 21:07:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16142 at Mon Mar 20 21:07:29 UTC 2023 kill -USR1 16142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16142 killed at Mon Mar 20 21:07:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:07:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16194 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16194 found at Mon Mar 20 21:07:30 UTC 2023 selfserv_9887 with PID 16194 started at Mon Mar 20 21:07:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16194 at Mon Mar 20 21:07:31 UTC 2023 kill -USR1 16194 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16194 killed at Mon Mar 20 21:07:31 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:07:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16250 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16250 found at Mon Mar 20 21:07:31 UTC 2023 selfserv_9887 with PID 16250 started at Mon Mar 20 21:07:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16250 at Mon Mar 20 21:07:33 UTC 2023 kill -USR1 16250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16250 killed at Mon Mar 20 21:07:33 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:07:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16306 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16306 found at Mon Mar 20 21:07:33 UTC 2023 selfserv_9887 with PID 16306 started at Mon Mar 20 21:07:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16306 at Mon Mar 20 21:07:35 UTC 2023 kill -USR1 16306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16306 killed at Mon Mar 20 21:07:35 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:07:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16362 found at Mon Mar 20 21:07:35 UTC 2023 selfserv_9887 with PID 16362 started at Mon Mar 20 21:07:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16362 at Mon Mar 20 21:07:37 UTC 2023 kill -USR1 16362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16362 killed at Mon Mar 20 21:07:37 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:07:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:07:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16423 found at Mon Mar 20 21:07:38 UTC 2023 selfserv_9887 with PID 16423 started at Mon Mar 20 21:07:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16423 at Mon Mar 20 21:08:03 UTC 2023 kill -USR1 16423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16423 killed at Mon Mar 20 21:08:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:08:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:08:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16490 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16490 found at Mon Mar 20 21:08:03 UTC 2023 selfserv_9887 with PID 16490 started at Mon Mar 20 21:08:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16490 at Mon Mar 20 21:08:05 UTC 2023 kill -USR1 16490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16490 killed at Mon Mar 20 21:08:05 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:08:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:08:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16550 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16550 found at Mon Mar 20 21:08:05 UTC 2023 selfserv_9887 with PID 16550 started at Mon Mar 20 21:08:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16550 at Mon Mar 20 21:08:29 UTC 2023 kill -USR1 16550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16550 killed at Mon Mar 20 21:08:29 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:08:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:08:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16604 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16604 found at Mon Mar 20 21:08:29 UTC 2023 selfserv_9887 with PID 16604 started at Mon Mar 20 21:08:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16604 at Mon Mar 20 21:08:30 UTC 2023 kill -USR1 16604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16604 killed at Mon Mar 20 21:08:30 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:08:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:08:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16664 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16664 found at Mon Mar 20 21:08:31 UTC 2023 selfserv_9887 with PID 16664 started at Mon Mar 20 21:08:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16664 at Mon Mar 20 21:08:56 UTC 2023 kill -USR1 16664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16664 killed at Mon Mar 20 21:08:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:08:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:08:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16741 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16741 found at Mon Mar 20 21:08:56 UTC 2023 selfserv_9887 with PID 16741 started at Mon Mar 20 21:08:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16741 at Mon Mar 20 21:08:58 UTC 2023 kill -USR1 16741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16741 killed at Mon Mar 20 21:08:58 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:08:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:08:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16801 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16801 found at Mon Mar 20 21:08:58 UTC 2023 selfserv_9887 with PID 16801 started at Mon Mar 20 21:08:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16801 at Mon Mar 20 21:09:23 UTC 2023 kill -USR1 16801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16801 killed at Mon Mar 20 21:09:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:09:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16858 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16858 found at Mon Mar 20 21:09:23 UTC 2023 selfserv_9887 with PID 16858 started at Mon Mar 20 21:09:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16858 at Mon Mar 20 21:09:25 UTC 2023 kill -USR1 16858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16858 killed at Mon Mar 20 21:09:25 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:09:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16918 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16918 found at Mon Mar 20 21:09:25 UTC 2023 selfserv_9887 with PID 16918 started at Mon Mar 20 21:09:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16918 at Mon Mar 20 21:09:48 UTC 2023 kill -USR1 16918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16918 killed at Mon Mar 20 21:09:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:09:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16985 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16985 found at Mon Mar 20 21:09:49 UTC 2023 selfserv_9887 with PID 16985 started at Mon Mar 20 21:09:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16985 at Mon Mar 20 21:09:50 UTC 2023 kill -USR1 16985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16985 killed at Mon Mar 20 21:09:50 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:09:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17037 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17037 found at Mon Mar 20 21:09:50 UTC 2023 selfserv_9887 with PID 17037 started at Mon Mar 20 21:09:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17037 at Mon Mar 20 21:09:52 UTC 2023 kill -USR1 17037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17037 killed at Mon Mar 20 21:09:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:09:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17090 found at Mon Mar 20 21:09:53 UTC 2023 selfserv_9887 with PID 17090 started at Mon Mar 20 21:09:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17090 at Mon Mar 20 21:09:55 UTC 2023 kill -USR1 17090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17090 killed at Mon Mar 20 21:09:55 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 21:09:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17172 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17172 found at Mon Mar 20 21:09:55 UTC 2023 selfserv_9887 with PID 17172 started at Mon Mar 20 21:09:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17172 at Mon Mar 20 21:09:56 UTC 2023 kill -USR1 17172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17172 killed at Mon Mar 20 21:09:56 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:09:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17214 found at Mon Mar 20 21:09:56 UTC 2023 selfserv_9887 with PID 17214 started at Mon Mar 20 21:09:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17214 at Mon Mar 20 21:09:57 UTC 2023 kill -USR1 17214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17214 killed at Mon Mar 20 21:09:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:09:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17255 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17255 found at Mon Mar 20 21:09:57 UTC 2023 selfserv_9887 with PID 17255 started at Mon Mar 20 21:09:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 17255 at Mon Mar 20 21:09:57 UTC 2023 kill -USR1 17255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17255 killed at Mon Mar 20 21:09:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:09:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17294 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17294 found at Mon Mar 20 21:09:58 UTC 2023 selfserv_9887 with PID 17294 started at Mon Mar 20 21:09:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17294 at Mon Mar 20 21:09:58 UTC 2023 kill -USR1 17294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17294 killed at Mon Mar 20 21:09:58 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:09:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17333 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17333 found at Mon Mar 20 21:09:58 UTC 2023 selfserv_9887 with PID 17333 started at Mon Mar 20 21:09:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 17333 at Mon Mar 20 21:09:59 UTC 2023 kill -USR1 17333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17333 killed at Mon Mar 20 21:09:59 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:09:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:09:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17372 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17372 found at Mon Mar 20 21:09:59 UTC 2023 selfserv_9887 with PID 17372 started at Mon Mar 20 21:09:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17372 at Mon Mar 20 21:10:00 UTC 2023 kill -USR1 17372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17372 killed at Mon Mar 20 21:10:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17411 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17411 found at Mon Mar 20 21:10:00 UTC 2023 selfserv_9887 with PID 17411 started at Mon Mar 20 21:10:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17411 at Mon Mar 20 21:10:01 UTC 2023 kill -USR1 17411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17411 killed at Mon Mar 20 21:10:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17450 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17450 found at Mon Mar 20 21:10:01 UTC 2023 selfserv_9887 with PID 17450 started at Mon Mar 20 21:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17450 at Mon Mar 20 21:10:01 UTC 2023 kill -USR1 17450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17450 killed at Mon Mar 20 21:10:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17496 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17496 found at Mon Mar 20 21:10:02 UTC 2023 selfserv_9887 with PID 17496 started at Mon Mar 20 21:10:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17496 at Mon Mar 20 21:10:02 UTC 2023 kill -USR1 17496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17496 killed at Mon Mar 20 21:10:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17535 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17535 found at Mon Mar 20 21:10:02 UTC 2023 selfserv_9887 with PID 17535 started at Mon Mar 20 21:10:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17535 at Mon Mar 20 21:10:03 UTC 2023 kill -USR1 17535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17535 killed at Mon Mar 20 21:10:03 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17574 found at Mon Mar 20 21:10:03 UTC 2023 selfserv_9887 with PID 17574 started at Mon Mar 20 21:10:03 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17574 at Mon Mar 20 21:10:04 UTC 2023 kill -USR1 17574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17574 killed at Mon Mar 20 21:10:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17614 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17614 found at Mon Mar 20 21:10:04 UTC 2023 selfserv_9887 with PID 17614 started at Mon Mar 20 21:10:04 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17614 at Mon Mar 20 21:10:05 UTC 2023 kill -USR1 17614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17614 killed at Mon Mar 20 21:10:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17654 found at Mon Mar 20 21:10:05 UTC 2023 selfserv_9887 with PID 17654 started at Mon Mar 20 21:10:05 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17654 at Mon Mar 20 21:10:05 UTC 2023 kill -USR1 17654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17654 killed at Mon Mar 20 21:10:05 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17694 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17694 found at Mon Mar 20 21:10:06 UTC 2023 selfserv_9887 with PID 17694 started at Mon Mar 20 21:10:06 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17694 at Mon Mar 20 21:10:06 UTC 2023 kill -USR1 17694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17694 killed at Mon Mar 20 21:10:06 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17734 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17734 found at Mon Mar 20 21:10:06 UTC 2023 selfserv_9887 with PID 17734 started at Mon Mar 20 21:10:06 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17734 at Mon Mar 20 21:10:07 UTC 2023 kill -USR1 17734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17734 killed at Mon Mar 20 21:10:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17774 found at Mon Mar 20 21:10:07 UTC 2023 selfserv_9887 with PID 17774 started at Mon Mar 20 21:10:07 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17774 at Mon Mar 20 21:10:08 UTC 2023 kill -USR1 17774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17774 killed at Mon Mar 20 21:10:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17814 found at Mon Mar 20 21:10:08 UTC 2023 selfserv_9887 with PID 17814 started at Mon Mar 20 21:10:08 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17814 at Mon Mar 20 21:10:09 UTC 2023 kill -USR1 17814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17814 killed at Mon Mar 20 21:10:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17854 found at Mon Mar 20 21:10:09 UTC 2023 selfserv_9887 with PID 17854 started at Mon Mar 20 21:10:09 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17854 at Mon Mar 20 21:10:09 UTC 2023 kill -USR1 17854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17854 killed at Mon Mar 20 21:10:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:10:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:10:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17894 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17894 found at Mon Mar 20 21:10:10 UTC 2023 selfserv_9887 with PID 17894 started at Mon Mar 20 21:10:10 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17894 at Mon Mar 20 21:10:10 UTC 2023 kill -USR1 17894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17894 killed at Mon Mar 20 21:10:10 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 20 21:10:11 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 20 21:10:11 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.v3.30514 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3c751a1d updateID=dave - merging object Type 0xce534353 id=0x24751a1d updateID=dave - merging object Type 0x00000001 id=0x3d720866 updateID=dave - merging object Type 0x00000001 id=0x3c3d7208 updateID=dave - merging object Type 0x00000001 id=0x3f740a1f updateID=dave - merging object Type 0x00000001 id=0x3e720866 updateID=dave - merging object Type 0xce534353 id=0x26720866 updateID=dave - merging object Type 0x00000001 id=0x3c740a1f updateID=dave - merging object Type 0xce534353 id=0x24740a1f updateID=dave - merging object Type 0x00000001 id=0x3f751a1d updateID=dave - merging object Type 0x00000001 id=0x3d2d7208 updateID=dave - merging object Type 0x00000001 id=0x3f783422 updateID=dave - merging object Type 0x00000001 id=0x3f0d7208 updateID=dave - merging object Type 0x00000002 id=0x16c43729 updateID=dave - merging object Type 0x00000002 id=0x17d39278 updateID=dave - merging object Type 0x00000002 id=0x14809b09 updateID=dave - merging object Type 0x00000002 id=0x17a77161 updateID=dave - merging object Type 0x00000002 id=0x14c78a3f updateID=dave - merging object Type 0x00000002 id=0x16cb8c2b updateID=dave - merging object Type 0xce534352 id=0x32737e6d updateID=dave - merging object Type 0xce534352 id=0x34101166 updateID=dave - merging object Type 0xce534352 id=0x37170d0c updateID=dave - merging object Type 0xce534352 id=0x346f0b1a updateID=dave - merging object Type 0xce534352 id=0x330a0b05 updateID=dave - merging object Type 0xce534352 id=0x37150d1e updateID=dave - merging object Type 0x00000003 id=0x0ec43729 updateID=dave - merging object Type 0x00000003 id=0x0fd39278 updateID=dave - merging object Type 0x00000003 id=0x0c809b09 updateID=dave - merging object Type 0x00000003 id=0x0fa77161 updateID=dave - merging object Type 0x00000003 id=0x0cc78a3f updateID=dave - merging object Type 0x00000003 id=0x0ecb8c2b updateID=dave upgrade complete! merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3c751a1d updateID=server - merging object Type 0xce534353 id=0x24751a1d updateID=server - merging object Type 0x00000001 id=0x3b720866 updateID=server - merging object Type 0x00000001 id=0x3ceb7208 updateID=server - merging object Type 0x00000001 id=0x39740a1f updateID=server - merging object Type 0x00000001 id=0x38751a1d updateID=server - merging object Type 0x00000001 id=0x3d1a7208 updateID=server - merging object Type 0x00000001 id=0x3ffa7208 updateID=server - merging object Type 0x00000001 id=0x3e720866 updateID=server - merging object Type 0xce534353 id=0x26720866 updateID=server - merging object Type 0x00000001 id=0x3c740a1f updateID=server - merging object Type 0xce534353 id=0x24740a1f updateID=server - merging object Type 0x00000001 id=0x39751a1d updateID=server - merging object Type 0x00000001 id=0x3d1b7208 updateID=server - merging object Type 0x00000001 id=0x3f783422 updateID=server - merging object Type 0x00000001 id=0x3ffb7208 updateID=server - merging object Type 0x00000001 id=0x3a720866 updateID=server - merging object Type 0x00000001 id=0x3cea7208 updateID=server - merging object Type 0x00000001 id=0x38740a1f updateID=server - merging object Type 0x00000002 id=0x13fe6c70 updateID=server - merging object Type 0x00000002 id=0x139141c5 updateID=server - merging object Type 0x00000002 id=0x1541f42d updateID=server - merging object Type 0x00000002 id=0x16cbe190 updateID=server - merging object Type 0x00000002 id=0x16dfab55 updateID=server - merging object Type 0x00000002 id=0x16cb8c2b updateID=server - merging object Type 0x00000002 id=0x14bb4988 updateID=server - merging object Type 0x00000002 id=0x15d3b399 updateID=server - merging object Type 0x00000002 id=0x16dacd73 updateID=server - merging object Type 0x00000002 id=0x125f4575 updateID=server - merging object Type 0x00000002 id=0x17125823 updateID=server - merging object Type 0x00000002 id=0x13678510 updateID=server - merging object Type 0xce534351 id=0x2a08664f updateID=server - merging object Type 0xce534351 id=0x29495c6d updateID=server - merging object Type 0xce534352 id=0x330b7f78 updateID=server - merging object Type 0xce534352 id=0x357e737a updateID=server - merging object Type 0xce534352 id=0x330b6865 updateID=server - merging object Type 0xce534352 id=0x37281063 updateID=server - merging object Type 0xce534352 id=0x324f7563 updateID=server - merging object Type 0xce534352 id=0x310b6a65 updateID=server - merging object Type 0xce534352 id=0x32261b0b updateID=server - merging object Type 0xce534352 id=0x3605630d updateID=server - merging object Type 0xce534352 id=0x3362060d updateID=server - merging object Type 0xce534352 id=0x3026190b updateID=server - merging object Type 0xce534352 id=0x32260c16 updateID=server - merging object Type 0xce534352 id=0x34530014 updateID=server - merging object Type 0x00000003 id=0x0bfe6c70 updateID=server - merging object Type 0x00000003 id=0x0b9141c5 updateID=server - merging object Type 0x00000003 id=0x0d41f42d updateID=server - merging object Type 0x00000003 id=0x0ecbe190 updateID=server - merging object Type 0x00000003 id=0x0edfab55 updateID=server - merging object Type 0x00000003 id=0x0ecb8c2b updateID=server - merging object Type 0x00000003 id=0x0cbb4988 updateID=server - merging object Type 0x00000003 id=0x0dd3b399 updateID=server - merging object Type 0x00000003 id=0x0edacd73 updateID=server - merging object Type 0x00000003 id=0x0a5f4575 updateID=server - merging object Type 0x00000003 id=0x0f125823 updateID=server - merging object Type 0x00000003 id=0x0b678510 updateID=server upgrade complete! merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3e3a5f60 updateID=ext_client - merging object Type 0x00000001 id=0x3b54400e updateID=ext_client - merging object Type 0xce534353 id=0x2354400e updateID=ext_client - merging object Type 0x00000001 id=0x3a395e72 updateID=ext_client - merging object Type 0x00000001 id=0x3b5e721c updateID=ext_client - merging object Type 0xce534353 id=0x235e721c updateID=ext_client - merging object Type 0x00000001 id=0x3f475a11 updateID=ext_client - merging object Type 0xce534353 id=0x27475a11 updateID=ext_client - merging object Type 0x00000001 id=0x39455c13 updateID=ext_client - merging object Type 0xce534353 id=0x21455c13 updateID=ext_client - merging object Type 0x00000001 id=0x3c475b01 updateID=ext_client - merging object Type 0xce534353 id=0x24475b01 updateID=ext_client - merging object Type 0x00000001 id=0x395e707f updateID=ext_client - merging object Type 0xce534353 id=0x215e707f updateID=ext_client - merging object Type 0x00000001 id=0x3a385e72 updateID=ext_client - merging object Type 0x00000001 id=0x3d56471c updateID=ext_client - merging object Type 0xce534353 id=0x2556471c updateID=ext_client - merging object Type 0x00000001 id=0x3a3a5e72 updateID=ext_client - merging object Type 0x00000001 id=0x3e3a5e70 updateID=ext_client - merging object Type 0x00000001 id=0x3b54411e updateID=ext_client - merging object Type 0xce534353 id=0x2354411e updateID=ext_client - merging object Type 0x00000001 id=0x3c475a11 updateID=ext_client - merging object Type 0xce534353 id=0x24475a11 updateID=ext_client - merging object Type 0x00000001 id=0x3a455c13 updateID=ext_client - merging object Type 0xce534353 id=0x22455c13 updateID=ext_client - merging object Type 0x00000001 id=0x3f475b01 updateID=ext_client - merging object Type 0xce534353 id=0x27475b01 updateID=ext_client - merging object Type 0x00000001 id=0x395f607d updateID=ext_client - merging object Type 0xce534353 id=0x215f607d updateID=ext_client - merging object Type 0x00000002 id=0x14cf8954 updateID=ext_client - merging object Type 0x00000002 id=0x1040befc updateID=ext_client - merging object Type 0x00000002 id=0x17bc9e97 updateID=ext_client - merging object Type 0x00000002 id=0x1575f105 updateID=ext_client - merging object Type 0x00000002 id=0x12a0c373 updateID=ext_client - merging object Type 0xce534352 id=0x326d6a5a updateID=ext_client - merging object Type 0xce534352 id=0x326d0c2f updateID=ext_client - merging object Type 0xce534352 id=0x361e0b77 updateID=ext_client - merging object Type 0xce534352 id=0x35777039 updateID=ext_client - merging object Type 0xce534352 id=0x33180233 updateID=ext_client - merging object Type 0x00000003 id=0x0ccf8954 updateID=ext_client - merging object Type 0x00000003 id=0x0840befc updateID=ext_client - merging object Type 0x00000003 id=0x0fbc9e97 updateID=ext_client - merging object Type 0x00000003 id=0x0d75f105 updateID=ext_client - merging object Type 0x00000003 id=0x0aa0c373 updateID=ext_client upgrade complete! merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3d720866 updateID=conflict1 - merging object Type 0xce534353 id=0x25720866 updateID=conflict1 - merging object Type 0x00000001 id=0x3e720866 updateID=conflict1 - merging object Type 0x00000001 id=0x3c720866 updateID=conflict1 - merging object Type 0xce534352 id=0x31201570 updateID=conflict1 - merging object Type 0xce534352 id=0x31231570 updateID=conflict1 - merging object Type 0xce534352 id=0x31211570 updateID=conflict1 upgrade complete! merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3b720866 updateID=conflict2 - merging object Type 0x00000001 id=0x39720866 updateID=conflict2 - merging object Type 0x00000001 id=0x3a720866 updateID=conflict2 - merging object Type 0xce534352 id=0x31261570 updateID=conflict2 - merging object Type 0xce534352 id=0x31241570 updateID=conflict2 - merging object Type 0xce534352 id=0x31271570 updateID=conflict2 upgrade complete! merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:53:16 2023 Not After : Mon Mar 20 18:53:16 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:79:41:00:c4:d7:75:72:f4:60:55:66:03:d5:f2:86: 82:06:28:dd:4f:0c:fe:61:e7:b6:91:02:80:64:0c:79: 99:87:27:70:cb:f4:e2:99:73:ba:8e:76:0b:b5:c9:60: b6:0c:f7:30:82:07:bf:31:73:9a:bb:ff:9e:93:c7:fd: 36:09:e8:04:70:36:a7:5e:f6:e1:88:89:32:1d:8d:ca: 2a:ad:b5:c4:36:63:e6:40:fa:7c:b8:83:1d:b2:c7:3b: 87:30:e2:61:af:02:99:11:66:fd:bc:28:40:67:5f:07: 76:5d:1b:e4:14:f1:23:93:99:c8:36:f0:96:f1:01:b3: 7f:cd:fe:b2:3f:57:16:bb:35:1d:92:db:02:b1:52:ab: bd:f9:4b:5e:73:a2:4a:d4:f6:bb:4c:26:11:a0:df:d3: 0f:08:9d:44:84:50:a0:db:4b:06:ee:b9:42:86:1f:d6: 40:d7:ba:8e:59:ee:85:20:ea:89:19:a9:ed:8f:30:53: d8:e3:d4:8d:c5:eb:14:f5:5b:4d:b3:6f:b4:b3:f3:43: e3:c0:49:8b:61:57:11:39:01:75:1b:d6:6e:be:b9:fa: 44:3b:99:8b:c2:ae:f5:d0:a2:55:cd:c8:9b:40:3c:e5: ae:40:45:48:82:a1:a1:b9:12:82:8c:b0:8c:5d:80:7b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:3f:b8:e0:3e:1a:09:d0:8b:ee:9e:d0:bc:0a:75:52: 96:0f:8b:e0:ea:e8:aa:7c:2a:c5:26:46:e0:aa:b7:20: 1d:04:67:d0:fb:55:57:ea:6e:9f:3c:fa:8c:47:83:17: be:98:d2:23:fe:d1:16:19:b9:9d:ef:d7:ee:fe:ea:2a: 28:8d:8e:94:f5:c2:6a:7e:1b:44:3a:61:dc:82:5d:78: 16:ee:ea:9c:10:3b:5b:80:cb:dc:ae:d2:f5:fe:87:3b: 0a:0a:eb:55:e1:54:16:bd:51:10:49:ea:3d:1e:2b:67: af:a0:61:9c:c2:c8:ca:78:6f:7d:3f:3d:f1:e9:2a:0b: 96:94:59:9b:0f:34:7b:95:ae:3e:1f:50:0e:ad:f3:22: bf:64:0f:42:32:bf:e0:68:00:8f:7d:fe:3a:ae:da:23: bc:83:c1:cd:f9:ab:ba:0e:be:a0:e9:16:44:5f:4a:ea: ea:9c:e3:18:60:bf:d7:bc:0c:37:fa:b8:2e:d7:5f:16: 16:79:62:93:af:b4:cf:76:84:2c:e5:91:d8:04:c1:1a: a5:1a:50:39:ea:20:ce:a2:1e:41:4e:69:62:f4:37:b6: 03:06:2a:4e:bf:06:f4:75:5b:33:5e:a2:18:05:85:0c: 7a:13:b7:39:e7:f6:6d:ed:3e:b1:e3:80:b8:0d:99:1a Fingerprint (SHA-256): 85:27:26:E0:E9:A1:4D:96:E6:F4:27:47:B2:16:43:31:54:E5:9F:5F:69:AA:78:4E:AB:7D:94:4B:22:3C:58:93 Fingerprint (SHA1): C4:F6:B5:C9:44:82:3A:76:C2:57:18:37:30:36:39:70:97:A7:3D:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 18:53:18 2023 Not After : Mon Mar 20 18:53:18 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:d3:73:89:33:77:bd:38:1f:95:7e:ad:5f:fa:5c:4b: 41:a0:ed:61:4e:ed:86:d8:0e:d1:53:ef:71:cd:a8:a0: bf:e4:54:24:e0:01:93:f4:2c:a3:46:19:35:ce:a8:08: f7:62:b5:40:bd:fb:ca:66:b8:6e:ac:02:21:0a:22:b3: 13:f1:0f:d8:8e:3f:c2:d2:c0:c7:30:07:92:92:17:8e: 83:a3:ab:5f:20:48:a4:03:b8:c5:14:8a:20:14:d7:cf: ec:98:3b:0b:90:23:d5:37:6c:3e:96:ed:16:bc:c7:44: 71:66:88:5b:72:98:84:ed:95:19:40:0a:83:84:67:76: b9:8d:e0:ee:3a:ce:54:90:73:3a:ac:e4:40:a7:fd:50: 47:74:17:ad:2f:bb:84:66:b9:f4:7a:dc:6d:df:5d:0a: 43:bb:4f:e6:c8:0d:10:9f:bc:96:37:4b:16:ae:64:5f: 1a:f8:45:97:35:4a:f3:ed:ed:23:5f:c5:e5:88:de:3d: e9:e3:35:b5:1d:b0:da:bd:9a:45:51:3d:b4:a7:49:03: e7:10:ff:44:5f:5c:50:09:86:29:f5:a5:05:cd:f6:01: 65:97:54:7c:29:8b:e0:43:87:6a:81:cc:16:7d:1b:05: 0e:56:98:1c:58:f4:0c:ed:71:8b:90:94:4c:2d:90:e7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:b2:25:5e:5e:12:8c:71:62:11:4b:64:01:71:a2:d8: 27:ed:39:d9:ed:fd:a8:07:e8:b5:98:d1:16:2c:55:99: c9:c9:15:29:ec:f8:91:80:06:0f:cf:7d:ba:35:0a:5d: 72:d6:59:6a:e9:ff:66:c1:ee:13:c4:79:aa:97:14:9f: 73:99:5e:8a:42:2b:c3:14:f9:75:00:89:06:eb:3b:1d: 24:c6:c0:68:df:21:3f:92:16:67:42:74:f3:ec:2b:a8: 81:89:e3:5a:3c:a4:b1:2a:d1:e5:5f:1a:2a:8b:07:09: 4b:0f:e4:a2:93:54:fd:68:72:5a:e7:3a:bc:15:55:33: c1:5e:24:69:aa:e6:d3:39:45:5b:67:5e:11:80:cd:7e: 2e:a9:1b:95:97:27:93:c8:d5:76:1e:f9:c8:7f:68:25: 24:2c:53:57:59:a6:81:88:75:0e:c4:60:d8:15:27:a3: 65:f1:3f:b3:f9:bb:23:89:4f:7f:9f:c3:1d:6d:03:0c: 3f:ae:1a:14:49:6e:73:d8:94:5b:a1:eb:91:35:3b:d7: 01:d5:15:ef:17:3c:6c:1a:91:1f:5b:b4:69:cd:97:52: 97:20:cb:95:3b:d4:75:21:6e:70:77:10:09:bb:1a:22: 73:09:3a:da:b5:12:02:f9:1a:d4:06:39:33:a6:ce:40 Fingerprint (SHA-256): 54:21:E1:05:F1:D1:50:0F:6C:BD:90:95:F4:3C:A6:7D:5E:EF:47:E4:94:9F:89:FD:6E:3C:53:79:90:8B:A6:67 Fingerprint (SHA1): 9C:B3:1B:DD:FF:E5:CB:58:E4:E4:23:EA:AA:1E:4E:0F:51:38:94:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000004 id=0x18000000 updateID=sdr upgrade complete! merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA ,, clientCA-ec T,C,C clientCA T,C,C chain-1-clientCA-dsa ,, chain-2-clientCA-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-1-clientCA-ec ,, chain-1-clientCA ,, clientCA-dsa T,C,C chain-2-clientCA-dsa ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.v3.30514 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.v1.30514 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 20 18:53:42 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 18:51:53 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 20 18:53:37 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=UPGRADE_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Mon Mar 20 21:10:17 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Mon Mar 20 21:10:17 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Mon Mar 20 21:10:17 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Mon Mar 20 21:10:17 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Mon Mar 20 21:10:17 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Mon Mar 20 21:10:18 UTC 2023 TIMESTAMP ec END: Mon Mar 20 21:10:18 UTC 2023 ec.sh: Testing with shared library =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Mar 20 21:10:18 UTC 2023 TIMESTAMP libpkix END: Mon Mar 20 21:10:18 UTC 2023 Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 20 21:10:18 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #87: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #111: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k b04562d4d88f4dddd2ddf967798ddb61b4cf84bc -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 8701660f98466d4294c61246e77970374f25f50f -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:29:7a:bc:9a:bb:03:25:a5:8f:c2:7d:7a:94:ec:94: 07:5b:f7:41:d6:8f:c9:c8:1e:fe:77:fe:31:f8:04:f1: 79:b1:96:ff:60:9f:85:59:92:89:44:86:6d:93:d3:bf: a9:b6:d4:97:ee:b3:f7:96:0c:be:e6:08:86:22:f8:86: bc:f0:a7:cc:0a:89:75:c3:d8:f7:ce:cd:e8:66:03:f7: 89:9f:38:97:94:44:b8:e6:4a:d4:89:e6:f5:57:66:de: a7:9f:6e:7d:40:eb:bf:5e:49:b7:8c:0f:36:75:66:31: 84:e5:0f:d3:22:4e:6b:ac:96:90:c5:24:59:32:ff:e1: 2c:91:3c:76:f7:43:ab:bd:2d:7e:66:53:ae:82:15:4b: 86:aa:ab:88:90:1a:7d:93:65:c6:f8:f3:04:c5:ca:78: 1e:ac:6b:17:cf:24:47:70:eb:9d:0b:5a:8e:02:c9:ba: a2:2d:8c:a6:fa:f1:4b:17:b6:87:83:9a:e7:1b:41:96: 38:e2:f6:44:c0:76:69:4d:4c:ef:74:c7:ad:a4:5e:25: 7b:94:9c:1d:ea:32:20:d7:ee:e6:5f:ec:0d:4e:70:02: e1:6c:a8:cf:27:f6:2b:17:a3:a8:02:76:63:38:2a:7e: c6:c8:e5:38:5b:5b:1d:20:01:33:1c:e7:cc:50:9a:a7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:fe:17:e9:5a:53:42:5f:51:04:e7:38:69:66:d5:ee: c6:21:92:38:e2:1a:09:bc:94:21:aa:20:f4:5f:3a:66: 8a:86:4b:4d:21:fb:cd:cd:e3:a5:fb:a4:e4:13:ce:2b: 03:d5:c2:e5:6e:7f:3f:b1:b5:83:77:81:18:db:04:ee: dc:ba:5d:e8:ed:37:2a:d1:8d:57:71:1e:e6:a9:b9:eb: 00:11:91:9a:b4:5e:ec:43:cf:9c:e8:b9:58:5d:46:74: e7:85:c4:d5:41:3f:16:14:91:60:3e:bd:c9:c5:f4:1e: a6:21:b0:c4:e4:2e:2b:69:02:8d:43:54:ab:bd:c0:e9: 8b:de:27:13:14:e9:26:a0:2e:0c:7d:38:66:b4:b4:fd: e0:66:ba:85:b8:9a:47:2f:16:87:9d:a4:f0:19:e2:cf: 60:14:c8:8f:08:0f:c5:ef:f0:cf:fc:b5:21:92:6d:0d: a6:17:f0:63:d0:9b:09:57:58:85:54:2b:0a:72:66:dc: 87:38:2e:51:f6:7e:c9:1b:f8:4b:db:2b:f3:11:30:47: e1:56:94:b5:5a:00:b4:31:b8:0a:d8:0a:8f:bc:dd:a9: bd:16:3a:1e:21:42:07:f4:fb:08:fa:c0:0a:9c:8d:21: 32:d4:0d:54:1a:56:b5:11:3f:69:34:12:b8:dc:6b:41 Fingerprint (SHA-256): B1:1D:D0:66:23:5F:48:BD:2F:60:95:3B:56:78:64:47:46:E7:14:9A:B2:5D:60:B1:B0:14:E3:93:E7:0F:F5:61 Fingerprint (SHA1): 9F:6B:C6:F9:60:D3:49:E1:C8:53:19:4A:01:10:1F:04:D6:9E:9D:0B cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:2b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:12 2023 Not After : Tue Jun 20 21:12:12 2023 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:1b:ba:5a:2a:d4:38:80:3e:f0:17:e8:4c:c8:a9:fc: c7:8a:4d:e4:78:f0:66:c2:f2:50:55:dd:08:46:12:89: 0c:18:2b:0a:66:e4:9e:88:3e:01:26:43:85:95:4e:12: 0a:fe:d4:d9:47:39:3a:cc:aa:af:50:a8:d8:dd:c2:0d: 0c:11:2d:8a:ec:95:4b:c0:26:32:34:cc:3b:70:29:ff: 6d:96:cc:0f:ca:35:b0:da:ba:14:04:19:1c:91:cf:2b: 1f:82:f9:63:01:6f:d0:3d:15:dc:d3:1f:fd:7c:da:dc: 3e:2f:77:81:31:cf:68:a2:65:4f:7f:ac:3c:02:61:5d: e5:82:1e:40:db:36:f5:03:c0:b7:a8:5a:8b:7c:32:a2: 49:9a:39:b6:20:2b:7c:b4:b4:90:91:f7:34:7f:e0:f2: 4c:b4:da:ec:a2:a4:ad:35:92:04:cc:e0:4e:81:a0:c6: 0c:77:94:00:03:d1:5c:53:64:26:60:b2:c7:3b:f4:a4: 85:82:15:04:40:2a:89:d2:d4:64:a0:40:5a:fa:cf:d5: 5b:c0:a8:92:59:6d:48:62:19:be:47:21:11:c9:e9:0d: ea:28:19:92:9a:b1:68:b4:be:6e:e0:4d:ae:6f:97:6e: 87:02:7d:08:62:bd:b5:8d:e8:c1:03:0b:37:a8:65:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:04:dd:40:6c:62:26:98:32:ba:b4:9a:b9:d2:93:1b: c3:0c:e2:49:93:76:7d:8b:05:c5:49:b2:3a:a2:af:39: c3:60:ed:26:f6:f7:a7:b9:27:9c:47:29:d6:39:fb:23: 15:2a:19:89:cc:68:ce:f5:26:84:88:d3:f6:62:3e:90: 5c:77:a3:3c:73:59:d9:a4:fb:08:eb:dc:f6:74:68:d6: 8b:75:d2:d5:4f:71:6f:82:34:fc:52:af:3d:d2:a8:c8: bd:f3:97:7f:b8:18:bf:6b:7b:ff:03:32:46:cf:ff:28: 82:1b:a6:62:24:bd:eb:c1:2d:bb:a1:a6:52:29:bb:2e: 71:ff:aa:29:88:eb:77:2a:ad:4a:ee:c8:5f:15:6f:e0: 77:a3:bc:ac:51:c0:59:ec:78:61:30:e3:c0:40:d5:fa: b6:9e:9f:8f:aa:71:8e:28:a6:6d:e2:54:d7:d1:0a:28: f2:0b:8f:df:00:f6:3f:c0:54:d8:3d:7c:4e:62:5f:9e: b9:54:83:d0:05:e0:44:ff:2f:dd:fc:b6:3f:cd:65:81: 2b:20:77:70:ad:e3:36:db:9f:8e:a0:76:14:b8:e6:5d: 9f:7d:ac:0c:7c:14:22:0b:52:6f:27:82:e5:56:85:4b: 00:9e:d8:06:db:2a:16:fd:d2:f1:0d:a2:ec:fc:0d:b4 Fingerprint (SHA-256): A5:DD:56:53:3F:1C:F4:24:C0:07:89:B6:16:37:F0:A6:FD:3F:09:95:D9:34:04:B1:02:91:8C:27:33:EF:7B:37 Fingerprint (SHA1): 23:E0:04:AF:DE:BF:1E:8E:A6:85:F1:6D:F9:D8:4C:49:8B:20:DB:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:2e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:13 2023 Not After : Tue Jun 20 21:12:13 2023 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:3f:93:19:43:ca:86:af:36:96:57:67:07:2e:8e:98: 4e:e1:f9:63:3b:32:26:dc:24:89:03:72:2e:c5:44:f5: b2:17:5b:cf:35:f8:7e:fd:7b:f6:f2:a8:a5:ab:13:83: 22:40:9f:47:08:ee:74:c5:d9:3c:ce:1e:c7:fa:a5:6b: 75:34:c6:f9:02:bb:57:b8:82:a0:8f:44:43:b1:e1:22: 07:32:ba:44:5f:9b:d6:23:98:ec:52:f9:08:98:0c:58: 14:11:4c:f8:52:c8:59:03:ac:64:52:d4:42:bf:ff:93: 50:25:12:21:b4:b1:6e:8b:9e:25:7b:4b:64:91:cd:fc: 87:da:e4:37:38:8b:d2:68:56:40:fa:83:5b:b1:89:cd: 1e:2e:37:bd:09:16:9a:3e:8e:5f:fb:92:45:c1:28:ac: 86:a4:5a:bc:5b:99:16:da:55:4a:a3:83:cd:d9:61:fe: 91:a3:d2:87:3f:41:80:9b:be:a7:84:c1:81:97:0e:31: 59:9b:fb:72:b6:67:4c:f9:09:d4:1c:be:a7:1b:34:4d: 76:e3:b6:6a:28:b9:0b:2f:bd:37:b2:f2:a1:d1:83:c5: f9:dd:e5:7f:41:aa:e7:f0:07:06:d1:db:98:47:b8:55: aa:31:d2:6a:07:6f:39:08:8b:62:15:39:ab:de:54:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:84:b8:03:7d:75:47:34:37:53:9e:a5:da:e2:e2:e8: f0:02:2a:f9:8c:92:c3:5a:82:88:68:09:a2:38:4e:e3: 33:9f:d1:55:92:de:a9:6c:f7:2e:f5:fb:da:62:ef:92: 89:a9:b8:28:2b:1b:cf:32:d3:cc:53:c0:81:f6:90:b2: 09:cf:e4:4c:3d:05:3b:0f:89:12:05:92:42:81:81:11: 04:73:46:81:4e:2c:53:18:a0:a3:b8:a8:ad:53:ac:6f: f6:9f:10:46:47:fd:af:b2:2f:6d:35:e5:23:cf:43:7a: 1a:cb:a1:e4:7d:ec:94:9b:fe:c7:57:32:07:40:6c:8a: 1f:18:5f:a8:d5:c4:7d:54:1b:f3:9c:4f:ec:62:57:51: 6e:4a:0d:64:58:48:9c:aa:eb:0a:2a:9b:85:bd:c5:ce: c4:37:98:cf:86:36:c3:4f:58:73:1d:dc:06:aa:01:45: 00:af:01:5e:0c:05:7a:95:a0:a5:31:ff:b2:5a:41:26: 51:e4:34:d8:b6:70:ac:74:10:49:0f:30:ec:f5:9f:d5: 0d:45:56:2d:8c:48:16:ca:58:74:fe:9b:4f:74:33:94: d7:6a:b8:51:05:c8:55:e2:cd:ec:03:67:1f:ed:4f:b3: 83:e5:a4:70:ba:da:be:12:fd:9a:b5:b9:13:ef:7a:3d Fingerprint (SHA-256): 5F:13:42:ED:EF:EB:EF:2C:7F:51:39:F2:36:8C:6B:12:D2:1F:5A:BB:26:07:CE:7E:CE:F5:86:32:7A:A5:77:15 Fingerprint (SHA1): 73:19:8D:47:22:B2:93:75:7E:FF:A8:B5:35:91:DE:F0:0F:59:1A:6C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:30 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:14 2023 Not After : Tue Jun 20 21:12:14 2023 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:81:0f:07:24:36:00:e3:81:61:3b:bd:5c:52:b2:a6: 47:56:29:5f:41:6b:da:c6:11:38:3f:dc:43:06:8a:05: d6:f3:cb:ea:18:f5:f5:c7:9a:4f:c7:1a:f8:74:ca:c0: 24:3a:cf:4d:86:f6:1a:ad:06:49:3a:dc:6c:8f:8b:ee: ad:80:7c:6f:ab:49:7b:85:56:96:0e:0e:98:7e:55:f8: 05:e6:03:30:7f:eb:10:97:a0:30:d4:e3:03:04:2c:ae: 20:7e:19:06:e1:ed:98:e0:83:74:9d:9f:2c:98:96:f1: 79:6b:f2:c8:12:55:a1:c4:13:6d:3a:b3:7f:90:fd:24: c6:06:52:e9:87:33:50:9d:38:41:9e:e2:30:01:15:c9: 4f:2f:8c:8e:88:78:4b:6b:19:c0:8f:cf:7f:46:65:17: cc:e6:8c:cb:36:4e:95:3f:67:79:a9:a5:b9:0a:06:b4: c4:ec:51:dc:d7:12:a6:4f:12:d2:8d:75:c0:38:fb:dd: 95:97:16:df:c0:72:64:7d:f5:b1:d4:65:1a:1a:a1:08: 3c:d8:7f:c9:d0:d3:a1:05:12:cf:e0:39:89:cb:52:0b: 96:26:49:c5:19:3c:dc:23:69:36:df:d4:96:be:d1:2a: 74:f9:89:a5:c6:7c:b5:86:58:8c:14:9f:6a:25:4b:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:b5:95:f8:6b:a0:54:be:19:1f:7f:65:0e:e2:dc:29: 58:6e:56:ab:6a:69:50:7f:29:2c:01:c5:ec:f9:4f:fc: 8f:d9:17:4c:a4:02:b5:55:4e:d6:76:ec:31:c4:35:98: f4:d1:9e:6f:dc:8c:30:64:2d:7f:01:5b:12:ce:3e:a3: 47:dc:9d:78:55:ac:bf:f1:39:59:f3:52:d1:08:ad:a8: 99:f5:46:fd:c6:50:68:b8:51:ea:a8:a9:df:bd:a3:ad: 70:f4:1e:fb:ff:80:f1:85:91:0e:8b:21:7e:84:90:a7: 3a:6d:52:c4:33:65:55:c3:6d:5d:1d:5a:57:bf:2a:e3: 68:2e:f9:57:0e:26:25:a6:23:c5:a6:f2:96:ae:71:57: e8:b3:5b:33:2a:c4:64:14:13:60:96:a1:11:f0:d1:f3: 66:68:60:c9:86:04:54:ea:8c:0d:04:8a:ef:a6:18:ce: 49:a1:9d:2e:14:6d:8a:9a:0a:b7:51:e1:64:a6:1e:c0: 75:0f:09:35:ee:a0:45:fd:e3:da:eb:42:e4:c3:1f:98: 4a:3f:ae:fa:9b:cb:af:aa:38:a9:54:bb:8e:48:8e:57: db:17:83:3f:58:0b:38:1c:4a:22:bc:4e:82:b1:32:ed: 47:24:b0:e2:de:3b:2e:9b:a4:d8:b3:63:81:cb:36:9b Fingerprint (SHA-256): A2:A6:40:00:23:D0:27:6D:18:A1:09:36:B6:CA:2B:D6:F2:9D:93:D6:82:D6:D4:A7:22:3F:82:6F:8D:70:0D:13 Fingerprint (SHA1): 24:87:B7:41:9D:F9:A1:F9:61:2A:96:01:A4:C5:B0:24:EB:0F:3E:A3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:15 2023 Not After : Tue Jun 20 21:12:15 2023 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:06:86:d5:0f:9e:45:31:f3:c0:57:4e:df:06:2d:83: b9:6a:56:9c:24:45:ed:1a:5e:0a:f6:e9:af:70:26:2b: 2d:1a:b1:a9:98:d7:98:be:72:e5:00:45:1e:57:b1:ce: 04:a4:cd:bd:35:a6:0b:5e:f3:7d:1d:92:56:1a:f3:54: 8e:6a:ff:9d:a7:c5:7a:b6:9f:e3:a1:03:47:3b:e2:9c: b9:ad:31:ca:ca:43:1d:76:7b:e5:dc:36:cd:73:1d:b2: 83:4d:88:21:b4:0e:cc:3e:6e:0b:a3:1f:a1:ae:bb:2a: 0c:e4:32:47:6d:14:26:c9:67:d1:2a:f9:ec:fa:6e:38: fa:8f:b9:bd:a1:e9:71:3d:78:9e:f9:2b:96:00:7a:7d: 5a:d3:10:3f:d1:2b:f0:4e:1b:e2:f9:c3:80:1e:cd:8f: 0f:55:d1:85:17:a3:86:84:9a:c8:35:8f:a4:e2:c4:04: 9f:e5:a0:75:00:91:d4:d5:02:78:2f:5d:03:59:bb:b8: 3d:ef:b6:d3:5b:9d:66:d4:a1:fb:51:b6:96:6a:7f:00: 04:30:58:2c:b7:ef:20:07:28:47:20:c3:8e:eb:9f:04: 31:d6:b2:b4:64:97:38:2c:16:15:e3:40:b6:54:d3:71: 92:5f:9d:81:b4:17:c4:e9:b3:30:dd:b5:75:d4:f7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:a1:53:60:0a:42:89:04:a1:a3:f5:18:a2:4d:9f: 78:40:58:77:e8:28:dd:e6:d9:6d:88:d9:9f:92:16:00: 51:be:10:ad:5d:1b:c1:0d:96:d0:0e:99:9f:a5:ae:c3: f3:36:99:de:ed:74:84:e9:9c:4f:61:c1:93:0c:dc:b9: bd:cb:78:9d:ae:f9:ab:e9:ee:a4:ed:ff:14:dc:40:5d: 76:d3:7a:44:e9:54:1b:24:4b:1f:54:4c:24:28:44:75: ed:fb:2b:99:44:b7:80:55:da:a5:16:56:e7:0a:86:67: b7:55:a4:b4:1b:92:a3:c7:4b:86:ac:3f:39:a4:28:ad: e3:c5:22:9e:a1:08:c0:4d:f6:55:49:66:45:38:b4:9b: f1:dc:7c:6d:6f:c9:ca:f4:5b:91:d0:1f:df:2b:59:55: 56:63:75:6d:3c:22:ac:0b:6b:4d:de:03:d5:b4:b1:8f: be:6d:ba:7e:5f:77:dc:9c:5b:7f:7d:e3:5f:a2:05:20: 59:a0:ad:2c:79:b2:b3:e9:0e:ca:ec:dc:bd:af:3a:47: 8c:d5:28:eb:e6:8a:a4:15:a7:df:7a:38:50:72:dc:74: 79:46:7d:fc:a9:15:97:23:3c:30:2d:a9:0e:2c:a3:d8: 93:b4:47:87:4c:b8:25:63:a6:e7:17:61:a6:c3:2d:96 Fingerprint (SHA-256): 69:BF:43:69:A9:A8:8A:DC:C8:1A:95:AD:AB:44:19:85:BB:1B:0A:EB:D4:09:33:CB:3B:EA:43:97:9E:51:61:D9 Fingerprint (SHA1): 6C:8D:D6:86:99:89:2C:00:63:72:F4:12:9A:8F:B2:60:64:BD:26:37 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:34 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:16 2023 Not After : Tue Jun 20 21:12:16 2023 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:4b:f7:1a:91:69:b3:ed:b6:67:83:dd:cf:88:0b:04: 9a:d9:cc:8e:0d:35:c9:8f:7d:70:d8:fa:f0:4e:10:96: 91:8e:d4:44:51:46:d8:1e:4a:db:12:ad:40:5c:82:aa: c4:98:4e:13:8e:62:a1:ad:b0:89:78:a0:ba:f1:dc:77: 72:88:ac:53:c5:94:55:19:93:74:81:55:d2:54:9c:ad: b9:43:ed:52:57:17:d0:1f:91:f5:de:55:63:1f:5d:e0: 88:f1:ca:13:17:86:43:f7:80:47:3d:b7:71:c6:68:db: 1b:88:21:38:e2:ed:73:95:ad:e3:67:d2:77:d4:18:89: 42:6c:45:74:7e:68:78:93:76:58:4f:f7:a9:e5:f1:dc: 90:98:c2:6d:a0:88:5f:c6:03:da:df:77:43:f1:a2:68: 7e:dc:45:35:e6:62:06:7e:a6:d0:26:27:8c:f0:fd:34: c3:2c:cb:ac:9f:cb:43:1f:78:fe:c1:9d:a8:ac:1c:ac: 13:6b:5d:53:29:56:97:47:e5:19:cc:e0:ed:78:aa:70: 55:15:12:d9:15:0b:62:09:31:80:36:83:73:ac:71:d3: 75:69:da:20:8a:b6:6a:17:07:32:50:cd:8f:dc:0a:76: 32:cf:2b:e4:4d:14:ca:df:50:a3:22:3b:9e:bb:e7:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:4d:47:1b:7c:01:e7:c5:f8:20:0f:dd:c4:3f:cb:99: 58:04:2a:28:8e:cb:6a:60:09:72:92:d9:55:0d:42:46: 8d:01:0b:c2:ab:03:29:3f:42:47:74:1b:7b:55:2d:64: 62:b6:46:95:07:41:04:e4:83:fc:d0:1f:99:7d:8a:f6: 33:eb:f5:78:ab:95:77:53:17:45:c7:f2:03:6f:b8:2d: 10:1f:e4:78:21:05:74:82:ce:cd:b8:8d:20:67:aa:2a: 1f:ae:bf:aa:72:c6:93:7f:97:81:32:92:64:b0:87:fd: d1:22:52:11:45:a3:2c:e4:81:90:cd:f4:20:c8:de:ed: a7:44:19:57:99:44:1b:0e:a7:78:11:64:4b:90:9e:2f: b5:d9:c6:43:1b:6f:08:a8:6a:d0:7d:62:23:ef:e9:5c: 58:64:da:24:53:df:bf:0f:d3:40:bc:90:17:0c:a5:56: 54:6e:37:33:fd:d5:7a:80:b1:5d:9d:ce:60:bb:91:69: 1b:50:90:00:0d:28:46:cf:ee:b1:26:5c:b1:6f:45:14: 7b:7a:f6:6c:77:60:e7:6d:dc:52:e5:1d:d7:66:78:e7: ae:9a:a2:1e:79:0e:d4:7b:39:eb:fd:03:5c:0a:ec:40: 05:31:50:62:d5:df:36:88:c1:95:a3:a2:17:d9:5d:98 Fingerprint (SHA-256): C7:0E:9E:79:85:EA:20:72:0D:C0:47:0D:1E:8C:F6:1A:74:92:E2:DF:DC:A9:D5:C9:09:32:D9:0B:26:92:31:D6 Fingerprint (SHA1): EF:EC:AF:77:29:B2:FA:E0:94:31:C5:04:85:19:B2:F5:AC:BD:E9:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:35 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:17 2023 Not After : Tue Jun 20 21:12:17 2023 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:14:3a:0e:75:de:e3:c2:d2:9a:7b:84:20:78:20:ef: 62:92:5d:c2:a9:dc:17:8a:b9:74:1c:48:0e:ff:bd:00: 79:21:eb:7f:72:a5:ae:4f:67:af:5d:d3:49:15:fb:e3: 5e:26:96:32:24:58:cf:e7:3d:4e:c5:8a:88:bc:99:67: 80:6a:df:41:b5:d5:d4:85:60:1b:37:71:ac:31:ec:4e: b8:af:ad:90:85:a3:9f:98:55:ec:97:ef:7e:74:c5:72: 5d:ba:38:4b:d0:a7:cd:6a:a5:f5:9e:e0:46:42:a8:45: 32:65:00:56:23:46:be:e9:d2:3e:79:ed:0a:6f:a7:ef: 48:b5:8e:de:18:65:d8:b6:bd:29:66:06:f3:78:df:9d: b5:ca:49:97:d0:69:26:00:b7:79:6e:7c:43:b7:9b:bd: 3b:55:4c:d6:a4:30:92:a9:45:0a:07:05:e6:5a:db:75: 0f:9c:66:e4:cc:a5:07:06:3e:88:ac:a8:f4:7f:4a:98: 15:5f:d5:0a:9a:80:c5:47:41:7c:29:8f:8b:b0:b8:9f: fa:40:89:e5:7e:ef:9b:77:05:73:34:ce:f4:68:82:10: 86:2d:11:20:b8:c9:d1:7e:e7:20:cc:de:cd:0c:0c:76: 7a:85:9c:5a:b1:27:fa:33:da:d3:2c:c1:d3:cb:86:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:84:3a:6e:e8:e2:f9:69:fa:90:33:4b:59:f2:4c:f0: f6:de:0f:5b:af:0b:9c:ed:12:0a:d6:7f:6a:8f:3f:f7: 4d:eb:40:b9:e9:15:ae:17:62:27:79:69:32:fe:99:1b: df:6d:6e:36:e3:ac:a8:72:d1:13:6f:03:81:65:ba:47: 14:bc:ab:0e:1d:80:2d:ad:a9:b1:ca:0d:9c:7c:39:ee: 50:1b:ad:46:4d:d2:24:a9:b4:56:e7:04:a6:88:57:5c: b6:17:f4:14:2f:cf:72:7b:89:15:38:7a:3c:dd:85:e4: a3:10:6d:ba:57:bf:f8:97:78:bf:81:b9:b9:be:14:da: 33:00:90:a8:b3:26:7c:4b:4b:99:d0:5f:0c:f8:03:0f: 8d:bf:0a:9a:c9:81:07:9f:62:32:ab:1d:bf:65:e4:24: ee:e3:4d:29:72:6c:3d:8a:82:cd:43:ad:9c:da:01:13: 80:b7:5b:d9:ce:56:6d:ef:36:4c:7d:c3:e1:f2:52:59: d3:b7:12:7a:4d:17:47:76:6f:05:51:a8:f1:d8:06:4a: 71:98:34:d1:27:ab:c8:6b:c1:41:88:29:f8:6e:39:3b: 97:b2:0b:f0:96:c4:7e:d7:48:85:73:37:16:0b:5a:cc: af:c1:2d:88:29:46:37:14:d2:c5:b0:e8:8c:b9:2c:cf Fingerprint (SHA-256): E8:15:B4:F2:13:F9:C0:BB:95:9A:1E:A8:12:4E:BC:8A:A2:A8:7F:75:D5:6A:14:8B:A5:0D:D5:2A:FD:88:C6:B6 Fingerprint (SHA1): 09:1F:B6:B2:10:36:7E:8A:C6:24:BC:3A:68:CA:D3:4B:6F:14:C0:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:37 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:18 2023 Not After : Tue Jun 20 21:12:18 2023 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:65:30:39:c5:8a:0b:a0:92:9e:40:22:e6:74:0f:2c: b1:74:fb:57:a3:be:a0:27:d8:98:4f:f2:8b:8a:02:d4: 98:23:2a:95:25:48:05:77:5f:97:8c:1a:ec:71:1a:d5: be:a3:47:53:94:79:19:9f:f6:41:63:81:a0:1e:9d:9d: 36:37:bf:44:24:ab:db:86:ec:5e:1c:1a:a5:3f:41:e0: 84:f7:56:66:02:41:ef:8a:c1:8a:37:88:04:8b:c1:b7: bc:bc:2f:13:e3:ff:5f:48:13:bc:c9:cb:6d:bb:8c:07: 42:b0:7c:20:7c:88:08:43:fe:76:61:10:4b:c3:56:63: b9:fc:18:88:22:39:ad:10:40:ef:e6:65:76:e4:06:40: e6:d0:8c:44:7e:11:89:31:dd:d1:78:6e:b2:65:d7:a8: 78:55:b4:69:14:3b:b7:a1:6f:a2:a7:83:00:d8:96:f7: 01:a1:90:71:68:8e:3b:78:ae:16:e2:e9:3d:d5:ab:04: 6e:1a:70:73:95:a3:94:c6:20:2e:8d:99:b8:60:01:cb: 7e:da:47:4f:be:35:fd:3c:62:8b:6b:12:93:c6:85:8b: 70:ea:18:35:5a:22:ab:2d:93:36:bb:7c:47:49:4c:9d: c3:aa:b8:0b:8b:f5:d2:59:f6:6f:ac:e4:95:9f:1a:ff Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:c2:41:bf:62:13:b7:94:01:3f:28:d0:46:8e:91:f2: 16:96:f8:bf:91:8c:1c:cf:00:1e:0b:b3:45:0b:69:5b: 26:2f:75:80:82:6c:0a:30:81:cd:e0:3c:31:38:e9:fd: 99:2f:23:5e:2b:3b:ae:20:6b:53:76:6e:ae:c7:2d:d1: f5:7a:36:1a:bb:6f:4e:85:cc:53:30:7d:de:d0:27:06: 37:a8:ac:a1:45:f4:b0:e2:20:ea:49:54:ce:78:36:b6: 70:c1:4f:15:69:9d:00:d9:80:88:65:99:e2:65:aa:9b: a9:1f:4e:fa:4a:cc:11:21:03:b8:b8:06:1c:a3:d3:54: 1a:81:27:14:cd:0f:d1:7e:89:8f:9c:5b:9c:41:b5:ff: ef:aa:58:76:73:08:be:48:43:81:c2:5b:37:54:f6:28: e9:8c:a6:5b:dc:74:7f:61:2d:5e:25:c3:63:d2:bb:be: ae:1f:c7:e6:62:55:5d:6d:ec:70:24:09:2c:cf:ed:59: e8:2a:f6:47:87:1f:cf:d6:b4:f3:cf:8a:1b:1b:78:7b: 11:cf:02:8f:b2:6a:5a:f3:54:ac:8f:5d:05:be:b8:c4: d1:48:36:c9:3f:4f:13:3c:69:df:b4:01:27:a8:4b:73: c0:a6:73:6c:43:2c:0c:64:dc:c3:fe:02:fe:b3:4f:ee Fingerprint (SHA-256): E0:1E:1D:5F:E6:7C:C7:25:C6:B0:5B:D6:89:C7:68:33:F2:6C:75:3C:8F:C0:7A:AE:BF:7F:92:5B:E0:27:F8:4A Fingerprint (SHA1): 47:88:E0:91:B2:D8:4D:B2:BA:68:49:28:BF:93:91:23:4F:8C:81:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:3a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:19 2023 Not After : Tue Jun 20 21:12:19 2023 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:46:6c:cc:37:3a:5f:60:b7:73:76:e0:24:82:91:a6: e0:1b:ab:0b:c6:63:4d:1e:bd:f0:f6:33:e6:fa:af:2a: 09:53:76:11:e1:a5:6f:0b:78:7d:98:c2:3f:89:1c:69: 41:62:f8:ee:b9:c0:0f:3e:2e:9d:6b:44:27:e2:73:fe: 3b:44:c5:96:fe:33:87:8e:2a:1f:85:0c:b0:aa:19:f4: d4:ab:5b:21:00:20:4c:2e:c7:c8:de:32:27:89:52:7b: 3a:36:94:7a:52:87:ee:af:99:ff:f8:75:72:76:0a:a5: 81:de:38:11:59:23:31:b0:6a:27:64:a9:f5:4c:72:09: e3:ba:1a:39:c4:b9:59:99:f9:ad:f8:9a:48:79:8c:c2: a3:d8:58:3b:f9:26:14:09:ad:37:bc:f7:f3:e9:02:96: 4d:ea:9e:b3:19:7d:c6:db:61:5a:47:f7:a6:17:2a:d0: 93:af:63:12:4e:d3:dc:3e:59:cb:c6:8b:ba:dc:70:c3: b2:7c:d3:d3:e4:ed:1c:7f:6b:21:c2:40:32:1c:d0:97: a3:ec:7a:fb:12:f6:81:a1:36:64:1f:9f:b3:89:aa:bf: 94:c2:93:96:9a:d5:94:eb:bd:05:31:b6:f0:35:cd:59: c9:75:aa:f8:fc:1a:57:94:4d:66:70:85:f2:ec:95:8b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:27:b2:93:b2:04:22:bf:df:e0:87:b8:ae:25:2e:15: e1:c9:1d:b7:08:19:1e:7c:df:89:a6:02:7e:e5:05:0e: 4c:40:21:11:42:cb:d9:ba:ec:73:f6:c9:ba:88:61:3c: d8:d4:26:18:7d:78:fa:2a:3c:9d:90:c9:c4:95:63:0d: 0b:bf:2e:d6:16:d1:13:93:4e:a2:40:7b:65:c4:f1:4b: 84:9b:1f:5f:4d:eb:72:73:ea:5f:cc:8d:03:ed:ef:f0: 34:1d:9d:8d:16:39:40:9f:6f:86:7a:fb:97:1e:e5:da: bc:d4:91:d7:28:cc:31:32:7a:d1:52:3c:28:9d:4e:ad: 2e:e5:6f:c8:76:01:d6:48:e1:53:fb:da:e9:7f:07:8e: 02:d6:b8:4f:ef:af:0e:cc:d2:a7:8c:3b:8c:78:f6:1f: df:26:92:c3:21:05:16:f1:3c:05:9d:33:3b:83:bc:bc: dd:d5:9b:f3:77:30:fe:54:ac:5c:1e:64:80:3b:70:d2: 25:fa:6b:39:2b:48:b2:d5:e0:ec:29:4a:83:75:3c:fa: 72:3a:d6:28:1a:b8:96:75:0c:c8:93:92:23:43:25:a6: 95:28:72:d3:92:44:0a:8a:a4:8e:23:06:d8:f8:2b:cd: cc:85:0f:71:3a:40:a5:46:ca:3e:78:ad:1e:12:6e:c0 Fingerprint (SHA-256): E1:26:6F:F3:AE:B2:FE:03:F2:6D:06:57:47:C3:10:A9:BE:02:0C:1A:BB:E6:DD:61:A3:F7:FC:9A:7B:79:05:B4 Fingerprint (SHA1): B0:A6:AE:28:A8:0D:EA:FE:5B:D0:3C:21:D8:42:3B:97:05:32:D4:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:3c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:20 2023 Not After : Tue Jun 20 21:12:20 2023 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:74:27:1d:ae:16:98:d6:5f:dd:dc:e3:df:9f:28:08: 51:f1:af:21:60:24:0f:77:e8:54:f5:7e:0e:e9:25:05: 19:d7:37:77:f3:ca:2a:65:45:7d:3a:32:d3:5c:cd:cc: 5d:24:c3:c5:b1:f2:79:66:01:f1:28:d0:20:d1:e8:48: 65:3d:3f:e7:1d:06:ff:07:5e:40:ae:22:ad:81:88:8e: 03:56:35:dc:1b:ee:09:b0:ea:b6:91:f4:60:0d:b5:8c: 59:c9:fb:0d:86:8b:d4:22:28:eb:e0:04:4c:5a:4a:e7: 50:7e:fc:1a:f3:a8:6f:e8:35:1c:ca:f7:b9:ff:96:ca: 44:1d:09:13:ab:d2:2f:27:53:6e:61:02:24:9d:8e:5d: fe:af:e0:d2:68:b9:25:70:e5:51:9e:80:ed:c6:9e:82: e3:e0:b9:2d:21:d0:b0:27:6d:3b:ea:21:83:7c:f5:51: 48:d3:a6:7a:24:06:2e:38:35:ca:a0:b6:28:82:a5:d9: 8f:5c:8c:22:20:ef:54:8d:8d:75:35:09:b5:1a:33:8d: 87:f3:bf:5a:90:c6:00:66:8c:6e:fb:f3:7c:5a:5c:91: 99:2c:03:5a:4f:ec:e3:9e:54:79:ee:cd:2d:9a:be:6a: 70:76:42:ce:8b:2a:ef:6e:cc:4e:6a:0e:1d:a4:9b:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:e8:42:8f:ba:b0:f1:df:bb:8a:b2:ed:e9:cd:f1:13: 9e:3b:32:d0:f6:85:b7:d1:d1:de:57:da:b8:4b:7b:b2: df:c3:de:bc:41:78:67:fb:0c:62:81:54:01:27:81:bd: 93:bf:89:57:44:d9:19:7e:5d:df:d4:56:0f:ff:70:21: 0a:ea:78:5f:a2:ac:3d:24:f2:e6:11:e2:bb:bc:57:31: 9e:e6:93:fe:28:79:4c:9c:69:06:71:c0:90:1c:80:f7: 57:c7:0c:f1:6c:92:fd:e1:79:11:c8:f0:e9:86:6a:43: dc:9b:cc:d1:de:56:2c:f2:ac:78:fb:b4:ed:47:c9:61: 34:9a:0e:a5:2f:e2:a2:fd:c8:f9:e1:28:67:31:c2:d5: b5:09:9c:a3:7b:6a:20:de:66:58:ce:3a:89:0f:f0:88: 5b:a8:a7:2a:ea:f4:6d:80:cd:46:68:66:e5:e7:07:eb: 3f:d1:c0:42:a1:b0:0d:61:d3:06:33:16:87:7a:bc:d6: 84:a6:44:fc:78:8a:03:58:ea:80:31:6a:f8:97:15:c6: ef:3d:09:b1:4b:16:71:56:a8:0b:5b:7c:7d:17:d0:92: 92:90:61:be:36:23:6f:96:87:fe:78:9b:27:81:15:5a: 8e:96:18:17:69:ef:44:70:e3:93:b6:8b:bd:05:fb:60 Fingerprint (SHA-256): AE:FF:7C:F8:9F:9D:D4:91:A0:6F:1C:72:4E:5D:19:3C:44:51:63:32:33:F3:7E:9A:D6:16:8C:23:0E:C7:AB:AC Fingerprint (SHA1): 34:0F:C1:41:CC:45:FF:93:33:F5:B3:17:10:54:49:C4:46:34:14:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:3d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:21 2023 Not After : Tue Jun 20 21:12:21 2023 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e5:fd:9f:35:34:8b:72:41:08:a4:94:cc:c0:3f:fa: cf:8a:2c:3f:3d:e9:71:9c:fc:f8:d2:d2:19:66:6f:e3: 77:ec:1f:8d:c2:3d:c5:0b:bc:35:ab:1b:fd:c2:48:ee: ec:11:65:7c:2c:da:bd:00:36:3e:e1:3a:c4:12:2a:27: 55:a7:d5:bb:9c:03:aa:46:61:c3:1c:1c:d9:e4:6a:b6: 79:7d:82:5c:13:89:6e:0c:a2:22:b5:57:d9:9b:b8:31: ca:9c:5d:95:39:6b:c2:2c:f9:d6:2b:69:c4:8d:83:85: e4:f0:ac:a2:73:64:a8:35:f3:b9:0a:17:fc:23:f6:e4: 40:c5:ce:9e:08:e9:22:72:d6:d0:0f:81:17:6f:f5:a5: 35:0e:69:34:d9:70:66:bf:54:d9:1d:11:3e:07:29:64: 48:ae:65:9f:4b:54:67:14:5b:a6:6c:d0:1d:f0:be:29: f0:01:c0:da:51:70:98:f4:9a:2c:23:13:d6:3a:f1:8d: 3a:a8:bd:2c:f9:42:de:ea:fe:09:95:47:67:80:f8:48: d0:bb:76:7f:bd:bc:9e:8f:41:1b:83:48:49:69:b2:82: 1b:b8:28:bd:2d:1b:9f:76:f5:63:11:e5:be:34:d0:86: a5:65:a2:ee:37:2b:35:61:5c:3c:5d:26:6d:bd:19:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:cd:f7:f2:b8:b4:bc:f5:68:bc:1e:e9:a8:07:08:51: d9:a5:9f:19:e3:7d:9b:e9:19:23:ab:00:3d:cc:37:fd: dd:14:ee:5c:ff:e5:6c:63:58:af:db:8d:ae:1c:cc:0c: 80:16:47:eb:b2:b7:39:ce:46:d1:84:91:c5:56:aa:64: d8:60:4f:21:55:b8:42:dd:53:1f:bc:25:ab:c5:71:9f: 6b:99:f6:e4:ec:66:74:0b:df:ba:fd:1e:f8:df:e7:d5: f5:5e:75:ad:2b:6a:e1:cd:54:ce:8b:c6:0e:05:9a:5a: fc:72:a0:56:eb:90:ce:d6:dc:ea:81:0e:da:11:bf:58: 7e:f5:d8:ef:41:66:ce:b9:78:35:7d:ff:3d:b3:86:c4: 0c:59:b1:20:90:88:f9:ea:f1:62:65:33:ef:3d:4e:61: 87:e7:c3:19:b1:34:1e:ca:79:cc:7a:ab:d3:f9:99:11: 5e:86:0a:9b:ef:73:6b:a3:fc:4d:90:ef:e3:7b:fd:da: 4a:bb:84:0c:db:6c:c9:79:37:74:2c:ba:b5:ff:9b:49: eb:5c:68:23:5f:f5:35:92:1f:84:d5:57:3e:75:55:4c: e5:da:fa:ba:12:29:bc:bf:98:1b:48:af:57:88:8c:61: 9b:ac:77:d9:c5:45:df:c2:71:71:cf:4a:25:d0:06:d9 Fingerprint (SHA-256): 30:10:07:49:94:BE:3B:A2:30:9E:56:C4:30:63:79:9E:96:C4:88:30:C6:F7:59:ED:BC:E0:49:72:7C:9B:BA:5E Fingerprint (SHA1): B9:8D:64:A2:14:DF:AD:19:79:D2:C2:D7:81:6C:E1:F6:21:32:AC:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:40 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 21:12:23 2023 Not After : Tue Jun 20 21:12:23 2023 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:13:fd:7d:3a:a0:d9:87:4c:91:f6:a0:cb:21:d3:a4: 09:7a:39:30:4b:9a:43:23:79:e4:65:7a:67:06:fd:ca: 71:14:62:be:ff:56:51:47:73:58:f0:23:f7:52:7f:33: e4:83:c5:a9:eb:53:29:e2:cf:b5:a1:c1:e7:ba:7e:bd: 44:18:99:f0:50:4e:24:09:69:2e:3f:6a:5f:81:49:71: 53:23:65:0d:84:89:c1:53:6e:37:6d:fb:c5:dd:cd:11: 99:f6:84:6b:d7:dd:8b:62:31:eb:ea:af:35:ca:9b:67: 2e:dc:b7:d6:1d:7d:3e:c3:67:85:90:cf:f9:e1:c4:e7: e8:85:17:ec:23:2d:d2:ef:9b:75:17:ab:2a:2d:28:c5: 30:74:b9:cc:7d:80:2e:db:f1:0c:35:bf:ba:69:d2:08: 46:90:74:63:f7:34:47:80:e7:3c:c7:54:9e:47:7f:37: 2f:45:17:b1:eb:44:94:63:b9:03:b6:e9:ae:da:23:9b: 83:4f:e1:08:55:2f:69:4d:6b:b3:0b:8d:5e:b1:3d:7b: e4:f2:e8:17:ef:2a:a2:64:ee:14:09:ee:96:9b:82:db: 37:4a:ab:f1:7e:b2:55:61:58:6f:30:85:33:28:99:d5: f1:9f:e2:5d:b3:4e:22:99:b8:66:d0:11:8e:0b:77:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:ae:b6:e5:eb:66:8b:ab:65:71:32:45:9d:a6:e4:ed: 9d:65:ba:a9:26:0d:67:6b:54:54:4d:93:a5:6d:07:da: 75:bb:79:a8:b4:06:f9:db:4e:89:7c:1f:b2:59:bd:7a: 88:c6:76:c8:b0:78:a4:5f:af:31:3f:c9:bc:0a:2c:86: 6d:2b:1b:57:e9:cd:13:bb:bc:dd:d8:9a:75:fa:a7:e3: ae:89:75:f2:b1:c8:fd:ea:83:73:a8:c4:28:25:8e:c1: f1:bc:39:2b:96:bb:e7:8d:66:05:da:cb:bb:3d:3f:bb: 5f:59:23:24:7d:23:d8:80:7c:11:3e:4c:e7:f0:3b:13: 90:b5:50:5e:cf:d1:1e:5f:e1:b3:bc:ab:75:59:1e:36: 0a:4a:ab:5f:b8:4b:34:e5:eb:95:3d:e5:ee:dd:97:dc: 91:85:e2:e2:c5:91:84:c4:23:c6:16:85:c8:03:64:3c: 0b:eb:33:81:6d:49:8d:31:b9:e9:b5:d1:f3:c3:ec:a1: 14:25:9f:0a:f2:cd:90:49:bf:7f:bf:40:98:38:32:75: 15:6d:f4:83:49:0e:c4:b2:11:a5:1d:ce:64:06:2c:7b: 93:6a:6a:01:d9:bf:6d:be:6f:2a:0e:eb:6e:8a:fc:09: 2e:e7:87:4b:da:bf:fd:6a:6a:85:27:d2:c3:29:4a:d2 Fingerprint (SHA-256): 5D:F1:51:1A:A2:33:B9:0B:99:3C:1D:30:A3:F8:23:25:CC:7D:C7:91:E5:28:56:27:BC:D8:18:74:76:76:77:A1 Fingerprint (SHA1): 97:36:93:2F:2B:DF:2A:81:01:92:2B:DF:CC:78:7B:62:53:A5:FE:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:46 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 21:12:26 2023 Not After : Tue Jun 20 21:12:26 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:df:db:e3:55:a3:3a:bf:43:82:dd:13:1f:49:9e:92: 0d:42:a2:24:36:b5:c0:2f:0b:4f:88:2e:c5:3f:94:97: 04:b5:fd:d8:57:6c:f6:59:b8:dc:12:fe:80:db:57:c7: 5b:59:04:a4:f3:01:7e:5e:dd:08:cd:a4:04:1a:b9:1d: b6:f5:83:de:99:12:48:79:23:a3:9e:18:5d:7f:9e:8f: 52:d2:2b:a5:4a:e2:71:14:05:67:41:01:9e:01:dd:a0: 24:ed:fd:99:7f:73:77:28:fc:bb:7f:57:3e:e2:5e:f0: 99:f8:c8:a2:06:a6:00:e7:7c:c7:81:ba:ea:e4:6b:2d: e1:d3:ff:e3:8c:27:73:61:a7:14:ba:35:af:ab:a9:e0: f2:11:f6:ba:c6:69:95:2a:1b:51:da:23:16:66:5c:5e: 7b:d0:7a:08:cf:af:47:a8:46:3d:c2:ce:48:03:b7:12: a8:2d:48:8e:8d:9d:16:6b:1d:1f:46:70:90:2d:a6:86: 8c:a4:3a:e3:25:6b:d7:68:27:14:57:d2:f5:27:53:b7: 70:41:87:17:29:4e:0a:68:26:a3:3c:7e:b4:7c:04:d6: 0d:4d:6b:ca:5f:d9:41:34:ec:66:83:9d:f0:46:56:7a: 70:b5:fb:bb:c4:10:2f:6a:83:ef:4a:62:b2:f5:3a:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:c9:56:b1:c5:db:a4:cb:85:ec:4f:53:cc:23:f2:95: d5:73:8e:9d:e0:08:f1:4e:e0:b0:b5:77:e2:d1:2a:2c: b8:d5:85:62:28:31:4b:df:d5:13:70:13:79:3c:a1:50: 10:3e:2b:8b:d5:bb:53:59:c4:31:fa:54:17:40:aa:46: 31:00:89:b0:c2:79:1e:d7:35:70:8e:d3:24:e8:bc:56: 6a:7c:6b:c0:f4:e7:dc:ae:ba:a9:f0:4a:b0:f7:17:d2: 46:7b:25:75:bd:31:ec:05:40:1c:0a:4d:49:5b:93:55: 72:c1:82:23:34:03:10:23:f2:62:a4:20:18:d4:3d:4a: 40:40:39:f4:ce:cb:fc:2c:a0:45:4a:fb:7c:ee:2e:92: 07:b4:8b:29:dc:68:8e:bd:bf:3b:3a:27:27:d8:14:d0: 70:da:fb:6f:8b:fb:1f:ea:6f:36:cd:1c:7b:75:d2:85: 34:77:47:fd:7d:be:23:c4:6d:80:f7:34:a1:c3:8b:ee: 53:d9:5c:1c:54:43:b9:1d:e1:f5:2f:aa:8b:10:59:88: c4:d0:a2:4f:d6:53:6c:e1:3d:da:80:3f:4c:68:b3:77: b3:1b:d9:d1:ef:af:dd:11:2d:07:95:f7:05:46:1b:73: 0b:cc:a5:3b:15:24:fe:a6:b8:5e:ad:10:76:c5:d7:4d Fingerprint (SHA-256): 81:DD:E3:A0:A9:D8:84:3D:FE:B4:74:32:08:F0:93:62:EE:A3:97:52:C3:BF:27:2E:CE:0C:80:FF:07:BA:41:19 Fingerprint (SHA1): B1:A5:0E:CF:A8:EF:06:38:76:2C:2C:9B:34:AD:22:C7:14:DF:6D:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:6c:4f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 21:12:30 2023 Not After : Tue Jun 20 21:12:30 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:0a:22:06:4a:8e:53:d5:5c:8b:cd:08:a3:e1:59:88: 64:77:69:5c:4f:10:90:7b:22:22:35:67:19:ad:4c:60: 95:48:c1:dd:e4:ac:26:92:9a:38:7f:da:97:16:4a:de: 86:50:1f:78:2b:65:24:70:35:77:f2:5a:13:5a:09:0f: 86:90:47:f0:e8:cd:d9:b5:3e:ed:be:72:0b:92:a0:b0: 08:e2:66:0b:11:07:bc:86:c2:aa:63:58:47:6e:ce:b6: b6:52:7e:02:ca:f9:e8:4e:b3:ab:e0:6d:7e:24:fd:39: 57:b0:cb:7a:6b:51:00:04:7b:01:2f:d1:e9:07:30:f5: ba:af:0c:74:5d:2c:9b:1d:34:85:6f:5d:32:48:d9:e6: bf:63:27:c5:c2:36:7b:01:49:3a:e3:1c:97:91:71:82: 48:9e:18:b5:18:64:dc:62:b7:43:d7:d4:58:bb:1f:c1: 83:b4:62:e1:fb:e5:9b:23:04:63:43:79:30:fd:9c:f7: 34:59:33:19:b2:dd:9f:14:85:b1:ce:7d:be:e9:5b:a0: b6:96:20:ed:39:76:d3:52:73:64:dc:36:45:c9:ab:0f: 67:ae:96:d9:f5:2e:af:a3:0b:bc:71:b7:93:f3:ee:84: 96:ff:aa:c2:62:38:57:f9:7c:2e:be:96:fc:29:5b:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:27:6f:02:3d:0c:dc:09:a4:87:00:55:ed:50:57:bb: 40:54:7d:1b:a2:a8:d1:ec:b1:ef:d8:8c:49:ca:34:26: 67:9d:2b:1d:3f:94:9e:cc:8f:53:c3:47:38:a0:07:b7: 60:53:a8:d9:b8:16:20:25:61:8f:04:e6:c3:75:b0:1d: 79:80:a8:41:fe:3e:98:9d:a8:c7:66:73:10:93:20:e0: 37:12:7e:ac:23:bb:44:4f:ce:63:8a:d3:dd:e1:b3:d6: ea:70:4e:14:20:e7:2d:03:e8:48:83:fa:37:77:d2:ed: 6a:98:85:11:46:01:97:02:d2:90:a7:28:cd:14:7a:27: 89:a1:f0:91:4d:0c:56:6c:b5:a8:62:53:1d:0a:9d:96: f4:5a:0e:1d:34:42:e7:43:4e:6a:39:50:73:81:34:9b: ce:5b:51:87:7a:2d:b4:14:02:f3:be:fa:33:b5:cf:e6: 4f:cb:99:00:b6:1e:df:e1:f7:cf:6c:de:25:49:f4:25: 2a:66:96:02:b3:b7:8c:51:d1:84:d7:d5:bb:a2:1f:90: 9c:9e:ad:78:92:72:2f:ac:91:07:7c:8a:cb:5e:26:f5: 30:c1:bb:89:b9:8d:55:17:4c:6a:4b:a6:ce:51:d4:07: 57:bb:18:7b:c9:03:42:2f:fb:a5:b2:7e:ec:db:f4:70 Fingerprint (SHA-256): 88:6B:CD:59:63:5D:7E:1C:22:2B:A9:DC:62:55:F7:33:63:FE:77:78:73:48:5F:D4:76:D6:76:5E:F8:16:7E:51 Fingerprint (SHA1): F8:CF:83:9A:C5:E9:A3:7C:B0:4A:56:B1:FF:D4:7D:E5:25:C4:AD:ED Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 808e78ad5a59f9e80ad80b70f21548285ed17320 NSS Certificate DB:localhost.localdomain < 1> dsa 56c02834ad83379d42efe994a90f3d4017ee7343 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa f4b4b9ad257fcff63845ece91cfd44fd47e4c4e2 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 0adf1c081a86e1a6ece6395e7c147ea39cc63898 NSS Certificate DB:localhost.localdomain-ec < 4> ec 1df1ce3f785cd91e9fd9d9db6f2b0f0560aba748 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa 6876f317211d63c5edff474a84cb756261bac580 NSS Certificate DB:localhost-sni.localdomain < 7> dsa 94847a78c50753fdaec488b1020aca63d01ceabb NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 09d1cb73b9ba4925d54bf0a50240126ef7bec253 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec e173a80fb50f85e9aaab9a26b16c20b1dada4c22 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 6b3fc8ad6ef237704e90cf836a8916b4b6d55420 NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 8701660f98466d4294c61246e77970374f25f50f (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 20 21:14:49 UTC 2023 Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Mar 20 21:14:49 UTC 2023 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1227 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1426 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 582 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 244736 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 152576 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 623 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 728 Mar 20 21:14 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:37 2023 Not After : Mon Mar 20 21:11:37 2028 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:42:6b:e4:07:33:fb:f9:4c:83:5b:b7:6a:07:ab:04: ad:1a:62:8b:3c:32:4a:84:20:e3:08:2d:6f:bf:ac:80: c9:6c:b8:e7:99:05:66:be:68:93:3c:76:ef:75:10:df: c6:da:d2:0a:19:a3:e9:14:58:19:d0:0b:d0:dc:66:4f: e4:3a:b0:9a:67:95:e3:45:31:3c:6d:1f:f7:23:20:dc: c5:85:d9:b2:fd:b1:48:e0:06:81:a4:26:c7:7c:63:88: 53:fc:2a:c0:29:68:b2:aa:d5:25:5c:9f:e9:23:41:fd: 69:b5:51:14:0e:3c:c0:c7:da:4f:b0:0a:33:e3:dd:cd: 53:66:7b:69:ed:eb:07:86:21:2a:b4:63:ad:85:70:a6: 61:ad:ca:b5:52:28:d3:8f:4c:20:64:d8:d7:b2:10:87: 5a:df:50:c0:50:3e:b9:05:f4:41:d5:97:13:a7:cf:b3: ed:d8:46:a7:96:cb:77:c2:0e:c3:da:8e:d6:47:a7:7e: e6:16:c1:28:ab:ef:9b:a1:1e:eb:30:13:ff:a4:7c:c0: 65:60:c5:1b:b7:b0:59:b7:70:e7:cb:fb:09:f1:dc:cc: 5d:e4:fc:51:f1:ea:7a:90:86:08:34:d7:f2:b7:ad:da: c1:87:ae:81:e2:88:df:31:63:94:bc:7a:e5:fd:00:37 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:26:17:58:cb:bc:04:36:72:d7:20:4f:f6:1b:08:c5: ee:00:04:24:2c:b1:3b:78:86:94:14:98:1d:8b:9b:be: 38:19:2d:d9:43:44:d5:16:4c:11:20:2d:1d:8d:46:62: ab:f3:cf:f1:85:1e:83:19:87:1c:a3:7d:a8:b0:ee:a7: 36:5a:79:d3:5d:0d:ee:54:df:67:ad:57:10:c4:8b:5c: c1:0f:47:69:d7:d7:64:a5:35:73:a1:eb:ff:51:63:3f: 3e:65:c4:98:9e:07:3a:ff:e6:81:80:d6:ef:1c:e0:12: 9f:f8:fe:7a:1e:dc:ae:e8:93:8c:3e:63:22:99:0d:3d: 2f:be:02:6f:0e:1a:dd:ab:f1:14:70:be:35:3f:7d:56: f6:d6:4d:85:3f:3b:aa:59:8d:5a:a8:6d:80:3b:01:46: e9:4f:a4:2a:49:b5:0f:67:b1:d8:ff:6b:d3:d1:5d:f5: 9c:65:e8:88:cb:7c:fe:80:7f:59:c3:af:41:9e:23:9d: d5:ca:c0:5e:31:df:97:c4:9b:51:23:c0:5f:4c:89:91: 13:cf:0a:1c:0f:50:27:eb:37:7b:c4:a1:3b:f9:cb:a9: f3:15:9f:8f:03:7b:c5:9c:3c:eb:1d:28:88:5f:e2:a0: d7:ff:6b:19:94:73:8a:d8:96:2b:ec:e6:ee:4d:e9:ea Fingerprint (SHA-256): 82:A1:A7:5D:31:62:D8:A4:89:EE:F7:3D:33:40:F8:AD:ED:6A:7B:9D:60:5F:BD:32:0F:DD:B5:B6:51:27:48:DE Fingerprint (SHA1): 76:C7:0D:F9:B5:76:5A:60:15:E5:92:56:F5:76:1F:02:D8:96:FC:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { aa, 6f, 57, e6, ab, ca, 25, 3a, 3b, 07, e5, 42, 98, 94, 72, 91 a7, 83, cb, 74, aa, 7d, 8c, e8, 37, 24, 4d, 5c, 74, 76, a1, 89 03, b3, 9f, 64, 95, e0, da, c4, f4, 9a, 1b, 85, cb, 9a, 26, 96 43, 0e, 11, ca, 5c, 33, 50, ea, 12, cc, 83, f0, 71, 77, 17, 67 4e, 1d, 0f, 77, 1f, 96, 9e, b2, 9b, 20, d0, 7c, 98, 7c, c5, 48 72, 0b, 66, 4f, 7e, cc, 3c, b9, 76, 0e, fd, a6, bb, 30, 2a, 9b fd, 59, b5, ce, 66, dc, 6f, 14, bb, 8f, dd, 3d, 99, 15, dd, c1 ae, a8, 2e, 62, 4f, ad, fa, 63, 43, 16, 42, 40, 50, 33, 62, db}; privKey CKA_ID = [20 bytes] { 33, 7d, 14, eb, 09, 74, c9, 2e, 52, 7b, d7, aa, 00, 26, 74, 47 4d, f4, 6d, 97}; pubKey CKA_ID = [20 bytes] { 33, 7d, 14, eb, 09, 74, c9, 2e, 52, 7b, d7, aa, 00, 26, 74, 47 4d, f4, 6d, 97}; matching public key found pubValue = [128 bytes] { 0d, 8a, c6, 20, dc, d0, 4e, 43, 88, 5a, 9d, ca, 3c, 50, 9e, b0 0e, a8, f5, b0, ab, 63, 97, 4b, 45, f4, 35, 9f, 08, 3e, 59, 9f 41, a8, e7, 60, c3, da, 60, 85, c4, 18, 54, df, e0, 0c, 37, 92 8b, 62, a6, e8, 8c, b4, 88, f6, 36, ad, 81, 2f, 03, ea, 26, 88 04, d7, 1d, 60, bd, 46, 31, bd, ba, 07, f9, 16, e9, 1e, f5, 5e bb, 39, ac, 8f, 1c, c9, db, 71, 46, dd, 6f, 4e, 0d, 44, 4d, 26 e6, 00, e7, 6a, 47, 46, 76, b6, a9, ba, c7, c4, 84, 23, 0b, 66 a4, 76, bb, 16, 85, 7a, aa, a9, 4b, 60, 9f, fe, 7a, b2, 91, 52}; privKey CKA_ID = [20 bytes] { 53, 0e, c0, f1, d9, 9f, ec, d2, e3, 02, a9, f2, 25, c4, f9, bc 6a, 39, 35, f0}; pubKey CKA_ID = [20 bytes] { 33, 7d, 14, eb, 09, 74, c9, 2e, 52, 7b, d7, aa, 00, 26, 74, 47 4d, f4, 6d, 97}; pubKey CKA_ID = [20 bytes] { 53, 0e, c0, f1, d9, 9f, ec, d2, e3, 02, a9, f2, 25, c4, f9, bc 6a, 39, 35, f0}; matching public key found pubValue = [65 bytes] { 04, b9, 54, 2d, bc, 25, 4b, 5e, d3, ec, bf, 7e, dd, 7b, 27, 76 a6, 67, 1f, cb, df, 5c, 9a, 54, 12, 73, 75, 3d, f9, 39, 6d, 64 34, 07, f9, e6, 6a, 86, 9e, 6f, 6a, d6, a8, 6d, 10, c3, 03, 74 62, 14, 87, 52, b5, fe, 4f, c5, 81, dc, 5e, de, 5e, dc, 6d, 92 0b}; privKey CKA_ID = [20 bytes] { 5f, c9, 03, e0, 57, 2e, 28, 54, 9c, 31, 1d, d7, f4, 21, b2, d2 8e, 73, 0b, ad}; pubKey CKA_ID = [20 bytes] { 33, 7d, 14, eb, 09, 74, c9, 2e, 52, 7b, d7, aa, 00, 26, 74, 47 4d, f4, 6d, 97}; pubKey CKA_ID = [20 bytes] { 53, 0e, c0, f1, d9, 9f, ec, d2, e3, 02, a9, f2, 25, c4, f9, bc 6a, 39, 35, f0}; pubKey CKA_ID = [20 bytes] { 5f, c9, 03, e0, 57, 2e, 28, 54, 9c, 31, 1d, d7, f4, 21, b2, d2 8e, 73, 0b, ad}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 337d14eb0974c92e527bd7aa002674474df46d97 testKey < 1> dsa 530ec0f1d99fecd2e302a9f225c4f9bc6a3935f0 testKey < 2> ec 5fc903e0572e28549c311dd7f421b2d28e730bad testKey --------------------------------------------------------------- | testing if key corruption is detected in attribute 120 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000120 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420DDB078B1C5827C88C47F53C1BE1E43D38449FE7834B2730D7BA03B68759FFC7A02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420626C36E21F28C35937DCC711EA0BF8AF76B077D67BEFF84F715AC134F1647E9D to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420DDB078B1C5827C88C47F53C1BE1E43D38449FE7834B2730D7BA03B68759FFC7A02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420626C36E21F28C35937DCC711EA0BF8AF76B077D67BEFF84F715AC134F1647E9E /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert 337d14eb0974c92e527bd7aa002674474df46d97: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #17: Corrupted key attribute 120 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 122 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000122 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042092C28578AD6BDCB00D62DB4A35D49EFF431354F306249851BD47C18009F7034F02022710020120300A06082A864886F70D0209300A06082A864886F70D020904202614F2ADE93871D51105E6F2828EE8F178DE970F2AB398C8869711D35B0BDAAE to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042092C28578AD6BDCB00D62DB4A35D49EFF431354F306249851BD47C18009F7034F02022710020120300A06082A864886F70D0209300A06082A864886F70D020904202614F2ADE93871D51105E6F2828EE8F178DE970F2AB398C8869711D35B0BDAAF /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert 337d14eb0974c92e527bd7aa002674474df46d97: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #18: Corrupted key attribute 122 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 123 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000123 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504200CBF78708A702EC2B92F440F9366C7AF408B6B94944B06E9AF9754E4D25BC8C002022710020120300A06082A864886F70D0209300A06082A864886F70D020904205D9CEE94A6851FEC80110BEA99A237D9CDD730281ED9634B0663C58FB98EB3B9 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504200CBF78708A702EC2B92F440F9366C7AF408B6B94944B06E9AF9754E4D25BC8C002022710020120300A06082A864886F70D0209300A06082A864886F70D020904205D9CEE94A6851FEC80110BEA99A237D9CDD730281ED9634B0663C58FB98EB3Ba /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #19: Corrupted key attribute 123 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 124 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000124 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420CC879F0D1621E7051A3BDF4946E3409FC349FFC2AA9D195C4A02A2C2F06BE58F02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420E9CE72168CDCEAD8E3E14F1849DAB25412C5D977BD70AEA9A10663605C9B30CE to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420CC879F0D1621E7051A3BDF4946E3409FC349FFC2AA9D195C4A02A2C2F06BE58F02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420E9CE72168CDCEAD8E3E14F1849DAB25412C5D977BD70AEA9A10663605C9B30CF /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #20: Corrupted key attribute 124 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 125 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000125 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420DFEEE8197A3DA357A58DA0A80E8CC8BE15B81186B7205CB62FEB60F446B7312C02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420A60155AD29E325AB9373CB01A1AB87F3BCBF7B4435AB11D862896E2F01742D8A to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420DFEEE8197A3DA357A58DA0A80E8CC8BE15B81186B7205CB62FEB60F446B7312C02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420A60155AD29E325AB9373CB01A1AB87F3BCBF7B4435AB11D862896E2F01742D8B /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #21: Corrupted key attribute 125 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 126 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000126 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420700DE6B4CBB2E7C5370C7C6DB2AB5483484AC817F7EDD3B6C771658626D3CD9102022710020120300A06082A864886F70D0209300A06082A864886F70D020904209B1D148E47D634801BE5EF3857DD5DDD913DBFC87FC0184CCEFC2F1F9557BFF6 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420700DE6B4CBB2E7C5370C7C6DB2AB5483484AC817F7EDD3B6C771658626D3CD9102022710020120300A06082A864886F70D0209300A06082A864886F70D020904209B1D148E47D634801BE5EF3857DD5DDD913DBFC87FC0184CCEFC2F1F9557BFF7 /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #22: Corrupted key attribute 126 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 127 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000127 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420907BAEED43445CD918950D816391B9E6614CFE14F0B87D5843493A6CFADD6CEB02022710020120300A06082A864886F70D0209300A06082A864886F70D020904202C5618447CC2CF0FEB065E2C33EA1D41A1428E39EC35F23F2F131C5A277D34D5 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420907BAEED43445CD918950D816391B9E6614CFE14F0B87D5843493A6CFADD6CEB02022710020120300A06082A864886F70D0209300A06082A864886F70D020904202C5618447CC2CF0FEB065E2C33EA1D41A1428E39EC35F23F2F131C5A277D34D6 /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #23: Corrupted key attribute 127 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 128 --------------------------------------------------------------- amending sig_key_2b0aa4dc_00000128 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504202B2B87B7736ED657E61D1E532B09893551E3BB86B28CA56E946564AC6E4FDF8B02022710020120300A06082A864886F70D0209300A06082A864886F70D020904202FDA656C61F8AB2A9063B0C9A1256E8B915B210276250D3D59982A4CC969142B to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504202B2B87B7736ED657E61D1E532B09893551E3BB86B28CA56E946564AC6E4FDF8B02022710020120300A06082A864886F70D0209300A06082A864886F70D020904202FDA656C61F8AB2A9063B0C9A1256E8B915B210276250D3D59982A4CC969142C /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 337d14eb0974c92e527bd7aa002674474df46d97 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #24: Corrupted key attribute 128 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 011 --------------------------------------------------------------- amending sig_key_2b0aa4de_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042024BE75E7BA22C6F7A7A3B90C1AE2F8985480A8936AD83A7C9E1FD0616C64479F02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C8F17183D4DFFAEE5F6B5918030E31DB560CF9BC03E9A710122E1818FB1FEE0F to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042024BE75E7BA22C6F7A7A3B90C1AE2F8985480A8936AD83A7C9E1FD0616C64479F02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C8F17183D4DFFAEE5F6B5918030E31DB560CF9BC03E9A710122E1818FB1FEE00 amending sig_key_2b0aa4e0_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420598385BDAD7C72CF945188CBCA352BCAEAF24A0025D67D5FFF89F9E2FBCDE10E02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420268741AB4216ACC4D3D90ADBDF931B7EA6AC9C0EFA45E92FEB334BDE067C3E8B to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420598385BDAD7C72CF945188CBCA352BCAEAF24A0025D67D5FFF89F9E2FBCDE10E02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420268741AB4216ACC4D3D90ADBDF931B7EA6AC9C0EFA45E92FEB334BDE067C3E8C /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 5fc903e0572e28549c311dd7f421b2d28e730bad -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_NO_MEMORY: security library: memory allocation failure. dbtests.sh: #25: Corrupted key attribute 011 correctly disabled key - PASSED --------------------------------------------------------------- | testing for thread starvation while creating keys --------------------------------------------------------------- creating 30 threads - thread 1 starting - thread 3 starting - thread 2 starting - thread 5 starting - thread 4 starting - thread 6 starting - thread 0 starting - thread 7 starting - thread 8 starting - thread 9 starting - thread 10 starting - thread 11 starting - thread 12 starting - thread 13 starting - thread 14 starting - thread 15 starting - thread 16 starting - thread 17 starting - thread 18 starting - thread 19 starting - thread 20 starting - thread 21 starting - thread 23 starting - thread 22 starting - thread 24 starting - thread 25 starting - thread 26 starting - thread 27 starting - thread 28 starting waiting on 30 threads - thread 29 starting * thread 5 ending with 0 failures * thread 27 ending with 0 failures * thread 6 ending with 0 failures * thread 18 ending with 0 failures * thread 26 ending with 0 failures * thread 2 ending with 0 failures * thread 10 ending with 0 failures * thread 16 ending with 0 failures * thread 0 ending with 0 failures * thread 24 ending with 0 failures * thread 7 ending with 0 failures * thread 8 ending with 0 failures * thread 17 ending with 0 failures * thread 19 ending with 0 failures * thread 25 ending with 0 failures * thread 12 ending with 0 failures * thread 3 ending with 0 failures * thread 22 ending with 0 failures * thread 21 ending with 0 failures * thread 23 ending with 0 failures * thread 1 ending with 0 failures * thread 9 ending with 0 failures * thread 11 ending with 0 failures * thread 14 ending with 0 failures * thread 13 ending with 0 failures * thread 15 ending with 0 failures * thread 28 ending with 0 failures * thread 4 ending with 0 failures * thread 29 ending with 0 failures * thread 20 ending with 0 failures 0 failures and 0 errors found dbtests.sh: #26: Successfully completed 7 loops in 30 threads without failure. - PASSED TIMESTAMP dbtests END: Mon Mar 20 21:15:20 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 20 21:15:20 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:d1:05:b2:7b:0e:9e:ea:79:b3:6f:63:d8:2b:4d:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:bb:aa:16:4a:c4:7d:ba:3c:ee:18:1a:d9:ac:04:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 21:10:34 2023 Not After : Mon Mar 20 21:10:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:fe:9b:d4:c5:47:35:fd:fd:eb:39:84:b8:dc:70: 77:48:55:39:f6:e3:63:a8:c5:43:6f:ad:44:50:bd:cc: eb:4e:8b:ec:d5:40:88:61:27:ef:bc:bf:8d:15:e9:2d: f6:22:9d:89:81:2b:a1:53:f4:ca:54:6b:ff:39:50:f0: 89:59:dc:01:c4:54:a8:cf:eb:b5:82:45:fc:38:39:4b: a9:3e:36:8a:24:25:40:5f:1b:ac:9d:50:bc:d9:28:b6: 5e:72:97:c6:ec:66:5a:78:e5:f7:c6:9f:bc:f9:ed:fd: c7:bd:3d:16:12:43:fb:d9:dc:85:cf:8e:20:8c:2c:7f: 28:31:e2:61:b1 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:d6:fd:ec:61:d2:09:30:a5:ef:67: 00:27:8f:17:9f:a3:66:6b:16:9c:c4:75:91:51:42:ef: 3f:a5:76:37:e1:14:f2:40:b2:b9:18:fb:72:1c:5c:d2: 1a:4b:83:4b:f8:1d:e1:2d:68:aa:9b:71:f9:96:ab:ef: 91:3b:db:67:7c:86:0e:02:42:00:b4:68:cb:64:10:39: 04:09:04:b9:b9:e7:3d:11:90:0a:36:e7:72:ff:4f:f7: 1e:11:e2:2d:9f:83:f4:8b:e5:c9:f9:dd:75:18:bd:b5: 64:2b:3d:e5:e2:c6:ff:08:1b:54:ca:01:ea:2d:59:1d: 97:a7:1c:23:1e:6b:46:89:71:3e:36 Fingerprint (SHA-256): 43:FF:99:24:6C:EC:11:1B:AF:77:5F:EE:A6:66:36:15:5B:7B:E6:5D:E5:92:0E:3C:41:74:9D:91:4A:89:7C:3A Fingerprint (SHA1): 1B:5B:75:92:64:27:9E:83:2D:43:F6:AB:5C:11:78:0A:9C:4F:A4:19 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 21:11:32 2023 Not After : Mon Mar 20 21:11:32 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:9d:8b:74:b4:3e:a3:41:e2:82:55:9a:00:72:0c:d4: b3:62:31:a1:4d:27:03:30:90:01:e7:6d:c1:96:2e:0d: 2b:ac:54:36:b2:15:f5:90:2c:19:b7:16:2b:eb:9c:d7: af:f0:bb:ae:fd:f0:fb:dc:ca:a5:24:42:af:6b:85:bf: 69:b4:b1:40:3e:c9:40:3e:e2:86:e8:ec:ae:f6:a6:f1: 1f:ab:ef:be:b6:a6:ca:db:f0:de:a7:ae:9b:53:ef:ff: d2 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:c2:94:14:eb:23:a4:37:a0:59:3e: f8:9f:2a:e9:78:c2:65:59:aa:a3:37:31:6f:0a:0c:b4: 34:49:e1:49:99:47:b0:59:ae:c4:59:c8:38:a3:fe:05: cb:cb:a0:b5:38:69:14:a8:09:8c:45:ce:b8:72:cc:ca: e0:3a:e0:69:39:75:15:02:42:01:e9:94:0b:3a:46:81: 7a:2f:a1:0d:f0:8a:db:38:86:ca:40:45:a2:5a:b4:2c: c0:6b:c0:06:85:29:c4:f5:dd:d5:ef:3b:99:d7:ba:83: ba:d6:48:bd:44:84:dd:06:9a:9d:35:3e:52:81:67:14: 6c:46:9b:44:ca:49:ff:4b:de:d0:89 Fingerprint (SHA-256): 79:64:13:09:AB:4C:4A:28:67:06:6E:9D:F3:39:90:27:D1:17:6C:5F:1D:51:70:0B:80:0E:31:E4:F2:BB:19:E9 Fingerprint (SHA1): 1F:CC:44:0B:DC:BA:6C:B6:84:D4:EE:08:23:3C:7F:0B:43:16:64:44 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 71:a7:44:11:76:e6:e3:00:01:cc:e2:b4:9a:0a:21:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 21:10:34 2023 Not After : Mon Mar 20 21:10:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:fe:9b:d4:c5:47:35:fd:fd:eb:39:84:b8:dc:70: 77:48:55:39:f6:e3:63:a8:c5:43:6f:ad:44:50:bd:cc: eb:4e:8b:ec:d5:40:88:61:27:ef:bc:bf:8d:15:e9:2d: f6:22:9d:89:81:2b:a1:53:f4:ca:54:6b:ff:39:50:f0: 89:59:dc:01:c4:54:a8:cf:eb:b5:82:45:fc:38:39:4b: a9:3e:36:8a:24:25:40:5f:1b:ac:9d:50:bc:d9:28:b6: 5e:72:97:c6:ec:66:5a:78:e5:f7:c6:9f:bc:f9:ed:fd: c7:bd:3d:16:12:43:fb:d9:dc:85:cf:8e:20:8c:2c:7f: 28:31:e2:61:b1 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:d6:fd:ec:61:d2:09:30:a5:ef:67: 00:27:8f:17:9f:a3:66:6b:16:9c:c4:75:91:51:42:ef: 3f:a5:76:37:e1:14:f2:40:b2:b9:18:fb:72:1c:5c:d2: 1a:4b:83:4b:f8:1d:e1:2d:68:aa:9b:71:f9:96:ab:ef: 91:3b:db:67:7c:86:0e:02:42:00:b4:68:cb:64:10:39: 04:09:04:b9:b9:e7:3d:11:90:0a:36:e7:72:ff:4f:f7: 1e:11:e2:2d:9f:83:f4:8b:e5:c9:f9:dd:75:18:bd:b5: 64:2b:3d:e5:e2:c6:ff:08:1b:54:ca:01:ea:2d:59:1d: 97:a7:1c:23:1e:6b:46:89:71:3e:36 Fingerprint (SHA-256): 43:FF:99:24:6C:EC:11:1B:AF:77:5F:EE:A6:66:36:15:5B:7B:E6:5D:E5:92:0E:3C:41:74:9D:91:4A:89:7C:3A Fingerprint (SHA1): 1B:5B:75:92:64:27:9E:83:2D:43:F6:AB:5C:11:78:0A:9C:4F:A4:19 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Mar 20 21:11:32 2023 Not After : Mon Mar 20 21:11:32 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:9d:8b:74:b4:3e:a3:41:e2:82:55:9a:00:72:0c:d4: b3:62:31:a1:4d:27:03:30:90:01:e7:6d:c1:96:2e:0d: 2b:ac:54:36:b2:15:f5:90:2c:19:b7:16:2b:eb:9c:d7: af:f0:bb:ae:fd:f0:fb:dc:ca:a5:24:42:af:6b:85:bf: 69:b4:b1:40:3e:c9:40:3e:e2:86:e8:ec:ae:f6:a6:f1: 1f:ab:ef:be:b6:a6:ca:db:f0:de:a7:ae:9b:53:ef:ff: d2 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:c2:94:14:eb:23:a4:37:a0:59:3e: f8:9f:2a:e9:78:c2:65:59:aa:a3:37:31:6f:0a:0c:b4: 34:49:e1:49:99:47:b0:59:ae:c4:59:c8:38:a3:fe:05: cb:cb:a0:b5:38:69:14:a8:09:8c:45:ce:b8:72:cc:ca: e0:3a:e0:69:39:75:15:02:42:01:e9:94:0b:3a:46:81: 7a:2f:a1:0d:f0:8a:db:38:86:ca:40:45:a2:5a:b4:2c: c0:6b:c0:06:85:29:c4:f5:dd:d5:ef:3b:99:d7:ba:83: ba:d6:48:bd:44:84:dd:06:9a:9d:35:3e:52:81:67:14: 6c:46:9b:44:ca:49:ff:4b:de:d0:89 Fingerprint (SHA-256): 79:64:13:09:AB:4C:4A:28:67:06:6E:9D:F3:39:90:27:D1:17:6C:5F:1D:51:70:0B:80:0E:31:E4:F2:BB:19:E9 Fingerprint (SHA1): 1F:CC:44:0B:DC:BA:6C:B6:84:D4:EE:08:23:3C:7F:0B:43:16:64:44 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1e:45:83:0e:3b:5c:72:84:21:1d:56:fa:45:61:73:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 45:0d:3e:8b:76:b3:71:19:b3:e4:f7:39:00:23:95:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3e:9c:c8:32:a2:b0:7c:46:fb:1c:86:08:32:9d:a9:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 65:81:7f:1f:9d:f1:b0:4a:59:39:97:93:f3:d4:44:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:9c:33:a1:b1:bf:3d:42:20:ec:85:5d:53:17:4e:f7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:18:5a:92:35:21:0a:21:63:03:1d:da:fd:c5:32: 30:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0a:14:e4:5e:84:12:4f:d0:af:1c:d3:26:49:2d:4b:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 73:f9:e9:93:75:c5:d4:0b:62:95:9a:91:7f:df:df:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e1:59:60:a3:94:0d:a8:d5:0e:74:de:8d:66:4f:32:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4d:f0:af:36:ae:87:50:40:6d:c1:dc:4b:b8:97:63:c7 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9d:6c:20:a4:c4:eb:14:09:7b:66:71:a8:ca:d9:f3:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fb:f7:0f:02:05:e9:c7:26:90:96:f5:a7:96:b5:fa:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3f:7b:66:7b:1a:65:bd:54:b8:bd:c7:14:97:56:83:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:2c:2a:52:1b:ab:e2:00:da:bc:dc:95:cf:cd:03:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c5:de:5c:4e:b7:5f:87:17:88:05:08:d1:fd:25:12:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:f7:48:90:21:5a:15:c0:62:c9:fe:63:b4:24:96:6d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8f:69:23:7d:3e:86:90:66:f6:34:c8:8a:b2:b5: c6:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 19:98:ed:04:d3:44:ab:c8:6d:0d:c2:2e:06:7f:3e:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:96:36:98:51:6f:7f:f7:47:26:4f:bd:a4:14:a3:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 62:bd:63:40:e5:63:0f:ee:ed:09:92:c3:78:d1:9b:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 45:bb:7f:38:3e:b3:e9:34:6c:85:2c:f3:c0:ba:8d:20 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 92:bc:79:e8:61:e7:b3:14:5f:7a:2f:74:ae:25:99:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ab:05:d8:ab:e4:0e:b0:78:99:0f:27:35:ce:f0:ef:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0d:e0:ac:64:1e:2b:32:a1:7c:d5:26:56:f2:d0:cb:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:65:3a:eb:8c:ee:b6:30:cb:a4:1b:b9:4b:6b:e1:28 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:78:51:2d:5e:d1:28:9c:50:7c:9e:f6:fe:8e:d6: 1e:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e5:87:6e:ca:a7:9f:b4:55:1b:b7:9f:a4:65:21:18:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:63:bf:35:42:fa:17:62:b2:79:03:64:26:b7:8c:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: db:16:59:d7:99:e6:c7:9a:f7:82:2b:41:7a:28:01:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6c:69:21:33:08:fd:13:ae:fd:79:e7:80:fe:58:22:34 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bd:b0:d6:dc:f8:47:65:a7:84:cd:a8:18:34:1b:85:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 06:85:ef:cf:66:19:26:40:e3:ba:e5:23:4a:97:0b:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 47:cb:65:14:fd:8d:30:c8:f9:2f:28:78:ee:88:49:77 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:84:40:db:b2:f8:1d:89:bd:d1:fd:98:e6:86:e6:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a5:8d:86:5a:6d:f2:65:01:20:9d:c6:45:9f:6e:84:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:03:16:95:37:e9:0c:28:3b:1f:f4:3f:dd:0b:ad:d7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ff:49:27:ec:1e:29:69:d6:ee:f0:10:58:c0:32: 00:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 52:72:89:45:14:c6:8a:8a:a7:81:ea:d0:a9:f3:c1:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b2:31:35:8a:f1:be:1e:e7:e9:50:a0:7d:2f:f2:7f:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 74:9e:68:11:0f:54:b0:42:7a:bb:08:8c:21:e5:f1:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 7b:7f:b3:7b:80:f0:2a:ef:d6:3b:74:52:2c:c8:e0:19 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 79:7c:2e:25:bc:7d:51:37:c6:cb:8f:88:fe:dd:bd:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:c3:f0:c5:53:c3:eb:c6:47:9a:2e:d3:62:b6:01:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: d1:b1:b8:80:5f:21:0e:bc:c4:e0:9a:04:f7:11:29:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:f4:42:0a:8f:e3:c1:52:79:f5:b6:86:89:cf:f3:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 6d:e4:d9:2d:b6:35:0a:10:13:a5:ca:c0:a1:bf:8c:8c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:52:e2:9b:48:a5:85:d1:1a:d1:c9:cc:86:92:e0:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:50:39:ce:c3:4f:3c:66:7d:56:f6:c8:f5:0d:51: 0d:8f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 3a:f3:be:b2:87:24:23:49:97:68:b6:c2:52:79:c9:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:98:ed:8f:ee:c3:a0:2d:3f:73:01:7b:e0:26:cd:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: f2:62:ce:27:05:4d:67:73:a0:63:03:16:2f:bd:53:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 30:2b:50:38:53:ac:2d:ce:64:b3:b9:27:f6:52:c4:c3 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 56:25:d8:72:67:af:84:01:2c:36:79:9e:09:90:f8:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4a:fd:3d:34:c1:63:62:f0:e5:c0:75:ed:3a:00:fc:1d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:58:bf:4c:d8:c3:22:95:6c:ff:93:80:c3:17:7b:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:ad:e9:8e:54:15:83:9c:30:97:f0:10:1c:3b:88:cb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c5:51:c7:38:be:e4:ab:73:fe:1f:34:78:62:79: 0e:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f2:c1:59:73:85:91:1b:93:e7:58:c9:b9:83:f5:b7:30 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:b0:12:fe:ff:80:ee:92:8f:dc:3d:d4:a4:13:85:b2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:e7:cd:60:ee:cb:09:82:61:3f:4f:a1:b6:50:eb:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4e:66:3a:be:ba:c1:9c:ee:a7:c4:78:a6:48:17:42:97 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:5d:98:38:64:60:bf:98:ec:7f:9a:92:b4:fc:0a:fc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 23:08:ed:39:91:5a:df:7d:a3:72:2b:3f:9b:47:2b:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 65:47:04:81:ec:43:20:a7:a6:23:39:a0:2e:19:1a:17 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:ed:8d:26:53:0d:05:fe:46:d5:8f:1a:18:89:5c:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ca:86:c3:16:98:2e:07:f3:5e:ca:cf:0a:2f:2d:33:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:c4:36:cf:fc:ae:0f:7e:8d:2f:02:d5:5f:d6:34:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ef:43:83:9b:dc:8c:9f:c9:b5:b1:64:d8:7f:5f: 93:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f0:22:37:3e:b9:35:30:49:a3:e0:21:d7:a5:d2:c1:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:05:80:6b:d0:1d:e9:30:33:21:76:25:b5:6a:9e:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 72:3d:76:fe:3d:19:0f:6d:63:eb:b7:70:18:fc:4b:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 59:bf:88:3e:6e:d2:ae:93:18:3c:eb:64:49:39:db:5c Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a3:29:fb:d9:ea:36:6c:b2:db:9a:ff:3c:79:b8:29:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3d:da:cd:c6:2d:fe:a9:0b:01:eb:fa:b9:a2:94:83:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a8:cc:c5:11:03:ca:32:70:98:48:6c:1f:31:32:b9:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a8:ee:a9:fc:59:0c:46:d0:13:9c:4b:09:bc:5c:74:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 63:5d:51:d3:63:1f:03:8b:8b:79:d5:e0:36:97:15:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:29:7d:59:c2:53:0e:77:85:37:12:fa:c3:3f:a3:19 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:73:46:01:8e:74:20:49:0c:62:5a:a1:cc:24:f3: 8f:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 3d:4d:04:1e:ee:a2:a6:a7:cb:2e:42:8c:b7:6f:62:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 63:a2:0f:e6:d7:cb:ed:06:81:e6:3f:bc:9e:a9:eb:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 3f:69:03:58:45:c2:c9:16:27:03:72:0c:5f:f0:ac:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c7:59:0a:96:4e:ea:18:a7:64:82:04:bc:56:17:d9:c3 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: ca:d3:02:35:56:ee:a3:df:25:d7:8f:65:15:c0:f8:e0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bd:55:d7:31:8d:f2:91:6e:f1:fe:c7:7b:c8:59:26:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f2:5e:7e:02:b6:05:49:40:8b:1b:c9:64:9b:89:70:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 42:64:d7:21:9c:20:93:82:5a:ee:8e:67:5b:18:01:2d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a4:e9:0b:18:ea:58:6c:ad:05:51:16:ae:a8:4e:2d:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:44:5f:0f:1a:32:75:89:b2:43:67:b4:3c:32:20:a3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5b:71:74:f0:f2:35:39:ae:16:bb:53:68:9b:0d: d9:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f9:fb:e0:47:7c:c4:62:41:a0:fa:1f:c9:9b:6c:4d:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 44:4f:1c:ba:8b:31:59:72:94:e7:9c:33:3c:76:a1:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 63:1c:cb:a5:b2:b2:bb:1a:73:4a:54:96:50:ad:db:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ac:67:94:7d:c0:6b:5a:bf:62:45:62:2e:f9:b1:49:f0 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 95:3c:3b:2d:b7:08:b3:b8:d5:02:b0:af:a9:f8:63:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1e:f7:c7:81:55:9f:12:17:6f:78:1e:51:07:2b:b7:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 74:04:de:e2:bc:bb:27:9e:1e:cb:b9:fe:48:69:ef:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f4:30:9a:28:3c:47:bd:67:72:dc:ea:a1:08:e9:a7:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9a:0e:f9:86:41:29:8c:e1:40:0b:7e:a4:7c:63:c8:b2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:96:1a:0b:c8:88:6f:d6:c1:1a:22:ab:77:b6:9b:ff Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:47:bd:2c:52:14:63:b9:65:40:1e:6d:9c:20:a5: f3:3b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:54:66:ea:96:3b:5e:11:10:d5:3f:5c:3b:6a:d6:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:67:15:b3:a1:80:43:39:c2:7f:56:c4:95:58:f6:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:67:6d:ff:8a:87:ef:0f:0e:18:b3:f8:c2:d3:99:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5f:e1:00:5f:1e:ee:0e:90:6f:db:8c:39:57:32:d6:b3 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:b0:e8:f7:c7:a0:27:22:47:91:10:4a:66:69:10:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e5:3f:3d:7a:b7:7b:7e:92:35:77:e1:10:34:3c:cf:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:85:b9:91:6b:91:bd:4f:57:2c:9e:49:db:02:b8:e9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:79:86:fd:ad:9b:e6:5d:1e:3a:da:da:48:c8:8d: ff:d5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:ca:89:b2:af:5d:e4:41:ad:c9:e0:83:46:ae:59:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:d0:e2:e4:00:47:54:07:18:58:27:d4:ed:26:d8:d2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:39:79:27:f4:92:db:c4:36:16:5d:16:c7:3f:64: a9:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:34:5d:b4:f2:dd:27:ba:5e:2c:a5:b3:49:17:24:d2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d7:42:75:55:82:45:5b:89:71:87:28:21:15:63: 38:f0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:ee:28:f4:4b:ff:cd:c2:6b:ff:3a:4d:01:6b:28:56 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:7c:1a:47:dc:c9:aa:4f:0d:e8:95:6e:fe:f7:76: 27:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:19:4f:58:07:39:7f:8f:ea:38:08:5b:d4:49:a8:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:4a:2c:00:b3:df:cd:bd:c5:ac:a9:b1:08:c0:ba:3b Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:5e:c3:05:4d:b2:9c:8d:07:7c:6f:de:2a:3b:8b: 94:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e0:2f:01:ac:1f:ae:88:08:3f:2b:85:5a:6b:18:0a:46 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:96:0d:21:da:04:8d:a2:81:ef:54:ab:04:37:86: 64:c4 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:f5:ae:97:ba:5d:0d:99:a9:44:25:0f:77:09:67:a2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:f5:ad:73:dd:4f:e1:8b:61:84:70:0f:79:51:be: b3:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 26:6b:15:06:31:4d:7c:a4:2d:63:11:f3:66:3a:c2:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c6:47:f7:e9:de:3f:85:35:3e:a8:c3:a8:a8:64:b1:d5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:4d:f1:dd:06:8c:7a:1e:41:53:74:76:c7:88:17: b7:8f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a0:e6:61:a0:e2:55:b6:0c:f8:b9:72:48:38:b6:46:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:a0:6f:d4:7b:32:86:56:9d:89:07:7a:a4:75:3f:d3 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:25:71:1a:31:27:cd:87:6a:f0:cf:b2:2d:e6:00: dd:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 56:03:59:50:28:67:64:7c:30:35:3c:11:ca:b9:8c:64 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:45:e8:ec:36:30:8b:7c:f8:cf:e7:6b:86:fb:6f: a0:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:90:7c:78:30:27:5a:bc:ee:89:71:38:4f:4b:98:57 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:51:a3:d8:a9:f6:3c:50:88:4c:71:45:4b:1c:34: dd:f9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:ab:89:bf:6f:d8:d3:b7:3a:8c:e4:7a:06:a0:81:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:60:78:55:c2:6a:32:99:00:18:95:ce:31:fa:ce:88 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:9f:5e:58:82:40:50:55:78:bf:42:98:77:36:04: d6:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:c0:ca:4b:0d:e6:a4:c2:a4:18:d0:60:d0:39:a3:3f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:55:75:96:cc:c2:90:11:35:a7:a1:e9:0b:d1:0f: 51:33 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9b:51:ca:7c:34:5e:15:c9:cf:ec:6f:34:0d:f7:70:f7 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:af:ca:73:6a:08:f6:7d:3e:50:b7:f0:70:d0:2e: 5b:1b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7c:b0:ce:bd:76:f6:0a:5a:12:13:7f:0f:c7:96:45:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:ee:d9:ce:15:5a:4a:71:7d:8c:db:e1:91:d8:70:b4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:9c:68:81:bb:fa:09:6a:a8:e0:23:7c:8e:1f:15: db:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:31:9b:96:43:49:12:61:32:0a:5b:e6:5f:ac:1c:05 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:9e:6a:75:b9:70:f3:b3:64:fa:7d:60:70:da:8a:9e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:52:66:27:fd:da:43:70:6c:0a:dd:8c:7e:ed:3b: de:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:15:76:f8:8a:cf:ce:4b:a7:ca:55:c7:5d:be:18:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:5f:e8:d0:0b:8b:9f:b9:7d:c3:42:65:f3:63:21:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:73:fc:4c:dd:a4:0f:4b:1a:aa:99:d8:e7:90:79: 03:68 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:22:d8:4f:e1:0b:4f:14:91:08:70:27:0a:5f:57:2e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:10:11:8f:5f:70:dc:be:f1:98:aa:6c:80:b2:e5: d5:b5 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:4c:12:0e:24:84:fe:46:31:88:07:fd:fa:58:4a:9a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:c8:1c:48:1d:10:8e:9b:a8:9c:b1:6c:e8:44:14: d8:98 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a4:c3:87:2c:c0:3f:93:8b:9f:8f:8e:be:a3:5b:5a:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b3:48:34:67:3f:d4:a1:9d:50:77:e7:6a:08:7a:87:4a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:00:8c:b6:22:99:44:df:57:52:77:8f:13:38:01: 80:78 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0a:ff:46:7e:89:99:1a:98:c9:f4:0f:9b:38:7a:4c:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:20:08:94:9c:a2:eb:3a:5d:06:88:17:90:93:62:62 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:ec:8e:94:8d:f1:f9:89:db:2e:55:2f:76:80:3e: f2:d5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:e2:c7:7f:92:54:2d:ea:4a:b5:8c:19:f3:79:8b:d1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8c:7b:4d:5b:b7:ab:da:ed:89:3a:2b:68:14:68: 1a:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:2d:cc:90:92:2f:fc:d7:d0:c6:c9:08:82:5f:0d:53 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:45:59:19:d8:ed:c1:54:3c:58:29:09:33:21:5e: 88:04 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:8c:82:ab:5e:03:d7:8b:df:8f:ec:dc:0c:05:32:f4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 50:08:c0:df:c3:72:31:14:2d:bf:22:50:94:c4:1a:1d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:7d:07:2c:ec:69:fb:11:c0:18:e0:0b:18:09:be: fd:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:86:42:8a:fa:d3:50:ec:19:a9:32:60:4b:84:fc:41 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:ce:e3:49:7f:53:c5:5d:dc:5b:bc:f4:80:44:2d: 4e:9f tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a0:8c:ba:10:53:e0:11:ae:52:bf:b7:9c:2a:18:49:74 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:82:2a:b7:d0:80:fc:a0:3d:97:46:ac:7d:b6:0e: 45:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 30:4d:b3:bb:fb:3f:35:b2:8c:d2:43:51:2e:a1:23:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:d8:ca:e2:fa:92:bc:db:6f:35:66:33:66:64:0a:70 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:af:21:82:3d:34:29:14:e4:00:80:59:94:a3:98: 8c:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a3:37:33:74:9b:5e:0d:05:85:f6:50:a1:0b:37:50:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 14:9b:a1:b2:73:38:19:86:50:bc:76:bb:bb:e7:7c:a2 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:61:3f:6b:d3:38:72:86:e9:15:17:de:58:20:c0: 33:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:d9:40:d1:63:03:7c:93:73:2e:66:50:48:5c:3b:e4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4d:21:e8:16:78:8c:b7:01:60:e3:24:da:28:4b: 4b:74 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ed:d2:74:68:f0:87:08:94:44:fe:5d:68:3f:70:de:5f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:73:ad:37:f0:7c:02:65:c1:27:1d:a8:42:46:16: be:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 67:aa:c1:79:3a:8e:91:dd:01:df:e1:dd:54:5a:8f:cd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:71:ae:ea:c6:83:d5:45:9a:02:50:25:55:60:cc:3c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:86:b4:11:89:16:a9:45:2d:10:11:6d:d5:0c:d0: 91:ef Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:66:24:1c:8f:2f:aa:68:3b:f8:12:6d:80:ff:aa:29 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:4a:86:d1:91:d7:df:dc:30:80:fe:1c:06:2c:7c: 84:17 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:6d:aa:77:25:4a:ff:8d:d2:c3:7d:9d:4f:ea:a6:be Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:45:8c:d3:7f:60:48:4d:d9:1e:b8:31:96:46:65: 46:44 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e9:d1:60:80:7c:9f:bb:bb:32:f9:5b:6e:f4:61:45:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:ae:23:4f:64:d8:b3:fa:82:81:64:db:4b:0f:04:72 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:3f:45:26:2f:98:86:51:8f:31:4a:12:57:54:0a: bb:91 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:51:cf:3e:76:85:1e:60:b3:b2:cb:35:9b:3c:08:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:5b:d9:2b:c2:11:58:38:f1:3a:a9:4f:58:6e:d9:4b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:bb:08:46:39:a3:ab:94:c5:d8:aa:19:32:f1:20: 9c:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:11:44:6b:3c:24:34:41:02:20:eb:f4:9d:51:30:bd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:eb:ec:3c:a2:09:8c:90:49:5d:33:40:b6:0f:77: be:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:5e:5b:51:ce:53:a1:1c:4c:4f:5c:9a:29:38:50:17 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:3a:59:62:45:fa:d2:63:88:53:0b:19:8f:e4:ba: 64:4f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 65:0e:9c:0f:7f:c0:b9:c9:68:26:fb:55:9c:c1:e7:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:10:dc:60:cf:f8:ec:cb:c8:ac:a5:d1:10:b2:f1:0e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:78:f0:1d:ec:bf:30:da:ef:40:1b:c2:4e:00:38: a7:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 27:d5:ab:1d:b6:f2:e2:8e:8c:04:52:1f:2e:3a:4c:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:48:01:b4:1d:b0:47:b3:e6:b7:e2:7c:ba:f5:08: 89:12 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9c:d6:23:d0:43:d6:f0:ac:9c:fc:9a:44:a9:74:87:68 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:ae:9e:62:55:ba:8f:17:a9:35:b6:4b:b6:20:67: 03:33 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 02:c8:30:b0:a9:74:b1:d0:e4:9d:3c:f0:61:aa:ee:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6e:49:57:65:d3:21:be:8e:e6:73:50:54:af:e8:92:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 19:32:3b:47:76:1b:9a:da:7d:39:93:39:1e:0e:6d:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2a:0c:2e:83:8a:f4:7c:a3:86:93:02:34:0c:70:f6:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ab:94:2b:24:7d:dd:24:ca:fd:5c:ab:fb:e4:6e:e7:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0b:e0:c4:c8:60:42:cd:e3:a2:fc:6e:c4:ff:1e:78:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:fa:16:1c:13:f9:ab:d3:c8:b2:62:31:62:e9:84:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:0b:f9:bb:2c:44:4b:c6:7d:53:a2:7a:f3:4d:25:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 53:09:c9:0c:28:b4:0a:30:cb:d8:25:37:dd:ee:d7:1b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:47:9d:d5:06:98:f5:4d:9c:03:50:48:bc:39:92:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b7:c3:92:b3:47:d7:a0:e6:78:17:82:5c:9b:2d:04:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 75:c6:46:84:47:30:a3:8f:19:74:a3:d5:3a:74:26:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:a0:8e:4e:3e:0e:f4:37:bd:8b:8a:75:41:90:ab:2f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3a:bc:d5:1b:a2:36:f2:0d:36:68:73:10:af:1a: 46:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:28:45:a0:0d:3a:3f:ba:fe:58:ef:a4:a5:b5:0b:2f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:c3:64:bb:a4:f4:cd:36:fa:52:a9:41:7b:b6:3a: 99:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:2e:73:f0:78:8c:7f:7d:15:8f:8b:c8:d3:4f:b8:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:c6:5f:34:6d:d8:3e:f8:8f:a1:7b:99:f8:a6:5d: be:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 06:4d:25:2f:1c:c7:71:6b:ce:3b:80:80:98:d6:8a:33 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:d0:7a:17:f0:6b:ff:ab:a5:a6:6f:b6:9d:56:99: 5b:ec Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:3e:ec:ee:c6:c3:08:b2:9d:f6:8b:ab:4c:70:c2:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:fe:a3:0e:31:97:c6:34:be:88:8f:20:fe:25:d0: 46:ec Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 50:16:3b:bc:2f:bb:15:86:75:84:f8:5a:8f:4f:9b:7d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:89:b0:51:1f:c3:f9:fa:b1:50:ff:d2:64:bd:17: 2c:d9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:16:ae:87:ce:55:04:50:6d:f9:e3:19:b2:fb:49:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ee:45:ec:6c:a3:0b:b7:4a:62:64:b4:7c:22:01:02:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5c:47:21:19:78:6d:9f:78:3e:87:f3:5f:69:0e:49:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 27:2a:3a:a5:15:09:fd:eb:be:aa:65:2b:69:2b:f4:ea Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:c9:78:10:7a:b8:16:b7:3c:25:5c:90:1b:8f:02:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:dc:bd:16:4b:40:9a:b2:51:e7:bb:29:d1:44:79:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:10:19 2023 Not After : Mon Mar 20 21:10:19 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f1:f1:84:7f:e6:25:77:f5:e7:b9:08:fa:e3:db:54: f6:8d:36:c3:24:ac:92:23:f2:bc:1e:c8:20:43:2e:6a: cb:c4:b2:6b:9f:d6:76:d3:b5:bc:ee:de:fe:2a:24:de: 5d:fd:9b:7b:2e:5f:da:1d:3f:0e:8f:d4:d9:3f:85:bb: e4:f6:5e:70:65:6e:3e:e5:db:23:6d:12:0f:81:47:65: 56:73:54:5b:22:26:d6:1b:a2:07:4a:0f:df:94:28:7b: d0:c4:a1:8a:c4:0f:45:78:be:a2:25:b6:8d:5a:1c:c2: 18:26:7a:5a:02:a5:83:ce:7f:42:ff:d1:cc:f9:f5:b3: 60:26:e2:39:7b:a9:f2:08:83:6b:83:86:86:97:b8:83: 2a:9b:e2:56:b3:b8:43:42:eb:3a:82:03:ae:10:35:f6: dc:a1:c0:38:af:2c:33:93:10:38:d2:3c:36:0a:3f:15: 05:4e:eb:35:12:0e:71:e2:ce:38:0d:b1:92:1c:4e:95: db:cd:10:27:2a:56:de:c0:0b:8f:3c:38:a2:d4:40:d4: f5:89:05:aa:78:4f:f7:bf:69:a7:a6:a7:b8:d6:a9:07: 4a:a3:61:da:0b:1f:03:8e:bc:f5:3e:a3:a1:98:ee:25: f9:7d:f8:29:fc:b2:43:5a:52:ae:fb:28:1a:c6:68:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:f5:5f:60:fc:79:bd:23:22:36:ec:ff:87:e0:f6:29: 64:db:e7:bf:7d:0c:ec:cd:0d:48:0e:6f:ef:58:c0:50: 5c:45:d3:08:03:57:15:ac:1f:ec:2b:0a:42:2c:4c:5f: 13:be:4d:25:54:db:c3:2b:37:4a:92:54:ae:97:b5:5e: 9a:31:b1:ff:c7:e4:af:23:f2:61:65:48:96:1b:96:67: 94:62:47:50:fe:01:16:a2:de:f0:1d:d2:c1:22:de:06: 0b:16:97:fb:3d:6d:c9:7b:fc:6c:bb:2b:6d:e6:de:05: f1:67:b2:07:8a:3f:b1:07:bb:be:22:ef:e5:fe:19:ed: 04:17:52:22:65:a1:77:a4:a1:b4:1c:fc:99:3d:0a:b8: bb:cd:31:66:48:b4:1f:f1:b3:94:09:3e:8c:1a:03:0d: 5b:b2:f2:c8:60:2a:68:bd:15:d6:8a:55:f8:97:f8:12: ef:68:1b:36:65:cc:9d:64:8f:05:c3:0c:d6:19:46:c3: 33:ad:85:1b:35:0a:fc:5b:01:8a:a0:3e:58:4b:55:0e: 4d:20:d3:2e:91:1f:ad:4c:1c:bb:80:3d:3f:43:5e:69: 54:51:d0:a4:55:c2:d0:92:8a:6a:e3:75:dc:c3:e9:2c: da:5a:76:91:23:3d:ff:d7:81:d6:23:54:a3:79:22:bb Fingerprint (SHA-256): 3E:47:8D:79:9E:DE:DA:E0:FB:E7:81:5B:4F:81:B7:8A:8D:4D:0A:D7:A0:35:74:59:5F:8E:47:A5:5C:5F:3E:A3 Fingerprint (SHA1): B2:55:0F:A9:78:9E:43:49:32:8F:75:16:19:08:D3:E9:09:53:0C:3B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:11:29 2023 Not After : Mon Mar 20 21:11:29 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:f1:47:8d:95:b5:29:26:07:df:0b:47:e6:95:3a: d6:1a:65:06:55:48:9f:39:49:e7:e2:ca:c8:66:ef:ed: 99:d1:74:05:0b:11:04:3d:3c:69:8d:77:e9:c7:9a:9e: a6:70:95:1d:cb:48:b2:1a:1d:6a:c3:db:f3:b6:0f:97: d7:e1:61:34:06:d0:d9:2c:9e:be:9e:a9:e9:17:a1:13: 36:f4:e9:9d:6d:aa:90:a1:93:bd:6c:8e:bf:a5:85:37: fa:7b:8f:25:51:7f:17:ea:8d:69:d5:55:a0:b6:b3:4f: a0:81:84:de:4a:70:7a:db:6e:05:b9:aa:3d:db:d3:c4: 38:7b:fc:a8:1a:6c:88:dd:2a:09:a3:02:dd:52:08:a2: 83:01:92:22:a8:1b:82:ce:b1:37:b5:c7:72:02:77:ef: e4:9e:13:68:cb:6d:3e:8f:a3:9d:26:8b:e5:96:7f:5a: 08:84:07:94:b3:aa:4e:18:c0:4e:e5:04:78:90:42:18: 94:67:db:8b:32:fa:ec:c5:85:85:b4:43:11:e8:58:ae: 0a:15:15:ce:67:70:72:d5:f9:80:9a:cf:e0:14:20:8c: b0:53:20:5f:81:35:90:a8:8d:45:e0:69:f6:39:77:8d: e5:2d:dd:39:d5:a5:1c:38:3d:0f:de:17:14:fa:5c:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:38:d1:b4:cf:ad:c3:6a:32:29:18:da:44:37:f9:64: bb:11:84:af:b9:32:47:6c:3f:ce:2e:9c:b1:51:27:1a: e2:3e:47:ab:98:13:e7:f1:4b:11:9e:02:4a:89:e5:d8: 7b:af:09:1c:ab:ed:07:69:a9:47:4f:54:d5:ed:b3:ef: 2b:c2:6f:62:d8:7f:c2:57:7a:2f:1a:1a:07:cc:ef:30: 8e:84:95:e7:3b:bf:b2:46:c2:e3:bc:0b:70:f4:11:bd: aa:fa:85:53:37:e0:d9:db:a6:a7:dd:53:46:99:f8:05: 6e:bc:02:19:89:10:5d:fc:95:53:c8:b6:2d:70:3c:11: 9e:80:6e:08:dd:86:59:a4:2c:6a:83:72:26:a7:b0:bf: 00:3c:1e:0f:85:aa:34:7a:06:68:bb:a0:3c:cb:5a:6b: 37:27:1c:d6:ed:41:1c:0a:b8:d0:58:42:28:d9:e8:36: 54:1b:55:88:31:65:c8:d5:a0:e7:20:53:7f:b6:53:b8: 8a:85:6c:1b:85:6e:8d:35:82:46:7c:41:69:d3:b1:f6: 28:0b:d0:ee:16:76:5f:84:ee:fa:6e:f2:70:bf:5e:96: e9:da:a8:5b:77:cb:bb:fb:61:1d:75:01:0d:73:a2:a4: b7:8c:4e:d6:50:79:21:03:ad:52:7d:a0:68:0a:94:12 Fingerprint (SHA-256): 46:0E:7F:C5:BD:79:5F:5C:11:60:48:BD:FC:DB:5E:4E:35:82:75:A8:01:5A:10:0E:77:8C:B3:65:C0:D2:08:13 Fingerprint (SHA1): DA:2E:D9:87:4E:81:3A:6F:8F:5B:C5:F6:8A:E4:DE:1C:0A:C8:50:DC Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing RSA-PSS private key from PKCS#12 file - PASSED < 4> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #733: Listing RSA-PSS private key imported from PKCS#12 file - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #734: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #735: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #736: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #737: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #738: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #739: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #740: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #741: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Mon Mar 20 21:31:41 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 20 21:31:41 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 750690fc095afb6daf9ce645aef3d2f2fc835aa8 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 750690fc095afb6daf9ce645aef3d2f2fc835aa8 FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 750690fc095afb6daf9ce645aef3d2f2fc835aa8 FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x0005139c (332700): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 20 21:32:09 UTC 2023 Running tests for sdr TIMESTAMP sdr BEGIN: Mon Mar 20 21:32:09 UTC 2023 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v1.30514 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v2.30514 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.30514 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v1.30514 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v2.30514 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.30514 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/combined.30514 -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/decoded.30514 -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/log.30514 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/decoded.30514 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/log.30514 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.30 user 0.21 sys 0.09 0 seconds TIMESTAMP sdr END: Mon Mar 20 21:32:11 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 20 21:32:11 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 20 21:32:12 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 20 21:32:12 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 20 21:33:00 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 20 21:33:00 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30788 found at Mon Mar 20 21:33:01 UTC 2023 selfserv_9887 with PID 30788 started at Mon Mar 20 21:33:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30788 at Mon Mar 20 21:33:02 UTC 2023 kill -USR1 30788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30788 killed at Mon Mar 20 21:33:02 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30840 found at Mon Mar 20 21:33:02 UTC 2023 selfserv_9887 with PID 30840 started at Mon Mar 20 21:33:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30840 at Mon Mar 20 21:33:03 UTC 2023 kill -USR1 30840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30840 killed at Mon Mar 20 21:33:03 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30892 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30892 found at Mon Mar 20 21:33:03 UTC 2023 selfserv_9887 with PID 30892 started at Mon Mar 20 21:33:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30892 at Mon Mar 20 21:33:04 UTC 2023 kill -USR1 30892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30892 killed at Mon Mar 20 21:33:04 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30958 found at Mon Mar 20 21:33:05 UTC 2023 selfserv_9887 with PID 30958 started at Mon Mar 20 21:33:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30958 at Mon Mar 20 21:33:06 UTC 2023 kill -USR1 30958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30958 killed at Mon Mar 20 21:33:06 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31010 found at Mon Mar 20 21:33:06 UTC 2023 selfserv_9887 with PID 31010 started at Mon Mar 20 21:33:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31010 at Mon Mar 20 21:33:07 UTC 2023 kill -USR1 31010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31010 killed at Mon Mar 20 21:33:07 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31062 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31062 found at Mon Mar 20 21:33:07 UTC 2023 selfserv_9887 with PID 31062 started at Mon Mar 20 21:33:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31062 at Mon Mar 20 21:33:08 UTC 2023 kill -USR1 31062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31062 killed at Mon Mar 20 21:33:08 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31128 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31128 found at Mon Mar 20 21:33:08 UTC 2023 selfserv_9887 with PID 31128 started at Mon Mar 20 21:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31128 at Mon Mar 20 21:33:10 UTC 2023 kill -USR1 31128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31128 killed at Mon Mar 20 21:33:10 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31180 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31180 found at Mon Mar 20 21:33:10 UTC 2023 selfserv_9887 with PID 31180 started at Mon Mar 20 21:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31180 at Mon Mar 20 21:33:11 UTC 2023 kill -USR1 31180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31180 killed at Mon Mar 20 21:33:11 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31232 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31232 found at Mon Mar 20 21:33:11 UTC 2023 selfserv_9887 with PID 31232 started at Mon Mar 20 21:33:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31232 at Mon Mar 20 21:33:13 UTC 2023 kill -USR1 31232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31232 killed at Mon Mar 20 21:33:13 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31298 found at Mon Mar 20 21:33:13 UTC 2023 selfserv_9887 with PID 31298 started at Mon Mar 20 21:33:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31298 at Mon Mar 20 21:33:14 UTC 2023 kill -USR1 31298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31298 killed at Mon Mar 20 21:33:14 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31350 found at Mon Mar 20 21:33:14 UTC 2023 selfserv_9887 with PID 31350 started at Mon Mar 20 21:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31350 at Mon Mar 20 21:33:15 UTC 2023 kill -USR1 31350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31350 killed at Mon Mar 20 21:33:15 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31402 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31402 found at Mon Mar 20 21:33:15 UTC 2023 selfserv_9887 with PID 31402 started at Mon Mar 20 21:33:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31402 at Mon Mar 20 21:33:16 UTC 2023 kill -USR1 31402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31402 killed at Mon Mar 20 21:33:16 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31468 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31468 found at Mon Mar 20 21:33:17 UTC 2023 selfserv_9887 with PID 31468 started at Mon Mar 20 21:33:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31468 at Mon Mar 20 21:33:18 UTC 2023 kill -USR1 31468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31468 killed at Mon Mar 20 21:33:18 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31520 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31520 found at Mon Mar 20 21:33:18 UTC 2023 selfserv_9887 with PID 31520 started at Mon Mar 20 21:33:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31520 at Mon Mar 20 21:33:19 UTC 2023 kill -USR1 31520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31520 killed at Mon Mar 20 21:33:19 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31572 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31572 found at Mon Mar 20 21:33:19 UTC 2023 selfserv_9887 with PID 31572 started at Mon Mar 20 21:33:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31572 at Mon Mar 20 21:33:20 UTC 2023 kill -USR1 31572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31572 killed at Mon Mar 20 21:33:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31639 found at Mon Mar 20 21:33:20 UTC 2023 selfserv_9887 with PID 31639 started at Mon Mar 20 21:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31639 at Mon Mar 20 21:33:21 UTC 2023 kill -USR1 31639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31639 killed at Mon Mar 20 21:33:21 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31691 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31691 found at Mon Mar 20 21:33:22 UTC 2023 selfserv_9887 with PID 31691 started at Mon Mar 20 21:33:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31691 at Mon Mar 20 21:33:23 UTC 2023 kill -USR1 31691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31691 killed at Mon Mar 20 21:33:23 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31743 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31743 found at Mon Mar 20 21:33:23 UTC 2023 selfserv_9887 with PID 31743 started at Mon Mar 20 21:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31743 at Mon Mar 20 21:33:25 UTC 2023 kill -USR1 31743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31743 killed at Mon Mar 20 21:33:25 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31809 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31809 found at Mon Mar 20 21:33:25 UTC 2023 selfserv_9887 with PID 31809 started at Mon Mar 20 21:33:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31809 at Mon Mar 20 21:33:26 UTC 2023 kill -USR1 31809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31809 killed at Mon Mar 20 21:33:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31861 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31861 found at Mon Mar 20 21:33:26 UTC 2023 selfserv_9887 with PID 31861 started at Mon Mar 20 21:33:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31861 at Mon Mar 20 21:33:27 UTC 2023 kill -USR1 31861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31861 killed at Mon Mar 20 21:33:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31913 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31913 found at Mon Mar 20 21:33:27 UTC 2023 selfserv_9887 with PID 31913 started at Mon Mar 20 21:33:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31913 at Mon Mar 20 21:33:28 UTC 2023 kill -USR1 31913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31913 killed at Mon Mar 20 21:33:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31980 found at Mon Mar 20 21:33:28 UTC 2023 selfserv_9887 with PID 31980 started at Mon Mar 20 21:33:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31980 at Mon Mar 20 21:33:29 UTC 2023 kill -USR1 31980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31980 killed at Mon Mar 20 21:33:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32032 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32032 found at Mon Mar 20 21:33:29 UTC 2023 selfserv_9887 with PID 32032 started at Mon Mar 20 21:33:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32032 at Mon Mar 20 21:33:30 UTC 2023 kill -USR1 32032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32032 killed at Mon Mar 20 21:33:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32084 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32084 found at Mon Mar 20 21:33:30 UTC 2023 selfserv_9887 with PID 32084 started at Mon Mar 20 21:33:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32084 at Mon Mar 20 21:33:31 UTC 2023 kill -USR1 32084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32084 killed at Mon Mar 20 21:33:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32150 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32150 found at Mon Mar 20 21:33:31 UTC 2023 selfserv_9887 with PID 32150 started at Mon Mar 20 21:33:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32150 at Mon Mar 20 21:33:32 UTC 2023 kill -USR1 32150 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32150 killed at Mon Mar 20 21:33:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32202 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32202 found at Mon Mar 20 21:33:33 UTC 2023 selfserv_9887 with PID 32202 started at Mon Mar 20 21:33:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32202 at Mon Mar 20 21:33:34 UTC 2023 kill -USR1 32202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32202 killed at Mon Mar 20 21:33:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32254 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32254 found at Mon Mar 20 21:33:34 UTC 2023 selfserv_9887 with PID 32254 started at Mon Mar 20 21:33:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32254 at Mon Mar 20 21:33:35 UTC 2023 kill -USR1 32254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32254 killed at Mon Mar 20 21:33:35 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32320 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32320 found at Mon Mar 20 21:33:35 UTC 2023 selfserv_9887 with PID 32320 started at Mon Mar 20 21:33:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32320 at Mon Mar 20 21:33:36 UTC 2023 kill -USR1 32320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32320 killed at Mon Mar 20 21:33:36 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32372 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32372 found at Mon Mar 20 21:33:36 UTC 2023 selfserv_9887 with PID 32372 started at Mon Mar 20 21:33:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32372 at Mon Mar 20 21:33:37 UTC 2023 kill -USR1 32372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32372 killed at Mon Mar 20 21:33:37 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32424 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32424 found at Mon Mar 20 21:33:37 UTC 2023 selfserv_9887 with PID 32424 started at Mon Mar 20 21:33:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32424 at Mon Mar 20 21:33:38 UTC 2023 kill -USR1 32424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32424 killed at Mon Mar 20 21:33:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32490 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32490 found at Mon Mar 20 21:33:39 UTC 2023 selfserv_9887 with PID 32490 started at Mon Mar 20 21:33:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32490 at Mon Mar 20 21:33:39 UTC 2023 kill -USR1 32490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32490 killed at Mon Mar 20 21:33:39 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32543 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32543 found at Mon Mar 20 21:33:40 UTC 2023 selfserv_9887 with PID 32543 started at Mon Mar 20 21:33:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32543 at Mon Mar 20 21:33:40 UTC 2023 kill -USR1 32543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32543 killed at Mon Mar 20 21:33:40 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32598 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32598 found at Mon Mar 20 21:33:41 UTC 2023 selfserv_9887 with PID 32598 started at Mon Mar 20 21:33:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32598 at Mon Mar 20 21:33:41 UTC 2023 kill -USR1 32598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32598 killed at Mon Mar 20 21:33:41 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32669 found at Mon Mar 20 21:33:42 UTC 2023 selfserv_9887 with PID 32669 started at Mon Mar 20 21:33:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32669 at Mon Mar 20 21:33:43 UTC 2023 kill -USR1 32669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32669 killed at Mon Mar 20 21:33:43 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32728 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32728 found at Mon Mar 20 21:33:43 UTC 2023 selfserv_9887 with PID 32728 started at Mon Mar 20 21:33:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32728 at Mon Mar 20 21:33:44 UTC 2023 kill -USR1 32728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32728 killed at Mon Mar 20 21:33:44 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32780 found at Mon Mar 20 21:33:44 UTC 2023 selfserv_9887 with PID 32780 started at Mon Mar 20 21:33:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 32780 at Mon Mar 20 21:33:45 UTC 2023 kill -USR1 32780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32780 killed at Mon Mar 20 21:33:45 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32846 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32846 found at Mon Mar 20 21:33:45 UTC 2023 selfserv_9887 with PID 32846 started at Mon Mar 20 21:33:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32846 at Mon Mar 20 21:33:47 UTC 2023 kill -USR1 32846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32846 killed at Mon Mar 20 21:33:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32898 found at Mon Mar 20 21:33:47 UTC 2023 selfserv_9887 with PID 32898 started at Mon Mar 20 21:33:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32898 at Mon Mar 20 21:33:48 UTC 2023 kill -USR1 32898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32898 killed at Mon Mar 20 21:33:48 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32950 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32950 found at Mon Mar 20 21:33:49 UTC 2023 selfserv_9887 with PID 32950 started at Mon Mar 20 21:33:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32950 at Mon Mar 20 21:33:50 UTC 2023 kill -USR1 32950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32950 killed at Mon Mar 20 21:33:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33023 found at Mon Mar 20 21:33:50 UTC 2023 selfserv_9887 with PID 33023 started at Mon Mar 20 21:33:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33023 at Mon Mar 20 21:33:51 UTC 2023 kill -USR1 33023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33023 killed at Mon Mar 20 21:33:51 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33075 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33075 found at Mon Mar 20 21:33:52 UTC 2023 selfserv_9887 with PID 33075 started at Mon Mar 20 21:33:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33075 at Mon Mar 20 21:33:53 UTC 2023 kill -USR1 33075 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33075 killed at Mon Mar 20 21:33:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:33:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33128 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33128 found at Mon Mar 20 21:33:53 UTC 2023 selfserv_9887 with PID 33128 started at Mon Mar 20 21:33:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33128 at Mon Mar 20 21:33:54 UTC 2023 kill -USR1 33128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33128 killed at Mon Mar 20 21:33:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33194 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33194 found at Mon Mar 20 21:33:54 UTC 2023 selfserv_9887 with PID 33194 started at Mon Mar 20 21:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33194 at Mon Mar 20 21:33:56 UTC 2023 kill -USR1 33194 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33194 killed at Mon Mar 20 21:33:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33246 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33246 found at Mon Mar 20 21:33:56 UTC 2023 selfserv_9887 with PID 33246 started at Mon Mar 20 21:33:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33246 at Mon Mar 20 21:33:58 UTC 2023 kill -USR1 33246 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33246 killed at Mon Mar 20 21:33:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:33:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:33:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33299 found at Mon Mar 20 21:33:58 UTC 2023 selfserv_9887 with PID 33299 started at Mon Mar 20 21:33:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33299 at Mon Mar 20 21:34:00 UTC 2023 kill -USR1 33299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33299 killed at Mon Mar 20 21:34:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33365 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33365 found at Mon Mar 20 21:34:00 UTC 2023 selfserv_9887 with PID 33365 started at Mon Mar 20 21:34:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33365 at Mon Mar 20 21:34:01 UTC 2023 kill -USR1 33365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33365 killed at Mon Mar 20 21:34:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33418 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33418 found at Mon Mar 20 21:34:01 UTC 2023 selfserv_9887 with PID 33418 started at Mon Mar 20 21:34:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33418 at Mon Mar 20 21:34:03 UTC 2023 kill -USR1 33418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33418 killed at Mon Mar 20 21:34:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33470 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33470 found at Mon Mar 20 21:34:03 UTC 2023 selfserv_9887 with PID 33470 started at Mon Mar 20 21:34:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33470 at Mon Mar 20 21:34:04 UTC 2023 kill -USR1 33470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33470 killed at Mon Mar 20 21:34:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33536 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33536 found at Mon Mar 20 21:34:04 UTC 2023 selfserv_9887 with PID 33536 started at Mon Mar 20 21:34:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33536 at Mon Mar 20 21:34:05 UTC 2023 kill -USR1 33536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33536 killed at Mon Mar 20 21:34:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33588 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33588 found at Mon Mar 20 21:34:06 UTC 2023 selfserv_9887 with PID 33588 started at Mon Mar 20 21:34:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33588 at Mon Mar 20 21:34:07 UTC 2023 kill -USR1 33588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33588 killed at Mon Mar 20 21:34:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33640 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33640 found at Mon Mar 20 21:34:07 UTC 2023 selfserv_9887 with PID 33640 started at Mon Mar 20 21:34:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33640 at Mon Mar 20 21:34:08 UTC 2023 kill -USR1 33640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33640 killed at Mon Mar 20 21:34:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33706 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33706 found at Mon Mar 20 21:34:09 UTC 2023 selfserv_9887 with PID 33706 started at Mon Mar 20 21:34:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33706 at Mon Mar 20 21:34:10 UTC 2023 kill -USR1 33706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33706 killed at Mon Mar 20 21:34:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33758 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33758 found at Mon Mar 20 21:34:10 UTC 2023 selfserv_9887 with PID 33758 started at Mon Mar 20 21:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33758 at Mon Mar 20 21:34:12 UTC 2023 kill -USR1 33758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33758 killed at Mon Mar 20 21:34:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33810 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33810 found at Mon Mar 20 21:34:12 UTC 2023 selfserv_9887 with PID 33810 started at Mon Mar 20 21:34:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33810 at Mon Mar 20 21:34:14 UTC 2023 kill -USR1 33810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33810 killed at Mon Mar 20 21:34:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33876 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33876 found at Mon Mar 20 21:34:14 UTC 2023 selfserv_9887 with PID 33876 started at Mon Mar 20 21:34:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33876 at Mon Mar 20 21:34:15 UTC 2023 kill -USR1 33876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33876 killed at Mon Mar 20 21:34:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33928 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33928 found at Mon Mar 20 21:34:15 UTC 2023 selfserv_9887 with PID 33928 started at Mon Mar 20 21:34:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33928 at Mon Mar 20 21:34:17 UTC 2023 kill -USR1 33928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33928 killed at Mon Mar 20 21:34:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33980 found at Mon Mar 20 21:34:17 UTC 2023 selfserv_9887 with PID 33980 started at Mon Mar 20 21:34:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33980 at Mon Mar 20 21:34:18 UTC 2023 kill -USR1 33980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33980 killed at Mon Mar 20 21:34:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34046 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34046 found at Mon Mar 20 21:34:19 UTC 2023 selfserv_9887 with PID 34046 started at Mon Mar 20 21:34:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34046 at Mon Mar 20 21:34:20 UTC 2023 kill -USR1 34046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34046 killed at Mon Mar 20 21:34:20 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34098 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34098 found at Mon Mar 20 21:34:20 UTC 2023 selfserv_9887 with PID 34098 started at Mon Mar 20 21:34:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34098 at Mon Mar 20 21:34:21 UTC 2023 kill -USR1 34098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34098 killed at Mon Mar 20 21:34:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34150 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34150 found at Mon Mar 20 21:34:21 UTC 2023 selfserv_9887 with PID 34150 started at Mon Mar 20 21:34:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34150 at Mon Mar 20 21:34:23 UTC 2023 kill -USR1 34150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34150 killed at Mon Mar 20 21:34:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34216 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34216 found at Mon Mar 20 21:34:23 UTC 2023 selfserv_9887 with PID 34216 started at Mon Mar 20 21:34:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34216 at Mon Mar 20 21:34:24 UTC 2023 kill -USR1 34216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34216 killed at Mon Mar 20 21:34:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34268 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34268 found at Mon Mar 20 21:34:25 UTC 2023 selfserv_9887 with PID 34268 started at Mon Mar 20 21:34:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34268 at Mon Mar 20 21:34:26 UTC 2023 kill -USR1 34268 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34268 killed at Mon Mar 20 21:34:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34320 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34320 found at Mon Mar 20 21:34:26 UTC 2023 selfserv_9887 with PID 34320 started at Mon Mar 20 21:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34320 at Mon Mar 20 21:34:28 UTC 2023 kill -USR1 34320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34320 killed at Mon Mar 20 21:34:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34386 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34386 found at Mon Mar 20 21:34:28 UTC 2023 selfserv_9887 with PID 34386 started at Mon Mar 20 21:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34386 at Mon Mar 20 21:34:29 UTC 2023 kill -USR1 34386 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34386 killed at Mon Mar 20 21:34:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34438 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34438 found at Mon Mar 20 21:34:30 UTC 2023 selfserv_9887 with PID 34438 started at Mon Mar 20 21:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34438 at Mon Mar 20 21:34:31 UTC 2023 kill -USR1 34438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34438 killed at Mon Mar 20 21:34:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34490 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34490 found at Mon Mar 20 21:34:31 UTC 2023 selfserv_9887 with PID 34490 started at Mon Mar 20 21:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34490 at Mon Mar 20 21:34:32 UTC 2023 kill -USR1 34490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34490 killed at Mon Mar 20 21:34:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34557 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34557 found at Mon Mar 20 21:34:33 UTC 2023 selfserv_9887 with PID 34557 started at Mon Mar 20 21:34:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34557 at Mon Mar 20 21:34:34 UTC 2023 kill -USR1 34557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34557 killed at Mon Mar 20 21:34:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34609 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34609 found at Mon Mar 20 21:34:34 UTC 2023 selfserv_9887 with PID 34609 started at Mon Mar 20 21:34:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34609 at Mon Mar 20 21:34:35 UTC 2023 kill -USR1 34609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34609 killed at Mon Mar 20 21:34:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34661 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34661 found at Mon Mar 20 21:34:36 UTC 2023 selfserv_9887 with PID 34661 started at Mon Mar 20 21:34:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34661 at Mon Mar 20 21:34:37 UTC 2023 kill -USR1 34661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34661 killed at Mon Mar 20 21:34:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34727 found at Mon Mar 20 21:34:37 UTC 2023 selfserv_9887 with PID 34727 started at Mon Mar 20 21:34:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34727 at Mon Mar 20 21:34:38 UTC 2023 kill -USR1 34727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34727 killed at Mon Mar 20 21:34:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34780 found at Mon Mar 20 21:34:39 UTC 2023 selfserv_9887 with PID 34780 started at Mon Mar 20 21:34:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34780 at Mon Mar 20 21:34:40 UTC 2023 kill -USR1 34780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34780 killed at Mon Mar 20 21:34:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34835 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34835 found at Mon Mar 20 21:34:41 UTC 2023 selfserv_9887 with PID 34835 started at Mon Mar 20 21:34:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34835 at Mon Mar 20 21:34:42 UTC 2023 kill -USR1 34835 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34835 killed at Mon Mar 20 21:34:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34913 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34913 found at Mon Mar 20 21:34:42 UTC 2023 selfserv_9887 with PID 34913 started at Mon Mar 20 21:34:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34913 at Mon Mar 20 21:34:43 UTC 2023 kill -USR1 34913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34913 killed at Mon Mar 20 21:34:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34965 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34965 found at Mon Mar 20 21:34:43 UTC 2023 selfserv_9887 with PID 34965 started at Mon Mar 20 21:34:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34965 at Mon Mar 20 21:34:44 UTC 2023 kill -USR1 34965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34965 killed at Mon Mar 20 21:34:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35017 found at Mon Mar 20 21:34:45 UTC 2023 selfserv_9887 with PID 35017 started at Mon Mar 20 21:34:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35017 at Mon Mar 20 21:34:46 UTC 2023 kill -USR1 35017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35017 killed at Mon Mar 20 21:34:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35083 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35083 found at Mon Mar 20 21:34:46 UTC 2023 selfserv_9887 with PID 35083 started at Mon Mar 20 21:34:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35083 at Mon Mar 20 21:34:47 UTC 2023 kill -USR1 35083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35083 killed at Mon Mar 20 21:34:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35135 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35135 found at Mon Mar 20 21:34:47 UTC 2023 selfserv_9887 with PID 35135 started at Mon Mar 20 21:34:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35135 at Mon Mar 20 21:34:48 UTC 2023 kill -USR1 35135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35135 killed at Mon Mar 20 21:34:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35188 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35188 found at Mon Mar 20 21:34:48 UTC 2023 selfserv_9887 with PID 35188 started at Mon Mar 20 21:34:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35188 at Mon Mar 20 21:34:49 UTC 2023 kill -USR1 35188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35188 killed at Mon Mar 20 21:34:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35255 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35255 found at Mon Mar 20 21:34:49 UTC 2023 selfserv_9887 with PID 35255 started at Mon Mar 20 21:34:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35255 at Mon Mar 20 21:34:50 UTC 2023 kill -USR1 35255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35255 killed at Mon Mar 20 21:34:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35307 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35307 found at Mon Mar 20 21:34:50 UTC 2023 selfserv_9887 with PID 35307 started at Mon Mar 20 21:34:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35307 at Mon Mar 20 21:34:51 UTC 2023 kill -USR1 35307 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35307 killed at Mon Mar 20 21:34:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35359 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35359 found at Mon Mar 20 21:34:52 UTC 2023 selfserv_9887 with PID 35359 started at Mon Mar 20 21:34:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35359 at Mon Mar 20 21:34:53 UTC 2023 kill -USR1 35359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35359 killed at Mon Mar 20 21:34:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35425 found at Mon Mar 20 21:34:53 UTC 2023 selfserv_9887 with PID 35425 started at Mon Mar 20 21:34:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35425 at Mon Mar 20 21:34:54 UTC 2023 kill -USR1 35425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35425 killed at Mon Mar 20 21:34:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35477 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35477 found at Mon Mar 20 21:34:54 UTC 2023 selfserv_9887 with PID 35477 started at Mon Mar 20 21:34:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35477 at Mon Mar 20 21:34:55 UTC 2023 kill -USR1 35477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35477 killed at Mon Mar 20 21:34:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:34:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35529 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35529 found at Mon Mar 20 21:34:55 UTC 2023 selfserv_9887 with PID 35529 started at Mon Mar 20 21:34:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35529 at Mon Mar 20 21:34:56 UTC 2023 kill -USR1 35529 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35529 killed at Mon Mar 20 21:34:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35595 found at Mon Mar 20 21:34:57 UTC 2023 selfserv_9887 with PID 35595 started at Mon Mar 20 21:34:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35595 at Mon Mar 20 21:34:57 UTC 2023 kill -USR1 35595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35595 killed at Mon Mar 20 21:34:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35647 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35647 found at Mon Mar 20 21:34:58 UTC 2023 selfserv_9887 with PID 35647 started at Mon Mar 20 21:34:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35647 at Mon Mar 20 21:34:58 UTC 2023 kill -USR1 35647 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35647 killed at Mon Mar 20 21:34:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:34:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:34:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35699 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35699 found at Mon Mar 20 21:34:59 UTC 2023 selfserv_9887 with PID 35699 started at Mon Mar 20 21:34:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35699 at Mon Mar 20 21:35:00 UTC 2023 kill -USR1 35699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35699 killed at Mon Mar 20 21:35:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35765 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35765 found at Mon Mar 20 21:35:00 UTC 2023 selfserv_9887 with PID 35765 started at Mon Mar 20 21:35:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35765 at Mon Mar 20 21:35:01 UTC 2023 kill -USR1 35765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35765 killed at Mon Mar 20 21:35:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35817 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35817 found at Mon Mar 20 21:35:01 UTC 2023 selfserv_9887 with PID 35817 started at Mon Mar 20 21:35:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35817 at Mon Mar 20 21:35:02 UTC 2023 kill -USR1 35817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35817 killed at Mon Mar 20 21:35:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35869 found at Mon Mar 20 21:35:03 UTC 2023 selfserv_9887 with PID 35869 started at Mon Mar 20 21:35:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35869 at Mon Mar 20 21:35:04 UTC 2023 kill -USR1 35869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35869 killed at Mon Mar 20 21:35:04 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35935 found at Mon Mar 20 21:35:04 UTC 2023 selfserv_9887 with PID 35935 started at Mon Mar 20 21:35:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35935 at Mon Mar 20 21:35:05 UTC 2023 kill -USR1 35935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35935 killed at Mon Mar 20 21:35:05 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35988 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35988 found at Mon Mar 20 21:35:05 UTC 2023 selfserv_9887 with PID 35988 started at Mon Mar 20 21:35:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35988 at Mon Mar 20 21:35:06 UTC 2023 kill -USR1 35988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35988 killed at Mon Mar 20 21:35:06 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36041 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36041 found at Mon Mar 20 21:35:06 UTC 2023 selfserv_9887 with PID 36041 started at Mon Mar 20 21:35:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36041 at Mon Mar 20 21:35:07 UTC 2023 kill -USR1 36041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36041 killed at Mon Mar 20 21:35:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36107 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36107 found at Mon Mar 20 21:35:08 UTC 2023 selfserv_9887 with PID 36107 started at Mon Mar 20 21:35:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36107 at Mon Mar 20 21:35:09 UTC 2023 kill -USR1 36107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36107 killed at Mon Mar 20 21:35:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36159 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36159 found at Mon Mar 20 21:35:09 UTC 2023 selfserv_9887 with PID 36159 started at Mon Mar 20 21:35:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36159 at Mon Mar 20 21:35:10 UTC 2023 kill -USR1 36159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36159 killed at Mon Mar 20 21:35:10 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36211 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36211 found at Mon Mar 20 21:35:10 UTC 2023 selfserv_9887 with PID 36211 started at Mon Mar 20 21:35:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36211 at Mon Mar 20 21:35:11 UTC 2023 kill -USR1 36211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36211 killed at Mon Mar 20 21:35:11 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36277 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36277 found at Mon Mar 20 21:35:11 UTC 2023 selfserv_9887 with PID 36277 started at Mon Mar 20 21:35:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36277 at Mon Mar 20 21:35:12 UTC 2023 kill -USR1 36277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36277 killed at Mon Mar 20 21:35:12 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36329 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36329 found at Mon Mar 20 21:35:13 UTC 2023 selfserv_9887 with PID 36329 started at Mon Mar 20 21:35:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36329 at Mon Mar 20 21:35:13 UTC 2023 kill -USR1 36329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36329 killed at Mon Mar 20 21:35:13 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36381 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36381 found at Mon Mar 20 21:35:14 UTC 2023 selfserv_9887 with PID 36381 started at Mon Mar 20 21:35:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36381 at Mon Mar 20 21:35:14 UTC 2023 kill -USR1 36381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36381 killed at Mon Mar 20 21:35:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36447 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36447 found at Mon Mar 20 21:35:15 UTC 2023 selfserv_9887 with PID 36447 started at Mon Mar 20 21:35:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36447 at Mon Mar 20 21:35:16 UTC 2023 kill -USR1 36447 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36447 killed at Mon Mar 20 21:35:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36499 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36499 found at Mon Mar 20 21:35:16 UTC 2023 selfserv_9887 with PID 36499 started at Mon Mar 20 21:35:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36499 at Mon Mar 20 21:35:17 UTC 2023 kill -USR1 36499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36499 killed at Mon Mar 20 21:35:17 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36551 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36551 found at Mon Mar 20 21:35:17 UTC 2023 selfserv_9887 with PID 36551 started at Mon Mar 20 21:35:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36551 at Mon Mar 20 21:35:18 UTC 2023 kill -USR1 36551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36551 killed at Mon Mar 20 21:35:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36618 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36618 found at Mon Mar 20 21:35:18 UTC 2023 selfserv_9887 with PID 36618 started at Mon Mar 20 21:35:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36618 at Mon Mar 20 21:35:19 UTC 2023 kill -USR1 36618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36618 killed at Mon Mar 20 21:35:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36670 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36670 found at Mon Mar 20 21:35:19 UTC 2023 selfserv_9887 with PID 36670 started at Mon Mar 20 21:35:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36670 at Mon Mar 20 21:35:20 UTC 2023 kill -USR1 36670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36670 killed at Mon Mar 20 21:35:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36722 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36722 found at Mon Mar 20 21:35:21 UTC 2023 selfserv_9887 with PID 36722 started at Mon Mar 20 21:35:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36722 at Mon Mar 20 21:35:22 UTC 2023 kill -USR1 36722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36722 killed at Mon Mar 20 21:35:22 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36788 found at Mon Mar 20 21:35:22 UTC 2023 selfserv_9887 with PID 36788 started at Mon Mar 20 21:35:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36788 at Mon Mar 20 21:35:23 UTC 2023 kill -USR1 36788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36788 killed at Mon Mar 20 21:35:23 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36840 found at Mon Mar 20 21:35:23 UTC 2023 selfserv_9887 with PID 36840 started at Mon Mar 20 21:35:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36840 at Mon Mar 20 21:35:24 UTC 2023 kill -USR1 36840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36840 killed at Mon Mar 20 21:35:24 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36892 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36892 found at Mon Mar 20 21:35:25 UTC 2023 selfserv_9887 with PID 36892 started at Mon Mar 20 21:35:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36892 at Mon Mar 20 21:35:26 UTC 2023 kill -USR1 36892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36892 killed at Mon Mar 20 21:35:26 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36958 found at Mon Mar 20 21:35:26 UTC 2023 selfserv_9887 with PID 36958 started at Mon Mar 20 21:35:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36958 at Mon Mar 20 21:35:27 UTC 2023 kill -USR1 36958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36958 killed at Mon Mar 20 21:35:27 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37010 found at Mon Mar 20 21:35:27 UTC 2023 selfserv_9887 with PID 37010 started at Mon Mar 20 21:35:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37010 at Mon Mar 20 21:35:28 UTC 2023 kill -USR1 37010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37010 killed at Mon Mar 20 21:35:28 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37062 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37062 found at Mon Mar 20 21:35:29 UTC 2023 selfserv_9887 with PID 37062 started at Mon Mar 20 21:35:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37062 at Mon Mar 20 21:35:30 UTC 2023 kill -USR1 37062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37062 killed at Mon Mar 20 21:35:30 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37128 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37128 found at Mon Mar 20 21:35:30 UTC 2023 selfserv_9887 with PID 37128 started at Mon Mar 20 21:35:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37128 at Mon Mar 20 21:35:31 UTC 2023 kill -USR1 37128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37128 killed at Mon Mar 20 21:35:31 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37180 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37180 found at Mon Mar 20 21:35:31 UTC 2023 selfserv_9887 with PID 37180 started at Mon Mar 20 21:35:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37180 at Mon Mar 20 21:35:32 UTC 2023 kill -USR1 37180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37180 killed at Mon Mar 20 21:35:32 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37232 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37232 found at Mon Mar 20 21:35:32 UTC 2023 selfserv_9887 with PID 37232 started at Mon Mar 20 21:35:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37232 at Mon Mar 20 21:35:33 UTC 2023 kill -USR1 37232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37232 killed at Mon Mar 20 21:35:33 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37298 found at Mon Mar 20 21:35:34 UTC 2023 selfserv_9887 with PID 37298 started at Mon Mar 20 21:35:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37298 at Mon Mar 20 21:35:35 UTC 2023 kill -USR1 37298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37298 killed at Mon Mar 20 21:35:35 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37350 found at Mon Mar 20 21:35:35 UTC 2023 selfserv_9887 with PID 37350 started at Mon Mar 20 21:35:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37350 at Mon Mar 20 21:35:36 UTC 2023 kill -USR1 37350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37350 killed at Mon Mar 20 21:35:36 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37402 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37402 found at Mon Mar 20 21:35:36 UTC 2023 selfserv_9887 with PID 37402 started at Mon Mar 20 21:35:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37402 at Mon Mar 20 21:35:37 UTC 2023 kill -USR1 37402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37402 killed at Mon Mar 20 21:35:37 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37468 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37468 found at Mon Mar 20 21:35:37 UTC 2023 selfserv_9887 with PID 37468 started at Mon Mar 20 21:35:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37468 at Mon Mar 20 21:35:38 UTC 2023 kill -USR1 37468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37468 killed at Mon Mar 20 21:35:38 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37520 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37520 found at Mon Mar 20 21:35:38 UTC 2023 selfserv_9887 with PID 37520 started at Mon Mar 20 21:35:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37520 at Mon Mar 20 21:35:39 UTC 2023 kill -USR1 37520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37520 killed at Mon Mar 20 21:35:39 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37572 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37572 found at Mon Mar 20 21:35:40 UTC 2023 selfserv_9887 with PID 37572 started at Mon Mar 20 21:35:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37572 at Mon Mar 20 21:35:41 UTC 2023 kill -USR1 37572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37572 killed at Mon Mar 20 21:35:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37642 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37642 found at Mon Mar 20 21:35:41 UTC 2023 selfserv_9887 with PID 37642 started at Mon Mar 20 21:35:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37642 at Mon Mar 20 21:35:42 UTC 2023 kill -USR1 37642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37642 killed at Mon Mar 20 21:35:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37699 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37699 found at Mon Mar 20 21:35:42 UTC 2023 selfserv_9887 with PID 37699 started at Mon Mar 20 21:35:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37699 at Mon Mar 20 21:35:43 UTC 2023 kill -USR1 37699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37699 killed at Mon Mar 20 21:35:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37758 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37758 found at Mon Mar 20 21:35:43 UTC 2023 selfserv_9887 with PID 37758 started at Mon Mar 20 21:35:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37758 at Mon Mar 20 21:35:44 UTC 2023 kill -USR1 37758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37758 killed at Mon Mar 20 21:35:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37824 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37824 found at Mon Mar 20 21:35:44 UTC 2023 selfserv_9887 with PID 37824 started at Mon Mar 20 21:35:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37824 at Mon Mar 20 21:35:45 UTC 2023 kill -USR1 37824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37824 killed at Mon Mar 20 21:35:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37876 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37876 found at Mon Mar 20 21:35:45 UTC 2023 selfserv_9887 with PID 37876 started at Mon Mar 20 21:35:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37876 at Mon Mar 20 21:35:46 UTC 2023 kill -USR1 37876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37876 killed at Mon Mar 20 21:35:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37929 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37929 found at Mon Mar 20 21:35:46 UTC 2023 selfserv_9887 with PID 37929 started at Mon Mar 20 21:35:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37929 at Mon Mar 20 21:35:47 UTC 2023 kill -USR1 37929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37929 killed at Mon Mar 20 21:35:47 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37995 found at Mon Mar 20 21:35:48 UTC 2023 selfserv_9887 with PID 37995 started at Mon Mar 20 21:35:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 37995 at Mon Mar 20 21:35:48 UTC 2023 kill -USR1 37995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37995 killed at Mon Mar 20 21:35:48 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38047 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38047 found at Mon Mar 20 21:35:49 UTC 2023 selfserv_9887 with PID 38047 started at Mon Mar 20 21:35:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38047 at Mon Mar 20 21:35:49 UTC 2023 kill -USR1 38047 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38047 killed at Mon Mar 20 21:35:49 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38099 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38099 found at Mon Mar 20 21:35:50 UTC 2023 selfserv_9887 with PID 38099 started at Mon Mar 20 21:35:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38099 at Mon Mar 20 21:35:50 UTC 2023 kill -USR1 38099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38099 killed at Mon Mar 20 21:35:50 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38165 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38165 found at Mon Mar 20 21:35:51 UTC 2023 selfserv_9887 with PID 38165 started at Mon Mar 20 21:35:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38165 at Mon Mar 20 21:35:51 UTC 2023 kill -USR1 38165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38165 killed at Mon Mar 20 21:35:52 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38217 found at Mon Mar 20 21:35:52 UTC 2023 selfserv_9887 with PID 38217 started at Mon Mar 20 21:35:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38217 at Mon Mar 20 21:35:53 UTC 2023 kill -USR1 38217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38217 killed at Mon Mar 20 21:35:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38269 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38269 found at Mon Mar 20 21:35:53 UTC 2023 selfserv_9887 with PID 38269 started at Mon Mar 20 21:35:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38269 at Mon Mar 20 21:35:54 UTC 2023 kill -USR1 38269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38269 killed at Mon Mar 20 21:35:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38335 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38335 found at Mon Mar 20 21:35:54 UTC 2023 selfserv_9887 with PID 38335 started at Mon Mar 20 21:35:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38335 at Mon Mar 20 21:35:55 UTC 2023 kill -USR1 38335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38335 killed at Mon Mar 20 21:35:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38387 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38387 found at Mon Mar 20 21:35:56 UTC 2023 selfserv_9887 with PID 38387 started at Mon Mar 20 21:35:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38387 at Mon Mar 20 21:35:57 UTC 2023 kill -USR1 38387 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38387 killed at Mon Mar 20 21:35:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:35:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38439 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38439 found at Mon Mar 20 21:35:57 UTC 2023 selfserv_9887 with PID 38439 started at Mon Mar 20 21:35:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38439 at Mon Mar 20 21:35:58 UTC 2023 kill -USR1 38439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38439 killed at Mon Mar 20 21:35:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:35:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:35:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38505 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38505 found at Mon Mar 20 21:35:58 UTC 2023 selfserv_9887 with PID 38505 started at Mon Mar 20 21:35:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38505 at Mon Mar 20 21:36:00 UTC 2023 kill -USR1 38505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38505 killed at Mon Mar 20 21:36:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38557 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38557 found at Mon Mar 20 21:36:00 UTC 2023 selfserv_9887 with PID 38557 started at Mon Mar 20 21:36:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38557 at Mon Mar 20 21:36:01 UTC 2023 kill -USR1 38557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38557 killed at Mon Mar 20 21:36:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38609 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38609 found at Mon Mar 20 21:36:01 UTC 2023 selfserv_9887 with PID 38609 started at Mon Mar 20 21:36:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38609 at Mon Mar 20 21:36:03 UTC 2023 kill -USR1 38609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38609 killed at Mon Mar 20 21:36:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38675 found at Mon Mar 20 21:36:03 UTC 2023 selfserv_9887 with PID 38675 started at Mon Mar 20 21:36:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38675 at Mon Mar 20 21:36:04 UTC 2023 kill -USR1 38675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38675 killed at Mon Mar 20 21:36:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38727 found at Mon Mar 20 21:36:04 UTC 2023 selfserv_9887 with PID 38727 started at Mon Mar 20 21:36:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38727 at Mon Mar 20 21:36:06 UTC 2023 kill -USR1 38727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38727 killed at Mon Mar 20 21:36:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38779 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38779 found at Mon Mar 20 21:36:06 UTC 2023 selfserv_9887 with PID 38779 started at Mon Mar 20 21:36:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38779 at Mon Mar 20 21:36:07 UTC 2023 kill -USR1 38779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38779 killed at Mon Mar 20 21:36:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38845 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38845 found at Mon Mar 20 21:36:07 UTC 2023 selfserv_9887 with PID 38845 started at Mon Mar 20 21:36:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38845 at Mon Mar 20 21:36:08 UTC 2023 kill -USR1 38845 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38845 killed at Mon Mar 20 21:36:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38897 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38897 found at Mon Mar 20 21:36:09 UTC 2023 selfserv_9887 with PID 38897 started at Mon Mar 20 21:36:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38897 at Mon Mar 20 21:36:10 UTC 2023 kill -USR1 38897 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38897 killed at Mon Mar 20 21:36:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38950 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38950 found at Mon Mar 20 21:36:10 UTC 2023 selfserv_9887 with PID 38950 started at Mon Mar 20 21:36:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38950 at Mon Mar 20 21:36:11 UTC 2023 kill -USR1 38950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38950 killed at Mon Mar 20 21:36:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39016 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39016 found at Mon Mar 20 21:36:12 UTC 2023 selfserv_9887 with PID 39016 started at Mon Mar 20 21:36:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39016 at Mon Mar 20 21:36:13 UTC 2023 kill -USR1 39016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39016 killed at Mon Mar 20 21:36:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39068 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39068 found at Mon Mar 20 21:36:13 UTC 2023 selfserv_9887 with PID 39068 started at Mon Mar 20 21:36:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39068 at Mon Mar 20 21:36:14 UTC 2023 kill -USR1 39068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39068 killed at Mon Mar 20 21:36:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39120 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39120 found at Mon Mar 20 21:36:15 UTC 2023 selfserv_9887 with PID 39120 started at Mon Mar 20 21:36:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39120 at Mon Mar 20 21:36:16 UTC 2023 kill -USR1 39120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39120 killed at Mon Mar 20 21:36:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39186 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39186 found at Mon Mar 20 21:36:16 UTC 2023 selfserv_9887 with PID 39186 started at Mon Mar 20 21:36:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39186 at Mon Mar 20 21:36:18 UTC 2023 kill -USR1 39186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39186 killed at Mon Mar 20 21:36:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39238 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39238 found at Mon Mar 20 21:36:18 UTC 2023 selfserv_9887 with PID 39238 started at Mon Mar 20 21:36:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39238 at Mon Mar 20 21:36:19 UTC 2023 kill -USR1 39238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39238 killed at Mon Mar 20 21:36:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39292 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39292 found at Mon Mar 20 21:36:19 UTC 2023 selfserv_9887 with PID 39292 started at Mon Mar 20 21:36:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39292 at Mon Mar 20 21:36:21 UTC 2023 kill -USR1 39292 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39292 killed at Mon Mar 20 21:36:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39358 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39358 found at Mon Mar 20 21:36:21 UTC 2023 selfserv_9887 with PID 39358 started at Mon Mar 20 21:36:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39358 at Mon Mar 20 21:36:22 UTC 2023 kill -USR1 39358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39358 killed at Mon Mar 20 21:36:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39410 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39410 found at Mon Mar 20 21:36:22 UTC 2023 selfserv_9887 with PID 39410 started at Mon Mar 20 21:36:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39410 at Mon Mar 20 21:36:23 UTC 2023 kill -USR1 39410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39410 killed at Mon Mar 20 21:36:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39462 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39462 found at Mon Mar 20 21:36:24 UTC 2023 selfserv_9887 with PID 39462 started at Mon Mar 20 21:36:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39462 at Mon Mar 20 21:36:25 UTC 2023 kill -USR1 39462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39462 killed at Mon Mar 20 21:36:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39528 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39528 found at Mon Mar 20 21:36:25 UTC 2023 selfserv_9887 with PID 39528 started at Mon Mar 20 21:36:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39528 at Mon Mar 20 21:36:26 UTC 2023 kill -USR1 39528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39528 killed at Mon Mar 20 21:36:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39581 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39581 found at Mon Mar 20 21:36:27 UTC 2023 selfserv_9887 with PID 39581 started at Mon Mar 20 21:36:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39581 at Mon Mar 20 21:36:28 UTC 2023 kill -USR1 39581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39581 killed at Mon Mar 20 21:36:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39633 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39633 found at Mon Mar 20 21:36:28 UTC 2023 selfserv_9887 with PID 39633 started at Mon Mar 20 21:36:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39633 at Mon Mar 20 21:36:29 UTC 2023 kill -USR1 39633 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39633 killed at Mon Mar 20 21:36:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39699 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39699 found at Mon Mar 20 21:36:30 UTC 2023 selfserv_9887 with PID 39699 started at Mon Mar 20 21:36:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39699 at Mon Mar 20 21:36:30 UTC 2023 kill -USR1 39699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39699 killed at Mon Mar 20 21:36:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39751 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39751 found at Mon Mar 20 21:36:31 UTC 2023 selfserv_9887 with PID 39751 started at Mon Mar 20 21:36:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39751 at Mon Mar 20 21:36:31 UTC 2023 kill -USR1 39751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39751 killed at Mon Mar 20 21:36:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39803 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39803 found at Mon Mar 20 21:36:32 UTC 2023 selfserv_9887 with PID 39803 started at Mon Mar 20 21:36:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39803 at Mon Mar 20 21:36:32 UTC 2023 kill -USR1 39803 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39803 killed at Mon Mar 20 21:36:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39869 found at Mon Mar 20 21:36:33 UTC 2023 selfserv_9887 with PID 39869 started at Mon Mar 20 21:36:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39869 at Mon Mar 20 21:36:34 UTC 2023 kill -USR1 39869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39869 killed at Mon Mar 20 21:36:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39922 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39922 found at Mon Mar 20 21:36:34 UTC 2023 selfserv_9887 with PID 39922 started at Mon Mar 20 21:36:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39922 at Mon Mar 20 21:36:35 UTC 2023 kill -USR1 39922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39922 killed at Mon Mar 20 21:36:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39974 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39974 found at Mon Mar 20 21:36:35 UTC 2023 selfserv_9887 with PID 39974 started at Mon Mar 20 21:36:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39974 at Mon Mar 20 21:36:36 UTC 2023 kill -USR1 39974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39974 killed at Mon Mar 20 21:36:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40044 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40044 found at Mon Mar 20 21:36:36 UTC 2023 selfserv_9887 with PID 40044 started at Mon Mar 20 21:36:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40044 at Mon Mar 20 21:36:37 UTC 2023 kill -USR1 40044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40044 killed at Mon Mar 20 21:36:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40096 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40096 found at Mon Mar 20 21:36:38 UTC 2023 selfserv_9887 with PID 40096 started at Mon Mar 20 21:36:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40096 at Mon Mar 20 21:36:38 UTC 2023 kill -USR1 40096 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40096 killed at Mon Mar 20 21:36:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:36:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40149 found at Mon Mar 20 21:36:39 UTC 2023 selfserv_9887 with PID 40149 started at Mon Mar 20 21:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40149 at Mon Mar 20 21:36:39 UTC 2023 kill -USR1 40149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40149 killed at Mon Mar 20 21:36:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40215 found at Mon Mar 20 21:36:40 UTC 2023 selfserv_9887 with PID 40215 started at Mon Mar 20 21:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40215 at Mon Mar 20 21:36:41 UTC 2023 kill -USR1 40215 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40215 killed at Mon Mar 20 21:36:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40270 found at Mon Mar 20 21:36:41 UTC 2023 selfserv_9887 with PID 40270 started at Mon Mar 20 21:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40270 at Mon Mar 20 21:36:42 UTC 2023 kill -USR1 40270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40270 killed at Mon Mar 20 21:36:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40327 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40327 found at Mon Mar 20 21:36:42 UTC 2023 selfserv_9887 with PID 40327 started at Mon Mar 20 21:36:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40327 at Mon Mar 20 21:36:43 UTC 2023 kill -USR1 40327 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40327 killed at Mon Mar 20 21:36:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40400 found at Mon Mar 20 21:36:43 UTC 2023 selfserv_9887 with PID 40400 started at Mon Mar 20 21:36:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40400 at Mon Mar 20 21:36:45 UTC 2023 kill -USR1 40400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40400 killed at Mon Mar 20 21:36:45 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40452 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40452 found at Mon Mar 20 21:36:45 UTC 2023 selfserv_9887 with PID 40452 started at Mon Mar 20 21:36:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40452 at Mon Mar 20 21:36:46 UTC 2023 kill -USR1 40452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40452 killed at Mon Mar 20 21:36:46 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40504 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40504 found at Mon Mar 20 21:36:47 UTC 2023 selfserv_9887 with PID 40504 started at Mon Mar 20 21:36:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40504 at Mon Mar 20 21:36:48 UTC 2023 kill -USR1 40504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40504 killed at Mon Mar 20 21:36:48 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40570 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40570 found at Mon Mar 20 21:36:48 UTC 2023 selfserv_9887 with PID 40570 started at Mon Mar 20 21:36:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40570 at Mon Mar 20 21:36:49 UTC 2023 kill -USR1 40570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40570 killed at Mon Mar 20 21:36:49 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40622 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40622 found at Mon Mar 20 21:36:49 UTC 2023 selfserv_9887 with PID 40622 started at Mon Mar 20 21:36:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40622 at Mon Mar 20 21:36:50 UTC 2023 kill -USR1 40622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40622 killed at Mon Mar 20 21:36:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:36:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40674 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40674 found at Mon Mar 20 21:36:51 UTC 2023 selfserv_9887 with PID 40674 started at Mon Mar 20 21:36:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40674 at Mon Mar 20 21:36:52 UTC 2023 kill -USR1 40674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40674 killed at Mon Mar 20 21:36:52 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9887 starting at Mon Mar 20 21:36:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:36:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:52 UTC 2023 selfserv_9887 with PID 40745 started at Mon Mar 20 21:36:52 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:53 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:54 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:55 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:55 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:56 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:57 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:58 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:59 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:36:59 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:00 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:01 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:02 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:02 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:04 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:05 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:05 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:06 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:07 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:08 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:08 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:09 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:10 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:10 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:11 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:12 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:13 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:14 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:15 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:16 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:16 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:17 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:18 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:19 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:19 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:20 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:21 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:22 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:22 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40745 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40745 found at Mon Mar 20 21:37:23 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 40745 at Mon Mar 20 21:37:23 UTC 2023 kill -USR1 40745 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40745 killed at Mon Mar 20 21:37:23 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:37:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:37:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:23 UTC 2023 selfserv_9887 with PID 1350 started at Mon Mar 20 21:37:23 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:24 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:25 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:25 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:26 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:26 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:27 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:28 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:28 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:29 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:29 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:30 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:30 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:31 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:32 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:33 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:33 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:34 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:34 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:35 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:35 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:36 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:36 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:37 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:37 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:38 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:38 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:39 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:40 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:40 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:41 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:41 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:42 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:43 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:43 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:43 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:44 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:44 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:45 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1350 found at Mon Mar 20 21:37:45 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 1350 at Mon Mar 20 21:37:46 UTC 2023 kill -USR1 1350 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1350 killed at Mon Mar 20 21:37:46 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:37:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:37:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:46 UTC 2023 selfserv_9887 with PID 2625 started at Mon Mar 20 21:37:46 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:47 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:47 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:48 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:48 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:49 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:49 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:50 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:50 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:51 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:51 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:51 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:52 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:52 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:53 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:54 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:54 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:55 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:55 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:55 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:56 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:56 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:57 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:57 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:58 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:58 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:59 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:37:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:00 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:00 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:01 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:01 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:01 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:02 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:02 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:03 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:03 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:03 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:04 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:04 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2625 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2625 found at Mon Mar 20 21:38:05 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2625 at Mon Mar 20 21:38:05 UTC 2023 kill -USR1 2625 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2625 killed at Mon Mar 20 21:38:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:38:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:38:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:05 UTC 2023 selfserv_9887 with PID 3907 started at Mon Mar 20 21:38:05 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:06 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:06 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:07 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:07 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:08 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:08 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:08 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:09 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:09 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:09 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:10 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:10 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:11 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:12 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:12 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:12 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:13 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:13 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:13 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:14 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:14 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:15 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:15 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:15 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:16 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:16 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:17 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:17 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:18 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:18 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:18 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:19 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:19 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:20 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:20 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:20 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:21 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:21 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3907 found at Mon Mar 20 21:38:21 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 3907 at Mon Mar 20 21:38:21 UTC 2023 kill -USR1 3907 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3907 killed at Mon Mar 20 21:38:22 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:38:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:38:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5173 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5173 found at Mon Mar 20 21:38:22 UTC 2023 selfserv_9887 with PID 5173 started at Mon Mar 20 21:38:22 UTC 2023 trying to kill selfserv_9887 with PID 5173 at Mon Mar 20 21:38:22 UTC 2023 kill -USR1 5173 ./ssl.sh: line 228: 5173 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9887 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5173 killed at Mon Mar 20 21:38:22 UTC 2023 selfserv_9887 starting at Mon Mar 20 21:38:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:38:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:22 UTC 2023 selfserv_9887 with PID 5215 started at Mon Mar 20 21:38:22 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:24 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:24 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:25 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:26 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:27 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:28 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:29 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:30 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:31 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:32 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:33 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:34 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:35 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:36 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:37 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:38 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:39 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:39 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:40 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:41 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:42 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:43 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:44 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:45 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:46 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:47 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:48 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:50 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:51 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:52 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:52 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:53 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:54 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:55 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:56 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:57 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:58 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:38:59 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:39:00 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5215 found at Mon Mar 20 21:39:01 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5215 at Mon Mar 20 21:39:01 UTC 2023 kill -USR1 5215 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5215 killed at Mon Mar 20 21:39:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:39:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:39:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:01 UTC 2023 selfserv_9887 with PID 6515 started at Mon Mar 20 21:39:01 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:03 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:04 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:04 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:05 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:06 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:07 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:08 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:09 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:10 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:11 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:12 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:13 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:14 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:16 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:17 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:18 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:19 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:20 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:21 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:22 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:23 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:24 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:25 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:26 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:27 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:28 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:30 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:31 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:32 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:33 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:34 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:35 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:36 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:37 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:38 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:38 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:39 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:40 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6515 found at Mon Mar 20 21:39:41 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6515 at Mon Mar 20 21:39:41 UTC 2023 kill -USR1 6515 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6515 killed at Mon Mar 20 21:39:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:39:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:39:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:42 UTC 2023 selfserv_9887 with PID 7814 started at Mon Mar 20 21:39:42 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:43 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:43 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:44 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:44 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:45 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:46 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:46 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:47 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:47 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:48 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:48 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:49 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:49 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:51 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:52 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:52 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:53 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:53 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:54 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:54 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:55 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:55 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:56 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:57 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:57 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:58 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:39:59 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:00 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:00 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:01 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:01 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:02 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:03 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:03 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:04 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:04 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:05 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:05 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7814 found at Mon Mar 20 21:40:06 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7814 at Mon Mar 20 21:40:06 UTC 2023 kill -USR1 7814 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7814 killed at Mon Mar 20 21:40:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:40:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:40:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:06 UTC 2023 selfserv_9887 with PID 9090 started at Mon Mar 20 21:40:06 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:07 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:08 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:09 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:09 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:10 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:11 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:11 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:12 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:13 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:13 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:14 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:15 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:15 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:17 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:17 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:18 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:18 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:19 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:20 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:20 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:21 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:21 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:22 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:23 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:23 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:24 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:25 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:26 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:27 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:27 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:28 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:28 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:29 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:30 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:30 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:31 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:32 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:32 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9090 found at Mon Mar 20 21:40:33 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9090 at Mon Mar 20 21:40:33 UTC 2023 kill -USR1 9090 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9090 killed at Mon Mar 20 21:40:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:40:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:40:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:33 UTC 2023 selfserv_9887 with PID 10351 started at Mon Mar 20 21:40:33 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:34 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:35 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:36 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:36 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:37 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:38 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:39 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:39 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:40 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:41 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:41 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:42 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:43 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:44 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:45 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:45 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:46 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:47 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:47 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:48 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:49 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:49 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:50 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:51 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:51 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:52 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:53 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:54 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:55 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:55 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:56 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:57 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:57 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:58 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:59 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:40:59 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:41:00 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:41:01 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10351 found at Mon Mar 20 21:41:01 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10351 at Mon Mar 20 21:41:01 UTC 2023 kill -USR1 10351 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10351 killed at Mon Mar 20 21:41:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:41:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:41:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:02 UTC 2023 selfserv_9887 with PID 11629 started at Mon Mar 20 21:41:02 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:03 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:03 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:04 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:04 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:05 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:05 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:05 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:06 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:06 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:07 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:07 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:08 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:08 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:09 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:10 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:10 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:11 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:11 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:12 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:12 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:12 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:13 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:13 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:14 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:14 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:15 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:16 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:16 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:17 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:17 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:18 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:18 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:18 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:19 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:19 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:20 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:20 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:21 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11629 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11629 found at Mon Mar 20 21:41:21 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11629 at Mon Mar 20 21:41:21 UTC 2023 kill -USR1 11629 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11629 killed at Mon Mar 20 21:41:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:41:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:41:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12901 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12901 found at Mon Mar 20 21:41:21 UTC 2023 selfserv_9887 with PID 12901 started at Mon Mar 20 21:41:21 UTC 2023 trying to kill selfserv_9887 with PID 12901 at Mon Mar 20 21:41:21 UTC 2023 kill -USR1 12901 ./ssl.sh: line 228: 12901 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9887 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12901 killed at Mon Mar 20 21:41:21 UTC 2023 selfserv_9887 starting at Mon Mar 20 21:41:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:41:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:22 UTC 2023 selfserv_9887 with PID 12943 started at Mon Mar 20 21:41:22 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:23 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:24 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:25 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:26 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:27 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:28 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:29 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:30 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:31 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:32 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:33 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:33 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:34 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:36 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:37 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:38 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:39 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:40 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:41 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:42 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:43 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:44 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:45 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:46 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:47 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:47 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:48 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:49 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:50 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:51 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:52 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:53 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:54 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:55 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:56 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:57 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:58 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:59 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:41:59 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12943 found at Mon Mar 20 21:42:00 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12943 at Mon Mar 20 21:42:00 UTC 2023 kill -USR1 12943 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12943 killed at Mon Mar 20 21:42:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:42:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:42:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:01 UTC 2023 selfserv_9887 with PID 14217 started at Mon Mar 20 21:42:01 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:02 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:03 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:04 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:05 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:06 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:07 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:08 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:09 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:10 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:11 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:12 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:13 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:14 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:16 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:17 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:18 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:19 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:20 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:21 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:22 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:23 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:24 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:25 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:26 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:27 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:28 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:29 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:30 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:31 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:32 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:33 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:34 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:35 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:36 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:37 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:38 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:39 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:40 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14217 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14217 found at Mon Mar 20 21:42:41 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14217 at Mon Mar 20 21:42:41 UTC 2023 kill -USR1 14217 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14217 killed at Mon Mar 20 21:42:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:42:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:42:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:41 UTC 2023 selfserv_9887 with PID 15485 started at Mon Mar 20 21:42:41 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:42 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:43 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:43 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:44 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:45 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:45 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:46 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:46 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:47 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:47 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:48 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:48 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:49 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:51 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:51 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:52 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:52 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:53 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:53 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:54 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:54 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:55 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:56 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:56 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:57 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:57 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:58 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:59 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:42:59 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:00 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:00 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:01 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:02 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:02 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:03 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:03 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:04 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:04 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:05 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 21:43:05 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15485 at Mon Mar 20 21:43:05 UTC 2023 kill -USR1 15485 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15485 killed at Mon Mar 20 21:43:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:43:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:43:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:06 UTC 2023 selfserv_9887 with PID 16754 started at Mon Mar 20 21:43:06 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:07 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:08 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:08 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:09 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:09 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:10 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:11 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:11 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:12 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:13 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:13 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:14 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:15 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:16 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:17 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:17 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:18 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:19 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:19 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:20 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:20 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:21 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:22 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:22 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:23 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:24 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:25 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:26 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:26 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:27 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:27 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:28 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:29 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:29 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:30 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:31 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:31 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:32 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16754 found at Mon Mar 20 21:43:32 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16754 at Mon Mar 20 21:43:32 UTC 2023 kill -USR1 16754 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16754 killed at Mon Mar 20 21:43:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:43:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:43:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:33 UTC 2023 selfserv_9887 with PID 18023 started at Mon Mar 20 21:43:33 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:34 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:35 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:35 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:36 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:37 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:37 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:38 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:39 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:39 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:40 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:41 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:42 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:42 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:44 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:44 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:45 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:46 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:46 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:47 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:48 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:48 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:49 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:50 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:50 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:51 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:52 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:53 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:54 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:54 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:55 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:56 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:56 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:57 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:58 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:58 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:43:59 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:44:00 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:44:00 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18023 found at Mon Mar 20 21:44:01 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 18023 at Mon Mar 20 21:44:01 UTC 2023 kill -USR1 18023 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18023 killed at Mon Mar 20 21:44:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:44:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:01 UTC 2023 selfserv_9887 with PID 19299 started at Mon Mar 20 21:44:01 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:02 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:03 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:03 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:04 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:04 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:05 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:05 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:05 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:06 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:06 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:07 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:07 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:08 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:09 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:09 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:10 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:10 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:11 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:11 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:12 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:12 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:12 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:13 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:13 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:14 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:14 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:15 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:16 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:16 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:17 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:17 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:18 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:18 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:18 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:19 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:19 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:20 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:20 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19299 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19299 found at Mon Mar 20 21:44:21 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19299 at Mon Mar 20 21:44:21 UTC 2023 kill -USR1 19299 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19299 killed at Mon Mar 20 21:44:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:44:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20564 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20564 found at Mon Mar 20 21:44:21 UTC 2023 selfserv_9887 with PID 20564 started at Mon Mar 20 21:44:21 UTC 2023 trying to kill selfserv_9887 with PID 20564 at Mon Mar 20 21:44:21 UTC 2023 kill -USR1 20564 ./ssl.sh: line 228: 20564 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9887 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20564 killed at Mon Mar 20 21:44:21 UTC 2023 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9887 starting at Mon Mar 20 21:44:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -M 3 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20669 found at Mon Mar 20 21:44:22 UTC 2023 selfserv_9887 with PID 20669 started at Mon Mar 20 21:44:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 20669 at Mon Mar 20 21:44:23 UTC 2023 kill -USR1 20669 SIG_USER: Parent got sig_user, killing children (3). Child 3 exited with exit code 100 Child 2 exited with exit code 100 Child 1 exited with exit code 100 selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20669 killed at Mon Mar 20 21:44:23 UTC 2023 ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9887 starting at Mon Mar 20 21:44:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20734 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20734 found at Mon Mar 20 21:44:23 UTC 2023 selfserv_9887 with PID 20734 started at Mon Mar 20 21:44:23 UTC 2023 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #663: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #666: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #667: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #668: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #669: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #670: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #671: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #672: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #673: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #674: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #683: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #686: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #687: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #688: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #689: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #690: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #691: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20734 at Mon Mar 20 21:44:29 UTC 2023 kill -USR1 20734 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20734 killed at Mon Mar 20 21:44:29 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 21:44:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 21184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21184 found at Mon Mar 20 21:44:29 UTC 2023 selfserv_9887 with PID 21184 started at Mon Mar 20 21:44:29 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 21184 at Mon Mar 20 21:44:38 UTC 2023 kill -USR1 21184 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21184 killed at Mon Mar 20 21:44:38 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 21:44:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 21735 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21735 found at Mon Mar 20 21:44:39 UTC 2023 selfserv_9887 with PID 21735 started at Mon Mar 20 21:44:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21735 at Mon Mar 20 21:44:57 UTC 2023 kill -USR1 21735 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21735 killed at Mon Mar 20 21:44:58 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 21:44:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22552 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22552 found at Mon Mar 20 21:44:58 UTC 2023 selfserv_9887 with PID 22552 started at Mon Mar 20 21:44:58 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22552 at Mon Mar 20 21:44:58 UTC 2023 kill -USR1 22552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22552 killed at Mon Mar 20 21:44:58 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:44:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:44:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22618 found at Mon Mar 20 21:44:59 UTC 2023 selfserv_9887 with PID 22618 started at Mon Mar 20 21:44:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22618 at Mon Mar 20 21:45:00 UTC 2023 kill -USR1 22618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22618 killed at Mon Mar 20 21:45:00 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22670 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22670 found at Mon Mar 20 21:45:00 UTC 2023 selfserv_9887 with PID 22670 started at Mon Mar 20 21:45:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22670 at Mon Mar 20 21:45:01 UTC 2023 kill -USR1 22670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22670 killed at Mon Mar 20 21:45:01 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22722 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22722 found at Mon Mar 20 21:45:01 UTC 2023 selfserv_9887 with PID 22722 started at Mon Mar 20 21:45:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22722 at Mon Mar 20 21:45:03 UTC 2023 kill -USR1 22722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22722 killed at Mon Mar 20 21:45:03 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22774 found at Mon Mar 20 21:45:03 UTC 2023 selfserv_9887 with PID 22774 started at Mon Mar 20 21:45:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22774 at Mon Mar 20 21:45:04 UTC 2023 kill -USR1 22774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22774 killed at Mon Mar 20 21:45:04 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22826 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22826 found at Mon Mar 20 21:45:04 UTC 2023 selfserv_9887 with PID 22826 started at Mon Mar 20 21:45:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22826 at Mon Mar 20 21:45:05 UTC 2023 kill -USR1 22826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22826 killed at Mon Mar 20 21:45:05 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22878 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22878 found at Mon Mar 20 21:45:05 UTC 2023 selfserv_9887 with PID 22878 started at Mon Mar 20 21:45:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22878 at Mon Mar 20 21:45:07 UTC 2023 kill -USR1 22878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22878 killed at Mon Mar 20 21:45:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22930 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22930 found at Mon Mar 20 21:45:07 UTC 2023 selfserv_9887 with PID 22930 started at Mon Mar 20 21:45:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22930 at Mon Mar 20 21:45:08 UTC 2023 kill -USR1 22930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22930 killed at Mon Mar 20 21:45:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22982 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22982 found at Mon Mar 20 21:45:08 UTC 2023 selfserv_9887 with PID 22982 started at Mon Mar 20 21:45:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22982 at Mon Mar 20 21:45:09 UTC 2023 kill -USR1 22982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22982 killed at Mon Mar 20 21:45:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23034 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23034 found at Mon Mar 20 21:45:09 UTC 2023 selfserv_9887 with PID 23034 started at Mon Mar 20 21:45:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23034 at Mon Mar 20 21:45:10 UTC 2023 kill -USR1 23034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23034 killed at Mon Mar 20 21:45:10 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23086 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23086 found at Mon Mar 20 21:45:10 UTC 2023 selfserv_9887 with PID 23086 started at Mon Mar 20 21:45:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23086 at Mon Mar 20 21:45:11 UTC 2023 kill -USR1 23086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23086 killed at Mon Mar 20 21:45:11 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23138 found at Mon Mar 20 21:45:11 UTC 2023 selfserv_9887 with PID 23138 started at Mon Mar 20 21:45:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23138 at Mon Mar 20 21:45:12 UTC 2023 kill -USR1 23138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23138 killed at Mon Mar 20 21:45:12 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23190 found at Mon Mar 20 21:45:13 UTC 2023 selfserv_9887 with PID 23190 started at Mon Mar 20 21:45:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23190 at Mon Mar 20 21:45:14 UTC 2023 kill -USR1 23190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23190 killed at Mon Mar 20 21:45:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23242 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23242 found at Mon Mar 20 21:45:14 UTC 2023 selfserv_9887 with PID 23242 started at Mon Mar 20 21:45:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23242 at Mon Mar 20 21:45:15 UTC 2023 kill -USR1 23242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23242 killed at Mon Mar 20 21:45:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23297 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23297 found at Mon Mar 20 21:45:15 UTC 2023 selfserv_9887 with PID 23297 started at Mon Mar 20 21:45:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23297 at Mon Mar 20 21:45:17 UTC 2023 kill -USR1 23297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23297 killed at Mon Mar 20 21:45:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23349 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23349 found at Mon Mar 20 21:45:17 UTC 2023 selfserv_9887 with PID 23349 started at Mon Mar 20 21:45:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23349 at Mon Mar 20 21:45:18 UTC 2023 kill -USR1 23349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23349 killed at Mon Mar 20 21:45:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23401 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23401 found at Mon Mar 20 21:45:19 UTC 2023 selfserv_9887 with PID 23401 started at Mon Mar 20 21:45:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23401 at Mon Mar 20 21:45:20 UTC 2023 kill -USR1 23401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23401 killed at Mon Mar 20 21:45:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23453 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23453 found at Mon Mar 20 21:45:20 UTC 2023 selfserv_9887 with PID 23453 started at Mon Mar 20 21:45:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23453 at Mon Mar 20 21:45:21 UTC 2023 kill -USR1 23453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23453 killed at Mon Mar 20 21:45:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23505 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23505 found at Mon Mar 20 21:45:22 UTC 2023 selfserv_9887 with PID 23505 started at Mon Mar 20 21:45:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23505 at Mon Mar 20 21:45:23 UTC 2023 kill -USR1 23505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23505 killed at Mon Mar 20 21:45:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23558 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23558 found at Mon Mar 20 21:45:23 UTC 2023 selfserv_9887 with PID 23558 started at Mon Mar 20 21:45:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23558 at Mon Mar 20 21:45:25 UTC 2023 kill -USR1 23558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23558 killed at Mon Mar 20 21:45:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23610 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23610 found at Mon Mar 20 21:45:25 UTC 2023 selfserv_9887 with PID 23610 started at Mon Mar 20 21:45:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23610 at Mon Mar 20 21:45:26 UTC 2023 kill -USR1 23610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23610 killed at Mon Mar 20 21:45:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23662 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23662 found at Mon Mar 20 21:45:26 UTC 2023 selfserv_9887 with PID 23662 started at Mon Mar 20 21:45:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23662 at Mon Mar 20 21:45:28 UTC 2023 kill -USR1 23662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23662 killed at Mon Mar 20 21:45:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23714 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23714 found at Mon Mar 20 21:45:28 UTC 2023 selfserv_9887 with PID 23714 started at Mon Mar 20 21:45:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23714 at Mon Mar 20 21:45:29 UTC 2023 kill -USR1 23714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23714 killed at Mon Mar 20 21:45:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23766 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23766 found at Mon Mar 20 21:45:30 UTC 2023 selfserv_9887 with PID 23766 started at Mon Mar 20 21:45:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23766 at Mon Mar 20 21:45:31 UTC 2023 kill -USR1 23766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23766 killed at Mon Mar 20 21:45:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23818 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23818 found at Mon Mar 20 21:45:31 UTC 2023 selfserv_9887 with PID 23818 started at Mon Mar 20 21:45:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23818 at Mon Mar 20 21:45:33 UTC 2023 kill -USR1 23818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23818 killed at Mon Mar 20 21:45:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23870 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23870 found at Mon Mar 20 21:45:33 UTC 2023 selfserv_9887 with PID 23870 started at Mon Mar 20 21:45:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23870 at Mon Mar 20 21:45:34 UTC 2023 kill -USR1 23870 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23870 killed at Mon Mar 20 21:45:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23922 found at Mon Mar 20 21:45:34 UTC 2023 selfserv_9887 with PID 23922 started at Mon Mar 20 21:45:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23922 at Mon Mar 20 21:45:35 UTC 2023 kill -USR1 23922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23922 killed at Mon Mar 20 21:45:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23974 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23974 found at Mon Mar 20 21:45:35 UTC 2023 selfserv_9887 with PID 23974 started at Mon Mar 20 21:45:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23974 at Mon Mar 20 21:45:36 UTC 2023 kill -USR1 23974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23974 killed at Mon Mar 20 21:45:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24026 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24026 found at Mon Mar 20 21:45:36 UTC 2023 selfserv_9887 with PID 24026 started at Mon Mar 20 21:45:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #817: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24026 at Mon Mar 20 21:45:37 UTC 2023 kill -USR1 24026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24026 killed at Mon Mar 20 21:45:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24078 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24078 found at Mon Mar 20 21:45:38 UTC 2023 selfserv_9887 with PID 24078 started at Mon Mar 20 21:45:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24078 at Mon Mar 20 21:45:38 UTC 2023 kill -USR1 24078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24078 killed at Mon Mar 20 21:45:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24131 found at Mon Mar 20 21:45:39 UTC 2023 selfserv_9887 with PID 24131 started at Mon Mar 20 21:45:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24131 at Mon Mar 20 21:45:40 UTC 2023 kill -USR1 24131 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24131 killed at Mon Mar 20 21:45:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24186 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24186 found at Mon Mar 20 21:45:40 UTC 2023 selfserv_9887 with PID 24186 started at Mon Mar 20 21:45:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24186 at Mon Mar 20 21:45:41 UTC 2023 kill -USR1 24186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24186 killed at Mon Mar 20 21:45:41 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24245 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24245 found at Mon Mar 20 21:45:41 UTC 2023 selfserv_9887 with PID 24245 started at Mon Mar 20 21:45:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24245 at Mon Mar 20 21:45:42 UTC 2023 kill -USR1 24245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24245 killed at Mon Mar 20 21:45:42 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24301 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24301 found at Mon Mar 20 21:45:43 UTC 2023 selfserv_9887 with PID 24301 started at Mon Mar 20 21:45:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24301 at Mon Mar 20 21:45:43 UTC 2023 kill -USR1 24301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24301 killed at Mon Mar 20 21:45:43 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24356 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24356 found at Mon Mar 20 21:45:44 UTC 2023 selfserv_9887 with PID 24356 started at Mon Mar 20 21:45:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #823: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24356 at Mon Mar 20 21:45:44 UTC 2023 kill -USR1 24356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24356 killed at Mon Mar 20 21:45:45 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24408 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24408 found at Mon Mar 20 21:45:45 UTC 2023 selfserv_9887 with PID 24408 started at Mon Mar 20 21:45:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24408 at Mon Mar 20 21:45:46 UTC 2023 kill -USR1 24408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24408 killed at Mon Mar 20 21:45:46 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24460 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24460 found at Mon Mar 20 21:45:46 UTC 2023 selfserv_9887 with PID 24460 started at Mon Mar 20 21:45:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24460 at Mon Mar 20 21:45:47 UTC 2023 kill -USR1 24460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24460 killed at Mon Mar 20 21:45:47 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24512 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24512 found at Mon Mar 20 21:45:47 UTC 2023 selfserv_9887 with PID 24512 started at Mon Mar 20 21:45:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24512 at Mon Mar 20 21:45:48 UTC 2023 kill -USR1 24512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24512 killed at Mon Mar 20 21:45:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24564 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24564 found at Mon Mar 20 21:45:49 UTC 2023 selfserv_9887 with PID 24564 started at Mon Mar 20 21:45:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24564 at Mon Mar 20 21:45:50 UTC 2023 kill -USR1 24564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24564 killed at Mon Mar 20 21:45:50 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24616 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24616 found at Mon Mar 20 21:45:50 UTC 2023 selfserv_9887 with PID 24616 started at Mon Mar 20 21:45:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #828: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24616 at Mon Mar 20 21:45:51 UTC 2023 kill -USR1 24616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24616 killed at Mon Mar 20 21:45:51 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24669 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24669 found at Mon Mar 20 21:45:51 UTC 2023 selfserv_9887 with PID 24669 started at Mon Mar 20 21:45:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24669 at Mon Mar 20 21:45:52 UTC 2023 kill -USR1 24669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24669 killed at Mon Mar 20 21:45:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24721 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24721 found at Mon Mar 20 21:45:53 UTC 2023 selfserv_9887 with PID 24721 started at Mon Mar 20 21:45:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24721 at Mon Mar 20 21:45:53 UTC 2023 kill -USR1 24721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24721 killed at Mon Mar 20 21:45:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24773 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24773 found at Mon Mar 20 21:45:54 UTC 2023 selfserv_9887 with PID 24773 started at Mon Mar 20 21:45:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24773 at Mon Mar 20 21:45:55 UTC 2023 kill -USR1 24773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24773 killed at Mon Mar 20 21:45:55 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24825 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24825 found at Mon Mar 20 21:45:55 UTC 2023 selfserv_9887 with PID 24825 started at Mon Mar 20 21:45:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24825 at Mon Mar 20 21:45:56 UTC 2023 kill -USR1 24825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24825 killed at Mon Mar 20 21:45:56 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24878 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24878 found at Mon Mar 20 21:45:56 UTC 2023 selfserv_9887 with PID 24878 started at Mon Mar 20 21:45:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24878 at Mon Mar 20 21:45:57 UTC 2023 kill -USR1 24878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24878 killed at Mon Mar 20 21:45:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:45:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24930 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24930 found at Mon Mar 20 21:45:57 UTC 2023 selfserv_9887 with PID 24930 started at Mon Mar 20 21:45:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24930 at Mon Mar 20 21:45:58 UTC 2023 kill -USR1 24930 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24930 killed at Mon Mar 20 21:45:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:45:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:45:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24982 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24982 found at Mon Mar 20 21:45:58 UTC 2023 selfserv_9887 with PID 24982 started at Mon Mar 20 21:45:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24982 at Mon Mar 20 21:46:00 UTC 2023 kill -USR1 24982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24982 killed at Mon Mar 20 21:46:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:46:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25034 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25034 found at Mon Mar 20 21:46:00 UTC 2023 selfserv_9887 with PID 25034 started at Mon Mar 20 21:46:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25034 at Mon Mar 20 21:46:01 UTC 2023 kill -USR1 25034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25034 killed at Mon Mar 20 21:46:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25086 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25086 found at Mon Mar 20 21:46:01 UTC 2023 selfserv_9887 with PID 25086 started at Mon Mar 20 21:46:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25086 at Mon Mar 20 21:46:03 UTC 2023 kill -USR1 25086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25086 killed at Mon Mar 20 21:46:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:46:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25138 found at Mon Mar 20 21:46:03 UTC 2023 selfserv_9887 with PID 25138 started at Mon Mar 20 21:46:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25138 at Mon Mar 20 21:46:04 UTC 2023 kill -USR1 25138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25138 killed at Mon Mar 20 21:46:04 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25190 found at Mon Mar 20 21:46:04 UTC 2023 selfserv_9887 with PID 25190 started at Mon Mar 20 21:46:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25190 at Mon Mar 20 21:46:06 UTC 2023 kill -USR1 25190 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25190 killed at Mon Mar 20 21:46:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:46:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25242 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25242 found at Mon Mar 20 21:46:06 UTC 2023 selfserv_9887 with PID 25242 started at Mon Mar 20 21:46:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25242 at Mon Mar 20 21:46:07 UTC 2023 kill -USR1 25242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25242 killed at Mon Mar 20 21:46:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25294 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25294 found at Mon Mar 20 21:46:07 UTC 2023 selfserv_9887 with PID 25294 started at Mon Mar 20 21:46:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25294 at Mon Mar 20 21:46:09 UTC 2023 kill -USR1 25294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25294 killed at Mon Mar 20 21:46:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:46:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25346 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25346 found at Mon Mar 20 21:46:09 UTC 2023 selfserv_9887 with PID 25346 started at Mon Mar 20 21:46:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25346 at Mon Mar 20 21:46:10 UTC 2023 kill -USR1 25346 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25346 killed at Mon Mar 20 21:46:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25398 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25398 found at Mon Mar 20 21:46:10 UTC 2023 selfserv_9887 with PID 25398 started at Mon Mar 20 21:46:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25398 at Mon Mar 20 21:46:11 UTC 2023 kill -USR1 25398 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25398 killed at Mon Mar 20 21:46:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:46:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25450 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25450 found at Mon Mar 20 21:46:11 UTC 2023 selfserv_9887 with PID 25450 started at Mon Mar 20 21:46:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25450 at Mon Mar 20 21:46:12 UTC 2023 kill -USR1 25450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25450 killed at Mon Mar 20 21:46:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25502 found at Mon Mar 20 21:46:12 UTC 2023 selfserv_9887 with PID 25502 started at Mon Mar 20 21:46:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25502 at Mon Mar 20 21:46:13 UTC 2023 kill -USR1 25502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25502 killed at Mon Mar 20 21:46:13 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25554 found at Mon Mar 20 21:46:13 UTC 2023 selfserv_9887 with PID 25554 started at Mon Mar 20 21:46:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25554 at Mon Mar 20 21:46:15 UTC 2023 kill -USR1 25554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25554 killed at Mon Mar 20 21:46:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:46:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25606 found at Mon Mar 20 21:46:15 UTC 2023 selfserv_9887 with PID 25606 started at Mon Mar 20 21:46:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25606 at Mon Mar 20 21:46:16 UTC 2023 kill -USR1 25606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25606 killed at Mon Mar 20 21:46:16 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:46:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25664 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25664 found at Mon Mar 20 21:46:16 UTC 2023 selfserv_9887 with PID 25664 started at Mon Mar 20 21:46:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25664 at Mon Mar 20 21:46:17 UTC 2023 kill -USR1 25664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25664 killed at Mon Mar 20 21:46:17 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 21:46:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25722 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25722 found at Mon Mar 20 21:46:18 UTC 2023 selfserv_9887 with PID 25722 started at Mon Mar 20 21:46:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25722 at Mon Mar 20 21:46:19 UTC 2023 kill -USR1 25722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25722 killed at Mon Mar 20 21:46:19 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 21:46:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25780 found at Mon Mar 20 21:46:19 UTC 2023 selfserv_9887 with PID 25780 started at Mon Mar 20 21:46:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25780 at Mon Mar 20 21:46:20 UTC 2023 kill -USR1 25780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25780 killed at Mon Mar 20 21:46:20 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:46:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25840 found at Mon Mar 20 21:46:20 UTC 2023 selfserv_9887 with PID 25840 started at Mon Mar 20 21:46:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25840 at Mon Mar 20 21:46:21 UTC 2023 kill -USR1 25840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25840 killed at Mon Mar 20 21:46:21 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 21:46:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25898 found at Mon Mar 20 21:46:21 UTC 2023 selfserv_9887 with PID 25898 started at Mon Mar 20 21:46:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #852: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25898 at Mon Mar 20 21:46:22 UTC 2023 kill -USR1 25898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25898 killed at Mon Mar 20 21:46:22 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:46:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25957 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25957 found at Mon Mar 20 21:46:22 UTC 2023 selfserv_9887 with PID 25957 started at Mon Mar 20 21:46:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25957 at Mon Mar 20 21:46:23 UTC 2023 kill -USR1 25957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25957 killed at Mon Mar 20 21:46:23 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 21:46:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26015 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26015 found at Mon Mar 20 21:46:24 UTC 2023 selfserv_9887 with PID 26015 started at Mon Mar 20 21:46:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26015 at Mon Mar 20 21:46:25 UTC 2023 kill -USR1 26015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26015 killed at Mon Mar 20 21:46:25 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 21:46:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26073 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26073 found at Mon Mar 20 21:46:25 UTC 2023 selfserv_9887 with PID 26073 started at Mon Mar 20 21:46:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #855: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26073 at Mon Mar 20 21:46:26 UTC 2023 kill -USR1 26073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26073 killed at Mon Mar 20 21:46:26 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 21:46:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26131 found at Mon Mar 20 21:46:26 UTC 2023 selfserv_9887 with PID 26131 started at Mon Mar 20 21:46:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #856: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26131 at Mon Mar 20 21:46:27 UTC 2023 kill -USR1 26131 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26131 killed at Mon Mar 20 21:46:27 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 21:46:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26190 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26190 found at Mon Mar 20 21:46:27 UTC 2023 selfserv_9887 with PID 26190 started at Mon Mar 20 21:46:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #857: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26190 at Mon Mar 20 21:46:28 UTC 2023 kill -USR1 26190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26190 killed at Mon Mar 20 21:46:28 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 21:46:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26232 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26232 found at Mon Mar 20 21:46:28 UTC 2023 selfserv_9887 with PID 26232 started at Mon Mar 20 21:46:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #790: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26232 at Mon Mar 20 21:46:29 UTC 2023 kill -USR1 26232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26232 killed at Mon Mar 20 21:46:29 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 21:46:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26274 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26274 found at Mon Mar 20 21:46:30 UTC 2023 selfserv_9887 with PID 26274 started at Mon Mar 20 21:46:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 26274 at Mon Mar 20 21:46:31 UTC 2023 kill -USR1 26274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26274 killed at Mon Mar 20 21:46:31 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 21:46:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26316 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26316 found at Mon Mar 20 21:46:31 UTC 2023 selfserv_9887 with PID 26316 started at Mon Mar 20 21:46:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 26316 at Mon Mar 20 21:46:32 UTC 2023 kill -USR1 26316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26316 killed at Mon Mar 20 21:46:32 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 21:46:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26358 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26358 found at Mon Mar 20 21:46:32 UTC 2023 selfserv_9887 with PID 26358 started at Mon Mar 20 21:46:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 26358 at Mon Mar 20 21:46:33 UTC 2023 kill -USR1 26358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26358 killed at Mon Mar 20 21:46:33 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 21:46:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26400 found at Mon Mar 20 21:46:33 UTC 2023 selfserv_9887 with PID 26400 started at Mon Mar 20 21:46:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 26400 at Mon Mar 20 21:46:34 UTC 2023 kill -USR1 26400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26400 killed at Mon Mar 20 21:46:34 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 21:46:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26442 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26442 found at Mon Mar 20 21:46:34 UTC 2023 selfserv_9887 with PID 26442 started at Mon Mar 20 21:46:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 26442 at Mon Mar 20 21:46:35 UTC 2023 kill -USR1 26442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26442 killed at Mon Mar 20 21:46:35 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 21:46:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26484 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26484 found at Mon Mar 20 21:46:35 UTC 2023 selfserv_9887 with PID 26484 started at Mon Mar 20 21:46:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #796: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 26484 at Mon Mar 20 21:46:36 UTC 2023 kill -USR1 26484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26484 killed at Mon Mar 20 21:46:36 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 21:46:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:46:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26526 found at Mon Mar 20 21:46:36 UTC 2023 selfserv_9887 with PID 26526 started at Mon Mar 20 21:46:36 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 21:46:36 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 21:47:49 UTC 2023 ssl.sh: #797: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 26526 at Mon Mar 20 21:47:49 UTC 2023 kill -USR1 26526 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26526 killed at Mon Mar 20 21:47:49 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 21:47:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26608 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26608 found at Mon Mar 20 21:47:49 UTC 2023 selfserv_9887 with PID 26608 started at Mon Mar 20 21:47:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26608 at Mon Mar 20 21:47:50 UTC 2023 kill -USR1 26608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26608 killed at Mon Mar 20 21:47:50 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26650 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26650 found at Mon Mar 20 21:47:50 UTC 2023 selfserv_9887 with PID 26650 started at Mon Mar 20 21:47:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26650 at Mon Mar 20 21:47:51 UTC 2023 kill -USR1 26650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26650 killed at Mon Mar 20 21:47:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26689 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26689 found at Mon Mar 20 21:47:51 UTC 2023 selfserv_9887 with PID 26689 started at Mon Mar 20 21:47:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 26689 at Mon Mar 20 21:47:51 UTC 2023 kill -USR1 26689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26689 killed at Mon Mar 20 21:47:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26728 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26728 found at Mon Mar 20 21:47:52 UTC 2023 selfserv_9887 with PID 26728 started at Mon Mar 20 21:47:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26728 at Mon Mar 20 21:47:52 UTC 2023 kill -USR1 26728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26728 killed at Mon Mar 20 21:47:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26767 found at Mon Mar 20 21:47:52 UTC 2023 selfserv_9887 with PID 26767 started at Mon Mar 20 21:47:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #802: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 26767 at Mon Mar 20 21:47:53 UTC 2023 kill -USR1 26767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26767 killed at Mon Mar 20 21:47:53 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26806 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26806 found at Mon Mar 20 21:47:53 UTC 2023 selfserv_9887 with PID 26806 started at Mon Mar 20 21:47:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26806 at Mon Mar 20 21:47:54 UTC 2023 kill -USR1 26806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26806 killed at Mon Mar 20 21:47:54 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26845 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26845 found at Mon Mar 20 21:47:54 UTC 2023 selfserv_9887 with PID 26845 started at Mon Mar 20 21:47:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26845 at Mon Mar 20 21:47:55 UTC 2023 kill -USR1 26845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26845 killed at Mon Mar 20 21:47:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26884 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26884 found at Mon Mar 20 21:47:55 UTC 2023 selfserv_9887 with PID 26884 started at Mon Mar 20 21:47:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26884 at Mon Mar 20 21:47:55 UTC 2023 kill -USR1 26884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26884 killed at Mon Mar 20 21:47:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26923 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26923 found at Mon Mar 20 21:47:56 UTC 2023 selfserv_9887 with PID 26923 started at Mon Mar 20 21:47:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26923 at Mon Mar 20 21:47:56 UTC 2023 kill -USR1 26923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26923 killed at Mon Mar 20 21:47:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26962 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26962 found at Mon Mar 20 21:47:56 UTC 2023 selfserv_9887 with PID 26962 started at Mon Mar 20 21:47:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26962 at Mon Mar 20 21:47:57 UTC 2023 kill -USR1 26962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26962 killed at Mon Mar 20 21:47:57 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27001 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27001 found at Mon Mar 20 21:47:57 UTC 2023 selfserv_9887 with PID 27001 started at Mon Mar 20 21:47:57 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27001 at Mon Mar 20 21:47:58 UTC 2023 kill -USR1 27001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27001 killed at Mon Mar 20 21:47:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27041 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27041 found at Mon Mar 20 21:47:58 UTC 2023 selfserv_9887 with PID 27041 started at Mon Mar 20 21:47:58 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27041 at Mon Mar 20 21:47:58 UTC 2023 kill -USR1 27041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27041 killed at Mon Mar 20 21:47:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27081 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27081 found at Mon Mar 20 21:47:59 UTC 2023 selfserv_9887 with PID 27081 started at Mon Mar 20 21:47:59 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27081 at Mon Mar 20 21:47:59 UTC 2023 kill -USR1 27081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27081 killed at Mon Mar 20 21:47:59 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:47:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:47:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27121 found at Mon Mar 20 21:47:59 UTC 2023 selfserv_9887 with PID 27121 started at Mon Mar 20 21:47:59 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 27121 at Mon Mar 20 21:48:00 UTC 2023 kill -USR1 27121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27121 killed at Mon Mar 20 21:48:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:48:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27162 found at Mon Mar 20 21:48:00 UTC 2023 selfserv_9887 with PID 27162 started at Mon Mar 20 21:48:00 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27162 at Mon Mar 20 21:48:01 UTC 2023 kill -USR1 27162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27162 killed at Mon Mar 20 21:48:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:48:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27203 found at Mon Mar 20 21:48:01 UTC 2023 selfserv_9887 with PID 27203 started at Mon Mar 20 21:48:01 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27203 at Mon Mar 20 21:48:01 UTC 2023 kill -USR1 27203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27203 killed at Mon Mar 20 21:48:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:48:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27244 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27244 found at Mon Mar 20 21:48:02 UTC 2023 selfserv_9887 with PID 27244 started at Mon Mar 20 21:48:02 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27244 at Mon Mar 20 21:48:02 UTC 2023 kill -USR1 27244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27244 killed at Mon Mar 20 21:48:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:48:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27284 found at Mon Mar 20 21:48:02 UTC 2023 selfserv_9887 with PID 27284 started at Mon Mar 20 21:48:02 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27284 at Mon Mar 20 21:48:03 UTC 2023 kill -USR1 27284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27284 killed at Mon Mar 20 21:48:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:48:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27324 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27324 found at Mon Mar 20 21:48:03 UTC 2023 selfserv_9887 with PID 27324 started at Mon Mar 20 21:48:03 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27324 at Mon Mar 20 21:48:04 UTC 2023 kill -USR1 27324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27324 killed at Mon Mar 20 21:48:04 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 21:48:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 27364 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27364 found at Mon Mar 20 21:48:04 UTC 2023 selfserv_9887 with PID 27364 started at Mon Mar 20 21:48:04 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 27364 at Mon Mar 20 21:48:14 UTC 2023 kill -USR1 27364 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27364 killed at Mon Mar 20 21:48:14 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 21:48:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 27915 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 27915 found at Mon Mar 20 21:48:14 UTC 2023 selfserv_9887 with PID 27915 started at Mon Mar 20 21:48:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 27915 at Mon Mar 20 21:48:30 UTC 2023 kill -USR1 27915 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 27915 killed at Mon Mar 20 21:48:30 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28730 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28730 found at Mon Mar 20 21:48:30 UTC 2023 selfserv_9887 with PID 28730 started at Mon Mar 20 21:48:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28730 at Mon Mar 20 21:48:32 UTC 2023 kill -USR1 28730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28730 killed at Mon Mar 20 21:48:32 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:48:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28782 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28782 found at Mon Mar 20 21:48:32 UTC 2023 selfserv_9887 with PID 28782 started at Mon Mar 20 21:48:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28782 at Mon Mar 20 21:48:34 UTC 2023 kill -USR1 28782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28782 killed at Mon Mar 20 21:48:34 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28834 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28834 found at Mon Mar 20 21:48:34 UTC 2023 selfserv_9887 with PID 28834 started at Mon Mar 20 21:48:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28834 at Mon Mar 20 21:48:36 UTC 2023 kill -USR1 28834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28834 killed at Mon Mar 20 21:48:36 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28886 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28886 found at Mon Mar 20 21:48:36 UTC 2023 selfserv_9887 with PID 28886 started at Mon Mar 20 21:48:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28886 at Mon Mar 20 21:48:38 UTC 2023 kill -USR1 28886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28886 killed at Mon Mar 20 21:48:38 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:48:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28938 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28938 found at Mon Mar 20 21:48:38 UTC 2023 selfserv_9887 with PID 28938 started at Mon Mar 20 21:48:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28938 at Mon Mar 20 21:48:40 UTC 2023 kill -USR1 28938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28938 killed at Mon Mar 20 21:48:40 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28993 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28993 found at Mon Mar 20 21:48:40 UTC 2023 selfserv_9887 with PID 28993 started at Mon Mar 20 21:48:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 28993 at Mon Mar 20 21:48:42 UTC 2023 kill -USR1 28993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28993 killed at Mon Mar 20 21:48:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29054 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29054 found at Mon Mar 20 21:48:43 UTC 2023 selfserv_9887 with PID 29054 started at Mon Mar 20 21:48:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29054 at Mon Mar 20 21:48:44 UTC 2023 kill -USR1 29054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29054 killed at Mon Mar 20 21:48:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:48:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29109 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29109 found at Mon Mar 20 21:48:45 UTC 2023 selfserv_9887 with PID 29109 started at Mon Mar 20 21:48:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29109 at Mon Mar 20 21:48:46 UTC 2023 kill -USR1 29109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29109 killed at Mon Mar 20 21:48:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29162 found at Mon Mar 20 21:48:47 UTC 2023 selfserv_9887 with PID 29162 started at Mon Mar 20 21:48:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29162 at Mon Mar 20 21:48:49 UTC 2023 kill -USR1 29162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29162 killed at Mon Mar 20 21:48:49 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29214 found at Mon Mar 20 21:48:49 UTC 2023 selfserv_9887 with PID 29214 started at Mon Mar 20 21:48:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29214 at Mon Mar 20 21:48:51 UTC 2023 kill -USR1 29214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29214 killed at Mon Mar 20 21:48:51 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:48:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29266 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29266 found at Mon Mar 20 21:48:51 UTC 2023 selfserv_9887 with PID 29266 started at Mon Mar 20 21:48:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29266 at Mon Mar 20 21:48:52 UTC 2023 kill -USR1 29266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29266 killed at Mon Mar 20 21:48:52 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29318 found at Mon Mar 20 21:48:53 UTC 2023 selfserv_9887 with PID 29318 started at Mon Mar 20 21:48:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29318 at Mon Mar 20 21:48:55 UTC 2023 kill -USR1 29318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29318 killed at Mon Mar 20 21:48:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29370 found at Mon Mar 20 21:48:55 UTC 2023 selfserv_9887 with PID 29370 started at Mon Mar 20 21:48:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29370 at Mon Mar 20 21:48:57 UTC 2023 kill -USR1 29370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29370 killed at Mon Mar 20 21:48:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:48:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29423 found at Mon Mar 20 21:48:57 UTC 2023 selfserv_9887 with PID 29423 started at Mon Mar 20 21:48:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29423 at Mon Mar 20 21:48:59 UTC 2023 kill -USR1 29423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29423 killed at Mon Mar 20 21:48:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:48:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:48:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29475 found at Mon Mar 20 21:48:59 UTC 2023 selfserv_9887 with PID 29475 started at Mon Mar 20 21:48:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29475 at Mon Mar 20 21:49:01 UTC 2023 kill -USR1 29475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29475 killed at Mon Mar 20 21:49:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29527 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29527 found at Mon Mar 20 21:49:01 UTC 2023 selfserv_9887 with PID 29527 started at Mon Mar 20 21:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29527 at Mon Mar 20 21:49:03 UTC 2023 kill -USR1 29527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29527 killed at Mon Mar 20 21:49:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29579 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29579 found at Mon Mar 20 21:49:03 UTC 2023 selfserv_9887 with PID 29579 started at Mon Mar 20 21:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29579 at Mon Mar 20 21:49:05 UTC 2023 kill -USR1 29579 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29579 killed at Mon Mar 20 21:49:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29631 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29631 found at Mon Mar 20 21:49:05 UTC 2023 selfserv_9887 with PID 29631 started at Mon Mar 20 21:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29631 at Mon Mar 20 21:49:07 UTC 2023 kill -USR1 29631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29631 killed at Mon Mar 20 21:49:08 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29683 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29683 found at Mon Mar 20 21:49:08 UTC 2023 selfserv_9887 with PID 29683 started at Mon Mar 20 21:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29683 at Mon Mar 20 21:49:09 UTC 2023 kill -USR1 29683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29683 killed at Mon Mar 20 21:49:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29735 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29735 found at Mon Mar 20 21:49:10 UTC 2023 selfserv_9887 with PID 29735 started at Mon Mar 20 21:49:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29735 at Mon Mar 20 21:49:11 UTC 2023 kill -USR1 29735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29735 killed at Mon Mar 20 21:49:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29787 found at Mon Mar 20 21:49:12 UTC 2023 selfserv_9887 with PID 29787 started at Mon Mar 20 21:49:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29787 at Mon Mar 20 21:49:14 UTC 2023 kill -USR1 29787 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29787 killed at Mon Mar 20 21:49:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29839 found at Mon Mar 20 21:49:14 UTC 2023 selfserv_9887 with PID 29839 started at Mon Mar 20 21:49:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29839 at Mon Mar 20 21:49:16 UTC 2023 kill -USR1 29839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29839 killed at Mon Mar 20 21:49:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29891 found at Mon Mar 20 21:49:16 UTC 2023 selfserv_9887 with PID 29891 started at Mon Mar 20 21:49:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29891 at Mon Mar 20 21:49:18 UTC 2023 kill -USR1 29891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29891 killed at Mon Mar 20 21:49:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29944 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29944 found at Mon Mar 20 21:49:18 UTC 2023 selfserv_9887 with PID 29944 started at Mon Mar 20 21:49:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29944 at Mon Mar 20 21:49:20 UTC 2023 kill -USR1 29944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29944 killed at Mon Mar 20 21:49:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29998 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29998 found at Mon Mar 20 21:49:21 UTC 2023 selfserv_9887 with PID 29998 started at Mon Mar 20 21:49:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 29998 at Mon Mar 20 21:49:22 UTC 2023 kill -USR1 29998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29998 killed at Mon Mar 20 21:49:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30050 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30050 found at Mon Mar 20 21:49:23 UTC 2023 selfserv_9887 with PID 30050 started at Mon Mar 20 21:49:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30050 at Mon Mar 20 21:49:24 UTC 2023 kill -USR1 30050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30050 killed at Mon Mar 20 21:49:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30102 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30102 found at Mon Mar 20 21:49:24 UTC 2023 selfserv_9887 with PID 30102 started at Mon Mar 20 21:49:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30102 at Mon Mar 20 21:49:27 UTC 2023 kill -USR1 30102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30102 killed at Mon Mar 20 21:49:27 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30154 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30154 found at Mon Mar 20 21:49:27 UTC 2023 selfserv_9887 with PID 30154 started at Mon Mar 20 21:49:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #971: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30154 at Mon Mar 20 21:49:29 UTC 2023 kill -USR1 30154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30154 killed at Mon Mar 20 21:49:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30207 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30207 found at Mon Mar 20 21:49:29 UTC 2023 selfserv_9887 with PID 30207 started at Mon Mar 20 21:49:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30207 at Mon Mar 20 21:49:31 UTC 2023 kill -USR1 30207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30207 killed at Mon Mar 20 21:49:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30259 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30259 found at Mon Mar 20 21:49:31 UTC 2023 selfserv_9887 with PID 30259 started at Mon Mar 20 21:49:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30259 at Mon Mar 20 21:49:33 UTC 2023 kill -USR1 30259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30259 killed at Mon Mar 20 21:49:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30311 found at Mon Mar 20 21:49:33 UTC 2023 selfserv_9887 with PID 30311 started at Mon Mar 20 21:49:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30311 at Mon Mar 20 21:49:35 UTC 2023 kill -USR1 30311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30311 killed at Mon Mar 20 21:49:35 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30365 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30365 found at Mon Mar 20 21:49:36 UTC 2023 selfserv_9887 with PID 30365 started at Mon Mar 20 21:49:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30365 at Mon Mar 20 21:49:38 UTC 2023 kill -USR1 30365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30365 killed at Mon Mar 20 21:49:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30417 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30417 found at Mon Mar 20 21:49:38 UTC 2023 selfserv_9887 with PID 30417 started at Mon Mar 20 21:49:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30417 at Mon Mar 20 21:49:40 UTC 2023 kill -USR1 30417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30417 killed at Mon Mar 20 21:49:40 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30469 found at Mon Mar 20 21:49:40 UTC 2023 selfserv_9887 with PID 30469 started at Mon Mar 20 21:49:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #977: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30469 at Mon Mar 20 21:49:41 UTC 2023 kill -USR1 30469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30469 killed at Mon Mar 20 21:49:42 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30532 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30532 found at Mon Mar 20 21:49:42 UTC 2023 selfserv_9887 with PID 30532 started at Mon Mar 20 21:49:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30532 at Mon Mar 20 21:49:44 UTC 2023 kill -USR1 30532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30532 killed at Mon Mar 20 21:49:44 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30591 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30591 found at Mon Mar 20 21:49:44 UTC 2023 selfserv_9887 with PID 30591 started at Mon Mar 20 21:49:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30591 at Mon Mar 20 21:49:46 UTC 2023 kill -USR1 30591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30591 killed at Mon Mar 20 21:49:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30645 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30645 found at Mon Mar 20 21:49:47 UTC 2023 selfserv_9887 with PID 30645 started at Mon Mar 20 21:49:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30645 at Mon Mar 20 21:49:48 UTC 2023 kill -USR1 30645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30645 killed at Mon Mar 20 21:49:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30697 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30697 found at Mon Mar 20 21:49:48 UTC 2023 selfserv_9887 with PID 30697 started at Mon Mar 20 21:49:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30697 at Mon Mar 20 21:49:51 UTC 2023 kill -USR1 30697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30697 killed at Mon Mar 20 21:49:51 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30749 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30749 found at Mon Mar 20 21:49:51 UTC 2023 selfserv_9887 with PID 30749 started at Mon Mar 20 21:49:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #982: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30749 at Mon Mar 20 21:49:52 UTC 2023 kill -USR1 30749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30749 killed at Mon Mar 20 21:49:52 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30802 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30802 found at Mon Mar 20 21:49:53 UTC 2023 selfserv_9887 with PID 30802 started at Mon Mar 20 21:49:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30802 at Mon Mar 20 21:49:55 UTC 2023 kill -USR1 30802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30802 killed at Mon Mar 20 21:49:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30854 found at Mon Mar 20 21:49:55 UTC 2023 selfserv_9887 with PID 30854 started at Mon Mar 20 21:49:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30854 at Mon Mar 20 21:49:57 UTC 2023 kill -USR1 30854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30854 killed at Mon Mar 20 21:49:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:49:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30906 found at Mon Mar 20 21:49:57 UTC 2023 selfserv_9887 with PID 30906 started at Mon Mar 20 21:49:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 30906 at Mon Mar 20 21:49:59 UTC 2023 kill -USR1 30906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30906 killed at Mon Mar 20 21:49:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:49:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:49:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30958 found at Mon Mar 20 21:49:59 UTC 2023 selfserv_9887 with PID 30958 started at Mon Mar 20 21:49:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #986: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30958 at Mon Mar 20 21:50:01 UTC 2023 kill -USR1 30958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30958 killed at Mon Mar 20 21:50:01 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31010 found at Mon Mar 20 21:50:01 UTC 2023 selfserv_9887 with PID 31010 started at Mon Mar 20 21:50:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31010 at Mon Mar 20 21:50:03 UTC 2023 kill -USR1 31010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31010 killed at Mon Mar 20 21:50:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:50:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31062 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31062 found at Mon Mar 20 21:50:03 UTC 2023 selfserv_9887 with PID 31062 started at Mon Mar 20 21:50:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31062 at Mon Mar 20 21:50:05 UTC 2023 kill -USR1 31062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31062 killed at Mon Mar 20 21:50:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31114 found at Mon Mar 20 21:50:05 UTC 2023 selfserv_9887 with PID 31114 started at Mon Mar 20 21:50:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31114 at Mon Mar 20 21:50:07 UTC 2023 kill -USR1 31114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31114 killed at Mon Mar 20 21:50:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:50:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31166 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31166 found at Mon Mar 20 21:50:07 UTC 2023 selfserv_9887 with PID 31166 started at Mon Mar 20 21:50:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #990: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31166 at Mon Mar 20 21:50:09 UTC 2023 kill -USR1 31166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31166 killed at Mon Mar 20 21:50:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31218 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31218 found at Mon Mar 20 21:50:09 UTC 2023 selfserv_9887 with PID 31218 started at Mon Mar 20 21:50:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31218 at Mon Mar 20 21:50:11 UTC 2023 kill -USR1 31218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31218 killed at Mon Mar 20 21:50:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:50:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31270 found at Mon Mar 20 21:50:11 UTC 2023 selfserv_9887 with PID 31270 started at Mon Mar 20 21:50:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31270 at Mon Mar 20 21:50:13 UTC 2023 kill -USR1 31270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31270 killed at Mon Mar 20 21:50:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31322 found at Mon Mar 20 21:50:13 UTC 2023 selfserv_9887 with PID 31322 started at Mon Mar 20 21:50:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31322 at Mon Mar 20 21:50:15 UTC 2023 kill -USR1 31322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31322 killed at Mon Mar 20 21:50:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:50:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31374 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31374 found at Mon Mar 20 21:50:16 UTC 2023 selfserv_9887 with PID 31374 started at Mon Mar 20 21:50:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31374 at Mon Mar 20 21:50:17 UTC 2023 kill -USR1 31374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31374 killed at Mon Mar 20 21:50:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31426 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31426 found at Mon Mar 20 21:50:18 UTC 2023 selfserv_9887 with PID 31426 started at Mon Mar 20 21:50:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31426 at Mon Mar 20 21:50:20 UTC 2023 kill -USR1 31426 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31426 killed at Mon Mar 20 21:50:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:50:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31478 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31478 found at Mon Mar 20 21:50:20 UTC 2023 selfserv_9887 with PID 31478 started at Mon Mar 20 21:50:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31478 at Mon Mar 20 21:50:22 UTC 2023 kill -USR1 31478 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31478 killed at Mon Mar 20 21:50:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31530 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31530 found at Mon Mar 20 21:50:22 UTC 2023 selfserv_9887 with PID 31530 started at Mon Mar 20 21:50:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31530 at Mon Mar 20 21:50:24 UTC 2023 kill -USR1 31530 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31530 killed at Mon Mar 20 21:50:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:50:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31582 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31582 found at Mon Mar 20 21:50:24 UTC 2023 selfserv_9887 with PID 31582 started at Mon Mar 20 21:50:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #998: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 31582 at Mon Mar 20 21:50:26 UTC 2023 kill -USR1 31582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31582 killed at Mon Mar 20 21:50:26 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31635 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31635 found at Mon Mar 20 21:50:26 UTC 2023 selfserv_9887 with PID 31635 started at Mon Mar 20 21:50:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31635 at Mon Mar 20 21:50:28 UTC 2023 kill -USR1 31635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31635 killed at Mon Mar 20 21:50:28 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31687 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31687 found at Mon Mar 20 21:50:28 UTC 2023 selfserv_9887 with PID 31687 started at Mon Mar 20 21:50:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31687 at Mon Mar 20 21:50:30 UTC 2023 kill -USR1 31687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31687 killed at Mon Mar 20 21:50:30 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:50:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31739 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31739 found at Mon Mar 20 21:50:31 UTC 2023 selfserv_9887 with PID 31739 started at Mon Mar 20 21:50:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31739 at Mon Mar 20 21:50:33 UTC 2023 kill -USR1 31739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31739 killed at Mon Mar 20 21:50:33 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 21:50:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31821 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31821 found at Mon Mar 20 21:50:33 UTC 2023 selfserv_9887 with PID 31821 started at Mon Mar 20 21:50:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31821 at Mon Mar 20 21:50:34 UTC 2023 kill -USR1 31821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31821 killed at Mon Mar 20 21:50:34 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31863 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31863 found at Mon Mar 20 21:50:34 UTC 2023 selfserv_9887 with PID 31863 started at Mon Mar 20 21:50:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31863 at Mon Mar 20 21:50:35 UTC 2023 kill -USR1 31863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31863 killed at Mon Mar 20 21:50:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31902 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31902 found at Mon Mar 20 21:50:36 UTC 2023 selfserv_9887 with PID 31902 started at Mon Mar 20 21:50:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31902 at Mon Mar 20 21:50:36 UTC 2023 kill -USR1 31902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31902 killed at Mon Mar 20 21:50:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31941 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31941 found at Mon Mar 20 21:50:37 UTC 2023 selfserv_9887 with PID 31941 started at Mon Mar 20 21:50:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 31941 at Mon Mar 20 21:50:38 UTC 2023 kill -USR1 31941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31941 killed at Mon Mar 20 21:50:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31981 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 31981 found at Mon Mar 20 21:50:38 UTC 2023 selfserv_9887 with PID 31981 started at Mon Mar 20 21:50:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #948: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 31981 at Mon Mar 20 21:50:39 UTC 2023 kill -USR1 31981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 31981 killed at Mon Mar 20 21:50:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32020 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32020 found at Mon Mar 20 21:50:39 UTC 2023 selfserv_9887 with PID 32020 started at Mon Mar 20 21:50:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32020 at Mon Mar 20 21:50:40 UTC 2023 kill -USR1 32020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32020 killed at Mon Mar 20 21:50:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32059 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32059 found at Mon Mar 20 21:50:40 UTC 2023 selfserv_9887 with PID 32059 started at Mon Mar 20 21:50:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32059 at Mon Mar 20 21:50:41 UTC 2023 kill -USR1 32059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32059 killed at Mon Mar 20 21:50:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32101 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32101 found at Mon Mar 20 21:50:41 UTC 2023 selfserv_9887 with PID 32101 started at Mon Mar 20 21:50:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32101 at Mon Mar 20 21:50:42 UTC 2023 kill -USR1 32101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32101 killed at Mon Mar 20 21:50:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32149 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32149 found at Mon Mar 20 21:50:42 UTC 2023 selfserv_9887 with PID 32149 started at Mon Mar 20 21:50:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32149 at Mon Mar 20 21:50:43 UTC 2023 kill -USR1 32149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32149 killed at Mon Mar 20 21:50:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32191 found at Mon Mar 20 21:50:43 UTC 2023 selfserv_9887 with PID 32191 started at Mon Mar 20 21:50:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32191 at Mon Mar 20 21:50:44 UTC 2023 kill -USR1 32191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32191 killed at Mon Mar 20 21:50:44 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32230 found at Mon Mar 20 21:50:45 UTC 2023 selfserv_9887 with PID 32230 started at Mon Mar 20 21:50:45 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32230 at Mon Mar 20 21:50:46 UTC 2023 kill -USR1 32230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32230 killed at Mon Mar 20 21:50:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32270 found at Mon Mar 20 21:50:46 UTC 2023 selfserv_9887 with PID 32270 started at Mon Mar 20 21:50:46 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32270 at Mon Mar 20 21:50:47 UTC 2023 kill -USR1 32270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32270 killed at Mon Mar 20 21:50:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32310 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32310 found at Mon Mar 20 21:50:47 UTC 2023 selfserv_9887 with PID 32310 started at Mon Mar 20 21:50:47 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32310 at Mon Mar 20 21:50:48 UTC 2023 kill -USR1 32310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32310 killed at Mon Mar 20 21:50:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32350 found at Mon Mar 20 21:50:48 UTC 2023 selfserv_9887 with PID 32350 started at Mon Mar 20 21:50:48 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32350 at Mon Mar 20 21:50:49 UTC 2023 kill -USR1 32350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32350 killed at Mon Mar 20 21:50:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32390 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32390 found at Mon Mar 20 21:50:49 UTC 2023 selfserv_9887 with PID 32390 started at Mon Mar 20 21:50:49 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32390 at Mon Mar 20 21:50:50 UTC 2023 kill -USR1 32390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32390 killed at Mon Mar 20 21:50:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32430 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32430 found at Mon Mar 20 21:50:50 UTC 2023 selfserv_9887 with PID 32430 started at Mon Mar 20 21:50:50 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32430 at Mon Mar 20 21:50:51 UTC 2023 kill -USR1 32430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32430 killed at Mon Mar 20 21:50:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32470 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32470 found at Mon Mar 20 21:50:51 UTC 2023 selfserv_9887 with PID 32470 started at Mon Mar 20 21:50:51 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32470 at Mon Mar 20 21:50:52 UTC 2023 kill -USR1 32470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32470 killed at Mon Mar 20 21:50:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32510 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32510 found at Mon Mar 20 21:50:53 UTC 2023 selfserv_9887 with PID 32510 started at Mon Mar 20 21:50:53 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32510 at Mon Mar 20 21:50:53 UTC 2023 kill -USR1 32510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32510 killed at Mon Mar 20 21:50:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:50:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32551 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32551 found at Mon Mar 20 21:50:54 UTC 2023 selfserv_9887 with PID 32551 started at Mon Mar 20 21:50:54 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 32551 at Mon Mar 20 21:50:55 UTC 2023 kill -USR1 32551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32551 killed at Mon Mar 20 21:50:55 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -fips true -force FIPS mode enabled. ssl.sh: #963: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #964: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #965: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #966: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #967: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #968: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 21:50:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:50:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 32635 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32635 found at Mon Mar 20 21:50:56 UTC 2023 selfserv_9887 with PID 32635 started at Mon Mar 20 21:50:56 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 32635 at Mon Mar 20 21:51:05 UTC 2023 kill -USR1 32635 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32635 killed at Mon Mar 20 21:51:06 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 21:51:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 33192 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33192 found at Mon Mar 20 21:51:06 UTC 2023 selfserv_9887 with PID 33192 started at Mon Mar 20 21:51:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33192 at Mon Mar 20 21:51:25 UTC 2023 kill -USR1 33192 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33192 killed at Mon Mar 20 21:51:25 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 21:51:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33991 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33991 found at Mon Mar 20 21:51:25 UTC 2023 selfserv_9887 with PID 33991 started at Mon Mar 20 21:51:25 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 33991 at Mon Mar 20 21:51:26 UTC 2023 kill -USR1 33991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33991 killed at Mon Mar 20 21:51:26 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34057 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34057 found at Mon Mar 20 21:51:26 UTC 2023 selfserv_9887 with PID 34057 started at Mon Mar 20 21:51:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34057 at Mon Mar 20 21:51:27 UTC 2023 kill -USR1 34057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34057 killed at Mon Mar 20 21:51:27 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34109 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34109 found at Mon Mar 20 21:51:27 UTC 2023 selfserv_9887 with PID 34109 started at Mon Mar 20 21:51:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34109 at Mon Mar 20 21:51:28 UTC 2023 kill -USR1 34109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34109 killed at Mon Mar 20 21:51:28 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34161 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34161 found at Mon Mar 20 21:51:29 UTC 2023 selfserv_9887 with PID 34161 started at Mon Mar 20 21:51:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34161 at Mon Mar 20 21:51:30 UTC 2023 kill -USR1 34161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34161 killed at Mon Mar 20 21:51:30 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34213 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34213 found at Mon Mar 20 21:51:30 UTC 2023 selfserv_9887 with PID 34213 started at Mon Mar 20 21:51:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34213 at Mon Mar 20 21:51:31 UTC 2023 kill -USR1 34213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34213 killed at Mon Mar 20 21:51:31 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34265 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34265 found at Mon Mar 20 21:51:32 UTC 2023 selfserv_9887 with PID 34265 started at Mon Mar 20 21:51:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34265 at Mon Mar 20 21:51:32 UTC 2023 kill -USR1 34265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34265 killed at Mon Mar 20 21:51:33 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34317 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34317 found at Mon Mar 20 21:51:33 UTC 2023 selfserv_9887 with PID 34317 started at Mon Mar 20 21:51:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34317 at Mon Mar 20 21:51:34 UTC 2023 kill -USR1 34317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34317 killed at Mon Mar 20 21:51:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34369 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34369 found at Mon Mar 20 21:51:34 UTC 2023 selfserv_9887 with PID 34369 started at Mon Mar 20 21:51:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34369 at Mon Mar 20 21:51:35 UTC 2023 kill -USR1 34369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34369 killed at Mon Mar 20 21:51:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34421 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34421 found at Mon Mar 20 21:51:35 UTC 2023 selfserv_9887 with PID 34421 started at Mon Mar 20 21:51:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34421 at Mon Mar 20 21:51:36 UTC 2023 kill -USR1 34421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34421 killed at Mon Mar 20 21:51:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34473 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34473 found at Mon Mar 20 21:51:37 UTC 2023 selfserv_9887 with PID 34473 started at Mon Mar 20 21:51:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34473 at Mon Mar 20 21:51:38 UTC 2023 kill -USR1 34473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34473 killed at Mon Mar 20 21:51:38 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34526 found at Mon Mar 20 21:51:38 UTC 2023 selfserv_9887 with PID 34526 started at Mon Mar 20 21:51:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34526 at Mon Mar 20 21:51:39 UTC 2023 kill -USR1 34526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34526 killed at Mon Mar 20 21:51:39 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34578 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34578 found at Mon Mar 20 21:51:39 UTC 2023 selfserv_9887 with PID 34578 started at Mon Mar 20 21:51:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34578 at Mon Mar 20 21:51:40 UTC 2023 kill -USR1 34578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34578 killed at Mon Mar 20 21:51:40 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34630 found at Mon Mar 20 21:51:40 UTC 2023 selfserv_9887 with PID 34630 started at Mon Mar 20 21:51:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34630 at Mon Mar 20 21:51:41 UTC 2023 kill -USR1 34630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34630 killed at Mon Mar 20 21:51:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34690 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34690 found at Mon Mar 20 21:51:41 UTC 2023 selfserv_9887 with PID 34690 started at Mon Mar 20 21:51:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34690 at Mon Mar 20 21:51:43 UTC 2023 kill -USR1 34690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34690 killed at Mon Mar 20 21:51:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34747 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34747 found at Mon Mar 20 21:51:43 UTC 2023 selfserv_9887 with PID 34747 started at Mon Mar 20 21:51:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34747 at Mon Mar 20 21:51:44 UTC 2023 kill -USR1 34747 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34747 killed at Mon Mar 20 21:51:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34802 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34802 found at Mon Mar 20 21:51:44 UTC 2023 selfserv_9887 with PID 34802 started at Mon Mar 20 21:51:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34802 at Mon Mar 20 21:51:46 UTC 2023 kill -USR1 34802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34802 killed at Mon Mar 20 21:51:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34854 found at Mon Mar 20 21:51:46 UTC 2023 selfserv_9887 with PID 34854 started at Mon Mar 20 21:51:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34854 at Mon Mar 20 21:51:47 UTC 2023 kill -USR1 34854 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34854 killed at Mon Mar 20 21:51:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34906 found at Mon Mar 20 21:51:48 UTC 2023 selfserv_9887 with PID 34906 started at Mon Mar 20 21:51:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34906 at Mon Mar 20 21:51:49 UTC 2023 kill -USR1 34906 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34906 killed at Mon Mar 20 21:51:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34958 found at Mon Mar 20 21:51:49 UTC 2023 selfserv_9887 with PID 34958 started at Mon Mar 20 21:51:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 34958 at Mon Mar 20 21:51:51 UTC 2023 kill -USR1 34958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34958 killed at Mon Mar 20 21:51:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35010 found at Mon Mar 20 21:51:51 UTC 2023 selfserv_9887 with PID 35010 started at Mon Mar 20 21:51:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35010 at Mon Mar 20 21:51:52 UTC 2023 kill -USR1 35010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35010 killed at Mon Mar 20 21:51:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35062 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35062 found at Mon Mar 20 21:51:52 UTC 2023 selfserv_9887 with PID 35062 started at Mon Mar 20 21:51:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35062 at Mon Mar 20 21:51:54 UTC 2023 kill -USR1 35062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35062 killed at Mon Mar 20 21:51:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35114 found at Mon Mar 20 21:51:54 UTC 2023 selfserv_9887 with PID 35114 started at Mon Mar 20 21:51:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35114 at Mon Mar 20 21:51:55 UTC 2023 kill -USR1 35114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35114 killed at Mon Mar 20 21:51:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35167 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35167 found at Mon Mar 20 21:51:56 UTC 2023 selfserv_9887 with PID 35167 started at Mon Mar 20 21:51:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35167 at Mon Mar 20 21:51:57 UTC 2023 kill -USR1 35167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35167 killed at Mon Mar 20 21:51:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:51:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35220 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35220 found at Mon Mar 20 21:51:57 UTC 2023 selfserv_9887 with PID 35220 started at Mon Mar 20 21:51:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35220 at Mon Mar 20 21:51:58 UTC 2023 kill -USR1 35220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35220 killed at Mon Mar 20 21:51:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:51:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:51:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35272 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35272 found at Mon Mar 20 21:51:59 UTC 2023 selfserv_9887 with PID 35272 started at Mon Mar 20 21:51:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35272 at Mon Mar 20 21:52:00 UTC 2023 kill -USR1 35272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35272 killed at Mon Mar 20 21:52:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35324 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35324 found at Mon Mar 20 21:52:00 UTC 2023 selfserv_9887 with PID 35324 started at Mon Mar 20 21:52:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35324 at Mon Mar 20 21:52:01 UTC 2023 kill -USR1 35324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35324 killed at Mon Mar 20 21:52:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35376 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35376 found at Mon Mar 20 21:52:02 UTC 2023 selfserv_9887 with PID 35376 started at Mon Mar 20 21:52:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35376 at Mon Mar 20 21:52:03 UTC 2023 kill -USR1 35376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35376 killed at Mon Mar 20 21:52:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35428 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35428 found at Mon Mar 20 21:52:03 UTC 2023 selfserv_9887 with PID 35428 started at Mon Mar 20 21:52:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35428 at Mon Mar 20 21:52:04 UTC 2023 kill -USR1 35428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35428 killed at Mon Mar 20 21:52:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35480 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35480 found at Mon Mar 20 21:52:04 UTC 2023 selfserv_9887 with PID 35480 started at Mon Mar 20 21:52:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1123: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35480 at Mon Mar 20 21:52:05 UTC 2023 kill -USR1 35480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35480 killed at Mon Mar 20 21:52:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35532 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35532 found at Mon Mar 20 21:52:05 UTC 2023 selfserv_9887 with PID 35532 started at Mon Mar 20 21:52:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35532 at Mon Mar 20 21:52:06 UTC 2023 kill -USR1 35532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35532 killed at Mon Mar 20 21:52:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35584 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35584 found at Mon Mar 20 21:52:07 UTC 2023 selfserv_9887 with PID 35584 started at Mon Mar 20 21:52:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35584 at Mon Mar 20 21:52:08 UTC 2023 kill -USR1 35584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35584 killed at Mon Mar 20 21:52:08 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35636 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35636 found at Mon Mar 20 21:52:08 UTC 2023 selfserv_9887 with PID 35636 started at Mon Mar 20 21:52:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35636 at Mon Mar 20 21:52:09 UTC 2023 kill -USR1 35636 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35636 killed at Mon Mar 20 21:52:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35688 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35688 found at Mon Mar 20 21:52:09 UTC 2023 selfserv_9887 with PID 35688 started at Mon Mar 20 21:52:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35688 at Mon Mar 20 21:52:10 UTC 2023 kill -USR1 35688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35688 killed at Mon Mar 20 21:52:10 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35740 found at Mon Mar 20 21:52:11 UTC 2023 selfserv_9887 with PID 35740 started at Mon Mar 20 21:52:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35740 at Mon Mar 20 21:52:11 UTC 2023 kill -USR1 35740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35740 killed at Mon Mar 20 21:52:11 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35792 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35792 found at Mon Mar 20 21:52:12 UTC 2023 selfserv_9887 with PID 35792 started at Mon Mar 20 21:52:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1129: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 35792 at Mon Mar 20 21:52:12 UTC 2023 kill -USR1 35792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35792 killed at Mon Mar 20 21:52:13 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35844 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35844 found at Mon Mar 20 21:52:13 UTC 2023 selfserv_9887 with PID 35844 started at Mon Mar 20 21:52:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35844 at Mon Mar 20 21:52:14 UTC 2023 kill -USR1 35844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35844 killed at Mon Mar 20 21:52:14 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35896 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35896 found at Mon Mar 20 21:52:14 UTC 2023 selfserv_9887 with PID 35896 started at Mon Mar 20 21:52:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35896 at Mon Mar 20 21:52:15 UTC 2023 kill -USR1 35896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35896 killed at Mon Mar 20 21:52:15 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35949 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35949 found at Mon Mar 20 21:52:15 UTC 2023 selfserv_9887 with PID 35949 started at Mon Mar 20 21:52:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 35949 at Mon Mar 20 21:52:16 UTC 2023 kill -USR1 35949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35949 killed at Mon Mar 20 21:52:16 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36002 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36002 found at Mon Mar 20 21:52:17 UTC 2023 selfserv_9887 with PID 36002 started at Mon Mar 20 21:52:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36002 at Mon Mar 20 21:52:18 UTC 2023 kill -USR1 36002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36002 killed at Mon Mar 20 21:52:18 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36054 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36054 found at Mon Mar 20 21:52:18 UTC 2023 selfserv_9887 with PID 36054 started at Mon Mar 20 21:52:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1134: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36054 at Mon Mar 20 21:52:19 UTC 2023 kill -USR1 36054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36054 killed at Mon Mar 20 21:52:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36106 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36106 found at Mon Mar 20 21:52:19 UTC 2023 selfserv_9887 with PID 36106 started at Mon Mar 20 21:52:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36106 at Mon Mar 20 21:52:20 UTC 2023 kill -USR1 36106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36106 killed at Mon Mar 20 21:52:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36162 found at Mon Mar 20 21:52:21 UTC 2023 selfserv_9887 with PID 36162 started at Mon Mar 20 21:52:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36162 at Mon Mar 20 21:52:21 UTC 2023 kill -USR1 36162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36162 killed at Mon Mar 20 21:52:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36214 found at Mon Mar 20 21:52:22 UTC 2023 selfserv_9887 with PID 36214 started at Mon Mar 20 21:52:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36214 at Mon Mar 20 21:52:23 UTC 2023 kill -USR1 36214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36214 killed at Mon Mar 20 21:52:23 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36266 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36266 found at Mon Mar 20 21:52:23 UTC 2023 selfserv_9887 with PID 36266 started at Mon Mar 20 21:52:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36266 at Mon Mar 20 21:52:24 UTC 2023 kill -USR1 36266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36266 killed at Mon Mar 20 21:52:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36318 found at Mon Mar 20 21:52:24 UTC 2023 selfserv_9887 with PID 36318 started at Mon Mar 20 21:52:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36318 at Mon Mar 20 21:52:25 UTC 2023 kill -USR1 36318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36318 killed at Mon Mar 20 21:52:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36370 found at Mon Mar 20 21:52:25 UTC 2023 selfserv_9887 with PID 36370 started at Mon Mar 20 21:52:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36370 at Mon Mar 20 21:52:26 UTC 2023 kill -USR1 36370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36370 killed at Mon Mar 20 21:52:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36422 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36422 found at Mon Mar 20 21:52:27 UTC 2023 selfserv_9887 with PID 36422 started at Mon Mar 20 21:52:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36422 at Mon Mar 20 21:52:28 UTC 2023 kill -USR1 36422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36422 killed at Mon Mar 20 21:52:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36474 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36474 found at Mon Mar 20 21:52:28 UTC 2023 selfserv_9887 with PID 36474 started at Mon Mar 20 21:52:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36474 at Mon Mar 20 21:52:29 UTC 2023 kill -USR1 36474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36474 killed at Mon Mar 20 21:52:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36526 found at Mon Mar 20 21:52:29 UTC 2023 selfserv_9887 with PID 36526 started at Mon Mar 20 21:52:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36526 at Mon Mar 20 21:52:31 UTC 2023 kill -USR1 36526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36526 killed at Mon Mar 20 21:52:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36578 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36578 found at Mon Mar 20 21:52:31 UTC 2023 selfserv_9887 with PID 36578 started at Mon Mar 20 21:52:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36578 at Mon Mar 20 21:52:32 UTC 2023 kill -USR1 36578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36578 killed at Mon Mar 20 21:52:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36631 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36631 found at Mon Mar 20 21:52:32 UTC 2023 selfserv_9887 with PID 36631 started at Mon Mar 20 21:52:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36631 at Mon Mar 20 21:52:34 UTC 2023 kill -USR1 36631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36631 killed at Mon Mar 20 21:52:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36683 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36683 found at Mon Mar 20 21:52:34 UTC 2023 selfserv_9887 with PID 36683 started at Mon Mar 20 21:52:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1146: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36683 at Mon Mar 20 21:52:35 UTC 2023 kill -USR1 36683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36683 killed at Mon Mar 20 21:52:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36735 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36735 found at Mon Mar 20 21:52:35 UTC 2023 selfserv_9887 with PID 36735 started at Mon Mar 20 21:52:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36735 at Mon Mar 20 21:52:37 UTC 2023 kill -USR1 36735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36735 killed at Mon Mar 20 21:52:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36787 found at Mon Mar 20 21:52:37 UTC 2023 selfserv_9887 with PID 36787 started at Mon Mar 20 21:52:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36787 at Mon Mar 20 21:52:38 UTC 2023 kill -USR1 36787 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36787 killed at Mon Mar 20 21:52:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36839 found at Mon Mar 20 21:52:38 UTC 2023 selfserv_9887 with PID 36839 started at Mon Mar 20 21:52:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36839 at Mon Mar 20 21:52:39 UTC 2023 kill -USR1 36839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36839 killed at Mon Mar 20 21:52:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:52:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36891 found at Mon Mar 20 21:52:39 UTC 2023 selfserv_9887 with PID 36891 started at Mon Mar 20 21:52:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1150: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 36891 at Mon Mar 20 21:52:40 UTC 2023 kill -USR1 36891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36891 killed at Mon Mar 20 21:52:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36946 found at Mon Mar 20 21:52:41 UTC 2023 selfserv_9887 with PID 36946 started at Mon Mar 20 21:52:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36946 at Mon Mar 20 21:52:42 UTC 2023 kill -USR1 36946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36946 killed at Mon Mar 20 21:52:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37003 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37003 found at Mon Mar 20 21:52:42 UTC 2023 selfserv_9887 with PID 37003 started at Mon Mar 20 21:52:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37003 at Mon Mar 20 21:52:43 UTC 2023 kill -USR1 37003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37003 killed at Mon Mar 20 21:52:43 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:52:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37059 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37059 found at Mon Mar 20 21:52:43 UTC 2023 selfserv_9887 with PID 37059 started at Mon Mar 20 21:52:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37059 at Mon Mar 20 21:52:44 UTC 2023 kill -USR1 37059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37059 killed at Mon Mar 20 21:52:44 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:52:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37120 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37120 found at Mon Mar 20 21:52:45 UTC 2023 selfserv_9887 with PID 37120 started at Mon Mar 20 21:52:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37120 at Mon Mar 20 21:52:46 UTC 2023 kill -USR1 37120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37120 killed at Mon Mar 20 21:52:46 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 21:52:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37178 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37178 found at Mon Mar 20 21:52:46 UTC 2023 selfserv_9887 with PID 37178 started at Mon Mar 20 21:52:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37178 at Mon Mar 20 21:52:47 UTC 2023 kill -USR1 37178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37178 killed at Mon Mar 20 21:52:47 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 21:52:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37236 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37236 found at Mon Mar 20 21:52:47 UTC 2023 selfserv_9887 with PID 37236 started at Mon Mar 20 21:52:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37236 at Mon Mar 20 21:52:48 UTC 2023 kill -USR1 37236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37236 killed at Mon Mar 20 21:52:48 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:52:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37294 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37294 found at Mon Mar 20 21:52:48 UTC 2023 selfserv_9887 with PID 37294 started at Mon Mar 20 21:52:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1157: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37294 at Mon Mar 20 21:52:49 UTC 2023 kill -USR1 37294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37294 killed at Mon Mar 20 21:52:50 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 21:52:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37352 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37352 found at Mon Mar 20 21:52:50 UTC 2023 selfserv_9887 with PID 37352 started at Mon Mar 20 21:52:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1158: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37352 at Mon Mar 20 21:52:50 UTC 2023 kill -USR1 37352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37352 killed at Mon Mar 20 21:52:51 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 21:52:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37410 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37410 found at Mon Mar 20 21:52:51 UTC 2023 selfserv_9887 with PID 37410 started at Mon Mar 20 21:52:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1159: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37410 at Mon Mar 20 21:52:52 UTC 2023 kill -USR1 37410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37410 killed at Mon Mar 20 21:52:52 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 21:52:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37468 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37468 found at Mon Mar 20 21:52:52 UTC 2023 selfserv_9887 with PID 37468 started at Mon Mar 20 21:52:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37468 at Mon Mar 20 21:52:53 UTC 2023 kill -USR1 37468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37468 killed at Mon Mar 20 21:52:53 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 21:52:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37526 found at Mon Mar 20 21:52:54 UTC 2023 selfserv_9887 with PID 37526 started at Mon Mar 20 21:52:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1161: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37526 at Mon Mar 20 21:52:55 UTC 2023 kill -USR1 37526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37526 killed at Mon Mar 20 21:52:55 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 21:52:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37584 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37584 found at Mon Mar 20 21:52:55 UTC 2023 selfserv_9887 with PID 37584 started at Mon Mar 20 21:52:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1162: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37584 at Mon Mar 20 21:52:56 UTC 2023 kill -USR1 37584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37584 killed at Mon Mar 20 21:52:56 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 21:52:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37643 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37643 found at Mon Mar 20 21:52:56 UTC 2023 selfserv_9887 with PID 37643 started at Mon Mar 20 21:52:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1163: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37643 at Mon Mar 20 21:52:57 UTC 2023 kill -USR1 37643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37643 killed at Mon Mar 20 21:52:57 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 21:52:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37685 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37685 found at Mon Mar 20 21:52:57 UTC 2023 selfserv_9887 with PID 37685 started at Mon Mar 20 21:52:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1096: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37685 at Mon Mar 20 21:52:58 UTC 2023 kill -USR1 37685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37685 killed at Mon Mar 20 21:52:58 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 21:52:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37727 found at Mon Mar 20 21:52:58 UTC 2023 selfserv_9887 with PID 37727 started at Mon Mar 20 21:52:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 37727 at Mon Mar 20 21:52:59 UTC 2023 kill -USR1 37727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37727 killed at Mon Mar 20 21:52:59 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 21:52:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:52:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37769 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37769 found at Mon Mar 20 21:52:59 UTC 2023 selfserv_9887 with PID 37769 started at Mon Mar 20 21:52:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37769 at Mon Mar 20 21:53:00 UTC 2023 kill -USR1 37769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37769 killed at Mon Mar 20 21:53:00 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 21:53:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:53:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37811 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37811 found at Mon Mar 20 21:53:01 UTC 2023 selfserv_9887 with PID 37811 started at Mon Mar 20 21:53:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37811 at Mon Mar 20 21:53:01 UTC 2023 kill -USR1 37811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37811 killed at Mon Mar 20 21:53:01 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 21:53:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:53:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37853 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37853 found at Mon Mar 20 21:53:02 UTC 2023 selfserv_9887 with PID 37853 started at Mon Mar 20 21:53:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37853 at Mon Mar 20 21:53:02 UTC 2023 kill -USR1 37853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37853 killed at Mon Mar 20 21:53:02 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 21:53:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:53:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37895 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37895 found at Mon Mar 20 21:53:02 UTC 2023 selfserv_9887 with PID 37895 started at Mon Mar 20 21:53:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37895 at Mon Mar 20 21:53:03 UTC 2023 kill -USR1 37895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37895 killed at Mon Mar 20 21:53:03 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 21:53:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:53:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37938 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37938 found at Mon Mar 20 21:53:03 UTC 2023 selfserv_9887 with PID 37938 started at Mon Mar 20 21:53:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1102: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 37938 at Mon Mar 20 21:53:04 UTC 2023 kill -USR1 37938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37938 killed at Mon Mar 20 21:53:04 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 21:53:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:53:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37980 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37980 found at Mon Mar 20 21:53:04 UTC 2023 selfserv_9887 with PID 37980 started at Mon Mar 20 21:53:04 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 21:53:04 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 21:54:17 UTC 2023 ssl.sh: #1103: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 37980 at Mon Mar 20 21:54:17 UTC 2023 kill -USR1 37980 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37980 killed at Mon Mar 20 21:54:17 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 21:54:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38046 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38046 found at Mon Mar 20 21:54:17 UTC 2023 selfserv_9887 with PID 38046 started at Mon Mar 20 21:54:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38046 at Mon Mar 20 21:54:18 UTC 2023 kill -USR1 38046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38046 killed at Mon Mar 20 21:54:18 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38088 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38088 found at Mon Mar 20 21:54:18 UTC 2023 selfserv_9887 with PID 38088 started at Mon Mar 20 21:54:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38088 at Mon Mar 20 21:54:19 UTC 2023 kill -USR1 38088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38088 killed at Mon Mar 20 21:54:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38127 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38127 found at Mon Mar 20 21:54:19 UTC 2023 selfserv_9887 with PID 38127 started at Mon Mar 20 21:54:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38127 at Mon Mar 20 21:54:20 UTC 2023 kill -USR1 38127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38127 killed at Mon Mar 20 21:54:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38166 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38166 found at Mon Mar 20 21:54:20 UTC 2023 selfserv_9887 with PID 38166 started at Mon Mar 20 21:54:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38166 at Mon Mar 20 21:54:20 UTC 2023 kill -USR1 38166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38166 killed at Mon Mar 20 21:54:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38205 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38205 found at Mon Mar 20 21:54:21 UTC 2023 selfserv_9887 with PID 38205 started at Mon Mar 20 21:54:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1108: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 38205 at Mon Mar 20 21:54:21 UTC 2023 kill -USR1 38205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38205 killed at Mon Mar 20 21:54:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38244 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38244 found at Mon Mar 20 21:54:21 UTC 2023 selfserv_9887 with PID 38244 started at Mon Mar 20 21:54:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38244 at Mon Mar 20 21:54:22 UTC 2023 kill -USR1 38244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38244 killed at Mon Mar 20 21:54:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38283 found at Mon Mar 20 21:54:22 UTC 2023 selfserv_9887 with PID 38283 started at Mon Mar 20 21:54:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38283 at Mon Mar 20 21:54:23 UTC 2023 kill -USR1 38283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38283 killed at Mon Mar 20 21:54:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38322 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38322 found at Mon Mar 20 21:54:23 UTC 2023 selfserv_9887 with PID 38322 started at Mon Mar 20 21:54:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38322 at Mon Mar 20 21:54:23 UTC 2023 kill -USR1 38322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38322 killed at Mon Mar 20 21:54:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38361 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38361 found at Mon Mar 20 21:54:24 UTC 2023 selfserv_9887 with PID 38361 started at Mon Mar 20 21:54:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38361 at Mon Mar 20 21:54:24 UTC 2023 kill -USR1 38361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38361 killed at Mon Mar 20 21:54:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38400 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38400 found at Mon Mar 20 21:54:24 UTC 2023 selfserv_9887 with PID 38400 started at Mon Mar 20 21:54:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38400 at Mon Mar 20 21:54:25 UTC 2023 kill -USR1 38400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38400 killed at Mon Mar 20 21:54:25 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38439 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38439 found at Mon Mar 20 21:54:25 UTC 2023 selfserv_9887 with PID 38439 started at Mon Mar 20 21:54:25 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38439 at Mon Mar 20 21:54:26 UTC 2023 kill -USR1 38439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38439 killed at Mon Mar 20 21:54:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38479 found at Mon Mar 20 21:54:26 UTC 2023 selfserv_9887 with PID 38479 started at Mon Mar 20 21:54:26 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38479 at Mon Mar 20 21:54:26 UTC 2023 kill -USR1 38479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38479 killed at Mon Mar 20 21:54:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38519 found at Mon Mar 20 21:54:27 UTC 2023 selfserv_9887 with PID 38519 started at Mon Mar 20 21:54:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38519 at Mon Mar 20 21:54:27 UTC 2023 kill -USR1 38519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38519 killed at Mon Mar 20 21:54:27 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38559 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38559 found at Mon Mar 20 21:54:27 UTC 2023 selfserv_9887 with PID 38559 started at Mon Mar 20 21:54:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38559 at Mon Mar 20 21:54:28 UTC 2023 kill -USR1 38559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38559 killed at Mon Mar 20 21:54:28 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38599 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38599 found at Mon Mar 20 21:54:28 UTC 2023 selfserv_9887 with PID 38599 started at Mon Mar 20 21:54:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38599 at Mon Mar 20 21:54:29 UTC 2023 kill -USR1 38599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38599 killed at Mon Mar 20 21:54:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38639 found at Mon Mar 20 21:54:29 UTC 2023 selfserv_9887 with PID 38639 started at Mon Mar 20 21:54:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38639 at Mon Mar 20 21:54:29 UTC 2023 kill -USR1 38639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38639 killed at Mon Mar 20 21:54:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38679 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38679 found at Mon Mar 20 21:54:30 UTC 2023 selfserv_9887 with PID 38679 started at Mon Mar 20 21:54:30 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38679 at Mon Mar 20 21:54:30 UTC 2023 kill -USR1 38679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38679 killed at Mon Mar 20 21:54:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38719 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38719 found at Mon Mar 20 21:54:31 UTC 2023 selfserv_9887 with PID 38719 started at Mon Mar 20 21:54:31 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38719 at Mon Mar 20 21:54:31 UTC 2023 kill -USR1 38719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38719 killed at Mon Mar 20 21:54:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:54:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38759 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38759 found at Mon Mar 20 21:54:31 UTC 2023 selfserv_9887 with PID 38759 started at Mon Mar 20 21:54:31 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38759 at Mon Mar 20 21:54:32 UTC 2023 kill -USR1 38759 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38759 killed at Mon Mar 20 21:54:32 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 21:54:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 38799 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38799 found at Mon Mar 20 21:54:32 UTC 2023 selfserv_9887 with PID 38799 started at Mon Mar 20 21:54:32 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 38799 at Mon Mar 20 21:54:42 UTC 2023 kill -USR1 38799 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38799 killed at Mon Mar 20 21:54:43 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 21:54:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 39363 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39363 found at Mon Mar 20 21:54:43 UTC 2023 selfserv_9887 with PID 39363 started at Mon Mar 20 21:54:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39363 at Mon Mar 20 21:54:59 UTC 2023 kill -USR1 39363 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39363 killed at Mon Mar 20 21:54:59 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:54:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:54:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40183 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40183 found at Mon Mar 20 21:54:59 UTC 2023 selfserv_9887 with PID 40183 started at Mon Mar 20 21:54:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40183 at Mon Mar 20 21:55:01 UTC 2023 kill -USR1 40183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40183 killed at Mon Mar 20 21:55:01 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40235 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40235 found at Mon Mar 20 21:55:01 UTC 2023 selfserv_9887 with PID 40235 started at Mon Mar 20 21:55:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40235 at Mon Mar 20 21:55:03 UTC 2023 kill -USR1 40235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40235 killed at Mon Mar 20 21:55:03 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40287 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40287 found at Mon Mar 20 21:55:03 UTC 2023 selfserv_9887 with PID 40287 started at Mon Mar 20 21:55:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40287 at Mon Mar 20 21:55:05 UTC 2023 kill -USR1 40287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40287 killed at Mon Mar 20 21:55:05 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40339 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40339 found at Mon Mar 20 21:55:05 UTC 2023 selfserv_9887 with PID 40339 started at Mon Mar 20 21:55:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40339 at Mon Mar 20 21:55:07 UTC 2023 kill -USR1 40339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40339 killed at Mon Mar 20 21:55:07 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40391 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40391 found at Mon Mar 20 21:55:07 UTC 2023 selfserv_9887 with PID 40391 started at Mon Mar 20 21:55:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40391 at Mon Mar 20 21:55:09 UTC 2023 kill -USR1 40391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40391 killed at Mon Mar 20 21:55:09 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40443 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40443 found at Mon Mar 20 21:55:09 UTC 2023 selfserv_9887 with PID 40443 started at Mon Mar 20 21:55:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40443 at Mon Mar 20 21:55:11 UTC 2023 kill -USR1 40443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40443 killed at Mon Mar 20 21:55:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40495 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40495 found at Mon Mar 20 21:55:11 UTC 2023 selfserv_9887 with PID 40495 started at Mon Mar 20 21:55:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40495 at Mon Mar 20 21:55:13 UTC 2023 kill -USR1 40495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40495 killed at Mon Mar 20 21:55:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40547 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40547 found at Mon Mar 20 21:55:13 UTC 2023 selfserv_9887 with PID 40547 started at Mon Mar 20 21:55:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40547 at Mon Mar 20 21:55:15 UTC 2023 kill -USR1 40547 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40547 killed at Mon Mar 20 21:55:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40599 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40599 found at Mon Mar 20 21:55:15 UTC 2023 selfserv_9887 with PID 40599 started at Mon Mar 20 21:55:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40599 at Mon Mar 20 21:55:18 UTC 2023 kill -USR1 40599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40599 killed at Mon Mar 20 21:55:18 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40651 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40651 found at Mon Mar 20 21:55:18 UTC 2023 selfserv_9887 with PID 40651 started at Mon Mar 20 21:55:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40651 at Mon Mar 20 21:55:19 UTC 2023 kill -USR1 40651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40651 killed at Mon Mar 20 21:55:19 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40703 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40703 found at Mon Mar 20 21:55:20 UTC 2023 selfserv_9887 with PID 40703 started at Mon Mar 20 21:55:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40703 at Mon Mar 20 21:55:21 UTC 2023 kill -USR1 40703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40703 killed at Mon Mar 20 21:55:21 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40755 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40755 found at Mon Mar 20 21:55:22 UTC 2023 selfserv_9887 with PID 40755 started at Mon Mar 20 21:55:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40755 at Mon Mar 20 21:55:24 UTC 2023 kill -USR1 40755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40755 killed at Mon Mar 20 21:55:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40807 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40807 found at Mon Mar 20 21:55:24 UTC 2023 selfserv_9887 with PID 40807 started at Mon Mar 20 21:55:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40807 at Mon Mar 20 21:55:26 UTC 2023 kill -USR1 40807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40807 killed at Mon Mar 20 21:55:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40859 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40859 found at Mon Mar 20 21:55:26 UTC 2023 selfserv_9887 with PID 40859 started at Mon Mar 20 21:55:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40859 at Mon Mar 20 21:55:28 UTC 2023 kill -USR1 40859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40859 killed at Mon Mar 20 21:55:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40911 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40911 found at Mon Mar 20 21:55:28 UTC 2023 selfserv_9887 with PID 40911 started at Mon Mar 20 21:55:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40911 at Mon Mar 20 21:55:30 UTC 2023 kill -USR1 40911 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40911 killed at Mon Mar 20 21:55:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 304 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 304 found at Mon Mar 20 21:55:30 UTC 2023 selfserv_9887 with PID 304 started at Mon Mar 20 21:55:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 304 at Mon Mar 20 21:55:32 UTC 2023 kill -USR1 304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 304 killed at Mon Mar 20 21:55:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 356 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 356 found at Mon Mar 20 21:55:32 UTC 2023 selfserv_9887 with PID 356 started at Mon Mar 20 21:55:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 356 at Mon Mar 20 21:55:34 UTC 2023 kill -USR1 356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 356 killed at Mon Mar 20 21:55:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 408 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 408 found at Mon Mar 20 21:55:34 UTC 2023 selfserv_9887 with PID 408 started at Mon Mar 20 21:55:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 408 at Mon Mar 20 21:55:36 UTC 2023 kill -USR1 408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 408 killed at Mon Mar 20 21:55:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 460 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 460 found at Mon Mar 20 21:55:37 UTC 2023 selfserv_9887 with PID 460 started at Mon Mar 20 21:55:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 460 at Mon Mar 20 21:55:38 UTC 2023 kill -USR1 460 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 460 killed at Mon Mar 20 21:55:38 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 512 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 512 found at Mon Mar 20 21:55:39 UTC 2023 selfserv_9887 with PID 512 started at Mon Mar 20 21:55:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 512 at Mon Mar 20 21:55:40 UTC 2023 kill -USR1 512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 512 killed at Mon Mar 20 21:55:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 564 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 564 found at Mon Mar 20 21:55:41 UTC 2023 selfserv_9887 with PID 564 started at Mon Mar 20 21:55:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 564 at Mon Mar 20 21:55:43 UTC 2023 kill -USR1 564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 564 killed at Mon Mar 20 21:55:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 631 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 631 found at Mon Mar 20 21:55:43 UTC 2023 selfserv_9887 with PID 631 started at Mon Mar 20 21:55:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 631 at Mon Mar 20 21:55:45 UTC 2023 kill -USR1 631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 631 killed at Mon Mar 20 21:55:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 683 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 683 found at Mon Mar 20 21:55:45 UTC 2023 selfserv_9887 with PID 683 started at Mon Mar 20 21:55:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 683 at Mon Mar 20 21:55:47 UTC 2023 kill -USR1 683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 683 killed at Mon Mar 20 21:55:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 735 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 735 found at Mon Mar 20 21:55:47 UTC 2023 selfserv_9887 with PID 735 started at Mon Mar 20 21:55:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 735 at Mon Mar 20 21:55:49 UTC 2023 kill -USR1 735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 735 killed at Mon Mar 20 21:55:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 788 found at Mon Mar 20 21:55:50 UTC 2023 selfserv_9887 with PID 788 started at Mon Mar 20 21:55:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 788 at Mon Mar 20 21:55:51 UTC 2023 kill -USR1 788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 788 killed at Mon Mar 20 21:55:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 840 found at Mon Mar 20 21:55:52 UTC 2023 selfserv_9887 with PID 840 started at Mon Mar 20 21:55:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 840 at Mon Mar 20 21:55:53 UTC 2023 kill -USR1 840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 840 killed at Mon Mar 20 21:55:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 892 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 892 found at Mon Mar 20 21:55:54 UTC 2023 selfserv_9887 with PID 892 started at Mon Mar 20 21:55:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 892 at Mon Mar 20 21:55:56 UTC 2023 kill -USR1 892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 892 killed at Mon Mar 20 21:55:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:55:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 945 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 945 found at Mon Mar 20 21:55:56 UTC 2023 selfserv_9887 with PID 945 started at Mon Mar 20 21:55:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1277: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 945 at Mon Mar 20 21:55:58 UTC 2023 kill -USR1 945 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 945 killed at Mon Mar 20 21:55:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:55:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:55:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 998 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 998 found at Mon Mar 20 21:55:58 UTC 2023 selfserv_9887 with PID 998 started at Mon Mar 20 21:55:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 998 at Mon Mar 20 21:56:00 UTC 2023 kill -USR1 998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 998 killed at Mon Mar 20 21:56:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1050 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1050 found at Mon Mar 20 21:56:00 UTC 2023 selfserv_9887 with PID 1050 started at Mon Mar 20 21:56:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1050 at Mon Mar 20 21:56:02 UTC 2023 kill -USR1 1050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1050 killed at Mon Mar 20 21:56:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1102 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1102 found at Mon Mar 20 21:56:03 UTC 2023 selfserv_9887 with PID 1102 started at Mon Mar 20 21:56:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1102 at Mon Mar 20 21:56:05 UTC 2023 kill -USR1 1102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1102 killed at Mon Mar 20 21:56:05 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1154 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1154 found at Mon Mar 20 21:56:05 UTC 2023 selfserv_9887 with PID 1154 started at Mon Mar 20 21:56:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1154 at Mon Mar 20 21:56:07 UTC 2023 kill -USR1 1154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1154 killed at Mon Mar 20 21:56:07 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1207 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1207 found at Mon Mar 20 21:56:07 UTC 2023 selfserv_9887 with PID 1207 started at Mon Mar 20 21:56:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1207 at Mon Mar 20 21:56:09 UTC 2023 kill -USR1 1207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1207 killed at Mon Mar 20 21:56:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1259 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1259 found at Mon Mar 20 21:56:09 UTC 2023 selfserv_9887 with PID 1259 started at Mon Mar 20 21:56:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1283: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1259 at Mon Mar 20 21:56:11 UTC 2023 kill -USR1 1259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1259 killed at Mon Mar 20 21:56:11 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1311 found at Mon Mar 20 21:56:11 UTC 2023 selfserv_9887 with PID 1311 started at Mon Mar 20 21:56:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1311 at Mon Mar 20 21:56:13 UTC 2023 kill -USR1 1311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1311 killed at Mon Mar 20 21:56:13 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1363 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1363 found at Mon Mar 20 21:56:14 UTC 2023 selfserv_9887 with PID 1363 started at Mon Mar 20 21:56:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1363 at Mon Mar 20 21:56:16 UTC 2023 kill -USR1 1363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1363 killed at Mon Mar 20 21:56:16 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1415 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1415 found at Mon Mar 20 21:56:16 UTC 2023 selfserv_9887 with PID 1415 started at Mon Mar 20 21:56:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1415 at Mon Mar 20 21:56:18 UTC 2023 kill -USR1 1415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1415 killed at Mon Mar 20 21:56:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1467 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1467 found at Mon Mar 20 21:56:18 UTC 2023 selfserv_9887 with PID 1467 started at Mon Mar 20 21:56:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1467 at Mon Mar 20 21:56:20 UTC 2023 kill -USR1 1467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1467 killed at Mon Mar 20 21:56:20 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1519 found at Mon Mar 20 21:56:20 UTC 2023 selfserv_9887 with PID 1519 started at Mon Mar 20 21:56:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1288: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1519 at Mon Mar 20 21:56:22 UTC 2023 kill -USR1 1519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1519 killed at Mon Mar 20 21:56:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1571 found at Mon Mar 20 21:56:22 UTC 2023 selfserv_9887 with PID 1571 started at Mon Mar 20 21:56:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1571 at Mon Mar 20 21:56:24 UTC 2023 kill -USR1 1571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1571 killed at Mon Mar 20 21:56:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1623 found at Mon Mar 20 21:56:24 UTC 2023 selfserv_9887 with PID 1623 started at Mon Mar 20 21:56:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1623 at Mon Mar 20 21:56:26 UTC 2023 kill -USR1 1623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1623 killed at Mon Mar 20 21:56:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1675 found at Mon Mar 20 21:56:26 UTC 2023 selfserv_9887 with PID 1675 started at Mon Mar 20 21:56:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1675 at Mon Mar 20 21:56:28 UTC 2023 kill -USR1 1675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1675 killed at Mon Mar 20 21:56:28 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1727 found at Mon Mar 20 21:56:28 UTC 2023 selfserv_9887 with PID 1727 started at Mon Mar 20 21:56:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1727 at Mon Mar 20 21:56:30 UTC 2023 kill -USR1 1727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1727 killed at Mon Mar 20 21:56:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1779 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1779 found at Mon Mar 20 21:56:30 UTC 2023 selfserv_9887 with PID 1779 started at Mon Mar 20 21:56:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1779 at Mon Mar 20 21:56:32 UTC 2023 kill -USR1 1779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1779 killed at Mon Mar 20 21:56:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1831 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1831 found at Mon Mar 20 21:56:33 UTC 2023 selfserv_9887 with PID 1831 started at Mon Mar 20 21:56:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1831 at Mon Mar 20 21:56:34 UTC 2023 kill -USR1 1831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1831 killed at Mon Mar 20 21:56:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1883 found at Mon Mar 20 21:56:34 UTC 2023 selfserv_9887 with PID 1883 started at Mon Mar 20 21:56:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1883 at Mon Mar 20 21:56:36 UTC 2023 kill -USR1 1883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1883 killed at Mon Mar 20 21:56:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1935 found at Mon Mar 20 21:56:37 UTC 2023 selfserv_9887 with PID 1935 started at Mon Mar 20 21:56:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1935 at Mon Mar 20 21:56:38 UTC 2023 kill -USR1 1935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1935 killed at Mon Mar 20 21:56:38 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1987 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1987 found at Mon Mar 20 21:56:39 UTC 2023 selfserv_9887 with PID 1987 started at Mon Mar 20 21:56:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1987 at Mon Mar 20 21:56:41 UTC 2023 kill -USR1 1987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1987 killed at Mon Mar 20 21:56:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2048 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2048 found at Mon Mar 20 21:56:41 UTC 2023 selfserv_9887 with PID 2048 started at Mon Mar 20 21:56:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2048 at Mon Mar 20 21:56:43 UTC 2023 kill -USR1 2048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2048 killed at Mon Mar 20 21:56:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2107 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2107 found at Mon Mar 20 21:56:43 UTC 2023 selfserv_9887 with PID 2107 started at Mon Mar 20 21:56:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2107 at Mon Mar 20 21:56:45 UTC 2023 kill -USR1 2107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2107 killed at Mon Mar 20 21:56:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2159 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2159 found at Mon Mar 20 21:56:45 UTC 2023 selfserv_9887 with PID 2159 started at Mon Mar 20 21:56:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2159 at Mon Mar 20 21:56:47 UTC 2023 kill -USR1 2159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2159 killed at Mon Mar 20 21:56:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2211 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2211 found at Mon Mar 20 21:56:47 UTC 2023 selfserv_9887 with PID 2211 started at Mon Mar 20 21:56:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2211 at Mon Mar 20 21:56:49 UTC 2023 kill -USR1 2211 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2211 killed at Mon Mar 20 21:56:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2263 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2263 found at Mon Mar 20 21:56:50 UTC 2023 selfserv_9887 with PID 2263 started at Mon Mar 20 21:56:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2263 at Mon Mar 20 21:56:51 UTC 2023 kill -USR1 2263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2263 killed at Mon Mar 20 21:56:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2315 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2315 found at Mon Mar 20 21:56:51 UTC 2023 selfserv_9887 with PID 2315 started at Mon Mar 20 21:56:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2315 at Mon Mar 20 21:56:54 UTC 2023 kill -USR1 2315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2315 killed at Mon Mar 20 21:56:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:56:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2367 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2367 found at Mon Mar 20 21:56:54 UTC 2023 selfserv_9887 with PID 2367 started at Mon Mar 20 21:56:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1304: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2367 at Mon Mar 20 21:56:56 UTC 2023 kill -USR1 2367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2367 killed at Mon Mar 20 21:56:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2419 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2419 found at Mon Mar 20 21:56:56 UTC 2023 selfserv_9887 with PID 2419 started at Mon Mar 20 21:56:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2419 at Mon Mar 20 21:56:58 UTC 2023 kill -USR1 2419 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2419 killed at Mon Mar 20 21:56:58 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:56:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:56:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2472 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2472 found at Mon Mar 20 21:56:58 UTC 2023 selfserv_9887 with PID 2472 started at Mon Mar 20 21:56:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2472 at Mon Mar 20 21:57:00 UTC 2023 kill -USR1 2472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2472 killed at Mon Mar 20 21:57:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:57:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2524 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2524 found at Mon Mar 20 21:57:00 UTC 2023 selfserv_9887 with PID 2524 started at Mon Mar 20 21:57:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2524 at Mon Mar 20 21:57:02 UTC 2023 kill -USR1 2524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2524 killed at Mon Mar 20 21:57:02 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 21:57:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2606 found at Mon Mar 20 21:57:03 UTC 2023 selfserv_9887 with PID 2606 started at Mon Mar 20 21:57:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2606 at Mon Mar 20 21:57:04 UTC 2023 kill -USR1 2606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2606 killed at Mon Mar 20 21:57:04 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2648 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2648 found at Mon Mar 20 21:57:04 UTC 2023 selfserv_9887 with PID 2648 started at Mon Mar 20 21:57:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2648 at Mon Mar 20 21:57:05 UTC 2023 kill -USR1 2648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2648 killed at Mon Mar 20 21:57:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2687 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2687 found at Mon Mar 20 21:57:05 UTC 2023 selfserv_9887 with PID 2687 started at Mon Mar 20 21:57:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2687 at Mon Mar 20 21:57:06 UTC 2023 kill -USR1 2687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2687 killed at Mon Mar 20 21:57:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2726 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2726 found at Mon Mar 20 21:57:06 UTC 2023 selfserv_9887 with PID 2726 started at Mon Mar 20 21:57:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2726 at Mon Mar 20 21:57:07 UTC 2023 kill -USR1 2726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2726 killed at Mon Mar 20 21:57:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2766 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2766 found at Mon Mar 20 21:57:08 UTC 2023 selfserv_9887 with PID 2766 started at Mon Mar 20 21:57:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1254: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 2766 at Mon Mar 20 21:57:08 UTC 2023 kill -USR1 2766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2766 killed at Mon Mar 20 21:57:08 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2805 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2805 found at Mon Mar 20 21:57:09 UTC 2023 selfserv_9887 with PID 2805 started at Mon Mar 20 21:57:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2805 at Mon Mar 20 21:57:10 UTC 2023 kill -USR1 2805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2805 killed at Mon Mar 20 21:57:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2844 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2844 found at Mon Mar 20 21:57:10 UTC 2023 selfserv_9887 with PID 2844 started at Mon Mar 20 21:57:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2844 at Mon Mar 20 21:57:11 UTC 2023 kill -USR1 2844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2844 killed at Mon Mar 20 21:57:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2883 found at Mon Mar 20 21:57:11 UTC 2023 selfserv_9887 with PID 2883 started at Mon Mar 20 21:57:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2883 at Mon Mar 20 21:57:12 UTC 2023 kill -USR1 2883 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2883 killed at Mon Mar 20 21:57:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2922 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2922 found at Mon Mar 20 21:57:12 UTC 2023 selfserv_9887 with PID 2922 started at Mon Mar 20 21:57:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2922 at Mon Mar 20 21:57:13 UTC 2023 kill -USR1 2922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2922 killed at Mon Mar 20 21:57:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2961 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2961 found at Mon Mar 20 21:57:13 UTC 2023 selfserv_9887 with PID 2961 started at Mon Mar 20 21:57:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2961 at Mon Mar 20 21:57:14 UTC 2023 kill -USR1 2961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2961 killed at Mon Mar 20 21:57:14 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3000 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3000 found at Mon Mar 20 21:57:14 UTC 2023 selfserv_9887 with PID 3000 started at Mon Mar 20 21:57:14 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3000 at Mon Mar 20 21:57:15 UTC 2023 kill -USR1 3000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3000 killed at Mon Mar 20 21:57:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3040 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3040 found at Mon Mar 20 21:57:16 UTC 2023 selfserv_9887 with PID 3040 started at Mon Mar 20 21:57:16 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3040 at Mon Mar 20 21:57:16 UTC 2023 kill -USR1 3040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3040 killed at Mon Mar 20 21:57:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3080 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3080 found at Mon Mar 20 21:57:17 UTC 2023 selfserv_9887 with PID 3080 started at Mon Mar 20 21:57:17 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3080 at Mon Mar 20 21:57:18 UTC 2023 kill -USR1 3080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3080 killed at Mon Mar 20 21:57:18 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3120 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3120 found at Mon Mar 20 21:57:18 UTC 2023 selfserv_9887 with PID 3120 started at Mon Mar 20 21:57:18 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3120 at Mon Mar 20 21:57:19 UTC 2023 kill -USR1 3120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3120 killed at Mon Mar 20 21:57:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3161 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3161 found at Mon Mar 20 21:57:19 UTC 2023 selfserv_9887 with PID 3161 started at Mon Mar 20 21:57:19 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3161 at Mon Mar 20 21:57:20 UTC 2023 kill -USR1 3161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3161 killed at Mon Mar 20 21:57:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3201 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3201 found at Mon Mar 20 21:57:20 UTC 2023 selfserv_9887 with PID 3201 started at Mon Mar 20 21:57:20 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3201 at Mon Mar 20 21:57:21 UTC 2023 kill -USR1 3201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3201 killed at Mon Mar 20 21:57:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3241 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3241 found at Mon Mar 20 21:57:21 UTC 2023 selfserv_9887 with PID 3241 started at Mon Mar 20 21:57:21 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3241 at Mon Mar 20 21:57:22 UTC 2023 kill -USR1 3241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3241 killed at Mon Mar 20 21:57:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3281 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3281 found at Mon Mar 20 21:57:22 UTC 2023 selfserv_9887 with PID 3281 started at Mon Mar 20 21:57:22 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3281 at Mon Mar 20 21:57:23 UTC 2023 kill -USR1 3281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3281 killed at Mon Mar 20 21:57:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 21:57:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3321 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3321 found at Mon Mar 20 21:57:23 UTC 2023 selfserv_9887 with PID 3321 started at Mon Mar 20 21:57:23 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3321 at Mon Mar 20 21:57:24 UTC 2023 kill -USR1 3321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3321 killed at Mon Mar 20 21:57:24 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -fips false -force FIPS mode disabled. ssl.sh: #1269: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1272: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -fips true -force FIPS mode enabled. ssl.sh: #1275: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1276: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1277: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1278: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1279: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1280: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 21:57:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3443 found at Mon Mar 20 21:57:26 UTC 2023 selfserv_9887 with PID 3443 started at Mon Mar 20 21:57:26 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 3443 at Mon Mar 20 21:57:41 UTC 2023 kill -USR1 3443 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3443 killed at Mon Mar 20 21:57:41 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 21:57:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:57:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 4023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4023 found at Mon Mar 20 21:57:41 UTC 2023 selfserv_9887 with PID 4023 started at Mon Mar 20 21:57:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4023 at Mon Mar 20 21:58:09 UTC 2023 kill -USR1 4023 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4023 killed at Mon Mar 20 21:58:09 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 21:58:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:58:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4833 found at Mon Mar 20 21:58:09 UTC 2023 selfserv_9887 with PID 4833 started at Mon Mar 20 21:58:09 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1408: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4833 at Mon Mar 20 21:58:10 UTC 2023 kill -USR1 4833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4833 killed at Mon Mar 20 21:58:10 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:58:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:58:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4912 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4912 found at Mon Mar 20 21:58:10 UTC 2023 selfserv_9887 with PID 4912 started at Mon Mar 20 21:58:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4912 at Mon Mar 20 21:58:12 UTC 2023 kill -USR1 4912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4912 killed at Mon Mar 20 21:58:12 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:58:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:58:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4964 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4964 found at Mon Mar 20 21:58:12 UTC 2023 selfserv_9887 with PID 4964 started at Mon Mar 20 21:58:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4964 at Mon Mar 20 21:58:36 UTC 2023 kill -USR1 4964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4964 killed at Mon Mar 20 21:58:36 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:58:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:58:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5016 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5016 found at Mon Mar 20 21:58:36 UTC 2023 selfserv_9887 with PID 5016 started at Mon Mar 20 21:58:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5016 at Mon Mar 20 21:58:38 UTC 2023 kill -USR1 5016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5016 killed at Mon Mar 20 21:58:38 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:58:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:58:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5080 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5080 found at Mon Mar 20 21:58:38 UTC 2023 selfserv_9887 with PID 5080 started at Mon Mar 20 21:58:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5080 at Mon Mar 20 21:58:39 UTC 2023 kill -USR1 5080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5080 killed at Mon Mar 20 21:58:39 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:58:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:58:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5132 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5132 found at Mon Mar 20 21:58:40 UTC 2023 selfserv_9887 with PID 5132 started at Mon Mar 20 21:58:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1412: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5132 at Mon Mar 20 21:59:03 UTC 2023 kill -USR1 5132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5132 killed at Mon Mar 20 21:59:03 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:59:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5199 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5199 found at Mon Mar 20 21:59:03 UTC 2023 selfserv_9887 with PID 5199 started at Mon Mar 20 21:59:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5199 at Mon Mar 20 21:59:04 UTC 2023 kill -USR1 5199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5199 killed at Mon Mar 20 21:59:04 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:59:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5263 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5263 found at Mon Mar 20 21:59:04 UTC 2023 selfserv_9887 with PID 5263 started at Mon Mar 20 21:59:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5263 at Mon Mar 20 21:59:06 UTC 2023 kill -USR1 5263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5263 killed at Mon Mar 20 21:59:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:59:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5315 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5315 found at Mon Mar 20 21:59:06 UTC 2023 selfserv_9887 with PID 5315 started at Mon Mar 20 21:59:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1415: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5315 at Mon Mar 20 21:59:31 UTC 2023 kill -USR1 5315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5315 killed at Mon Mar 20 21:59:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:59:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5369 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5369 found at Mon Mar 20 21:59:31 UTC 2023 selfserv_9887 with PID 5369 started at Mon Mar 20 21:59:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5369 at Mon Mar 20 21:59:32 UTC 2023 kill -USR1 5369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5369 killed at Mon Mar 20 21:59:33 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 21:59:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5433 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5433 found at Mon Mar 20 21:59:33 UTC 2023 selfserv_9887 with PID 5433 started at Mon Mar 20 21:59:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1417: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5433 at Mon Mar 20 21:59:34 UTC 2023 kill -USR1 5433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5433 killed at Mon Mar 20 21:59:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 21:59:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5485 found at Mon Mar 20 21:59:35 UTC 2023 selfserv_9887 with PID 5485 started at Mon Mar 20 21:59:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5485 at Mon Mar 20 21:59:59 UTC 2023 kill -USR1 5485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5485 killed at Mon Mar 20 21:59:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 21:59:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 21:59:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5552 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5552 found at Mon Mar 20 21:59:59 UTC 2023 selfserv_9887 with PID 5552 started at Mon Mar 20 21:59:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5552 at Mon Mar 20 22:00:01 UTC 2023 kill -USR1 5552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5552 killed at Mon Mar 20 22:00:01 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:00:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5698 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5698 found at Mon Mar 20 22:00:01 UTC 2023 selfserv_9887 with PID 5698 started at Mon Mar 20 22:00:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1420: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5698 at Mon Mar 20 22:00:02 UTC 2023 kill -USR1 5698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5698 killed at Mon Mar 20 22:00:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:00:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5750 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5750 found at Mon Mar 20 22:00:03 UTC 2023 selfserv_9887 with PID 5750 started at Mon Mar 20 22:00:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5750 at Mon Mar 20 22:00:26 UTC 2023 kill -USR1 5750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5750 killed at Mon Mar 20 22:00:26 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:00:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5802 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5802 found at Mon Mar 20 22:00:26 UTC 2023 selfserv_9887 with PID 5802 started at Mon Mar 20 22:00:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5802 at Mon Mar 20 22:00:27 UTC 2023 kill -USR1 5802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5802 killed at Mon Mar 20 22:00:27 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:00:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5858 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5858 found at Mon Mar 20 22:00:27 UTC 2023 selfserv_9887 with PID 5858 started at Mon Mar 20 22:00:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5858 at Mon Mar 20 22:00:29 UTC 2023 kill -USR1 5858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5858 killed at Mon Mar 20 22:00:29 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:00:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5914 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5914 found at Mon Mar 20 22:00:29 UTC 2023 selfserv_9887 with PID 5914 started at Mon Mar 20 22:00:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5914 at Mon Mar 20 22:00:30 UTC 2023 kill -USR1 5914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5914 killed at Mon Mar 20 22:00:30 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:00:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5970 found at Mon Mar 20 22:00:30 UTC 2023 selfserv_9887 with PID 5970 started at Mon Mar 20 22:00:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5970 at Mon Mar 20 22:00:32 UTC 2023 kill -USR1 5970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5970 killed at Mon Mar 20 22:00:32 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:00:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6030 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6030 found at Mon Mar 20 22:00:32 UTC 2023 selfserv_9887 with PID 6030 started at Mon Mar 20 22:00:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6030 at Mon Mar 20 22:00:56 UTC 2023 kill -USR1 6030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6030 killed at Mon Mar 20 22:00:56 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:00:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6097 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6097 found at Mon Mar 20 22:00:56 UTC 2023 selfserv_9887 with PID 6097 started at Mon Mar 20 22:00:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6097 at Mon Mar 20 22:00:58 UTC 2023 kill -USR1 6097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6097 killed at Mon Mar 20 22:00:58 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:00:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:00:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6157 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6157 found at Mon Mar 20 22:00:58 UTC 2023 selfserv_9887 with PID 6157 started at Mon Mar 20 22:00:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6157 at Mon Mar 20 22:01:21 UTC 2023 kill -USR1 6157 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6157 killed at Mon Mar 20 22:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:01:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:01:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6225 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6225 found at Mon Mar 20 22:01:21 UTC 2023 selfserv_9887 with PID 6225 started at Mon Mar 20 22:01:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6225 at Mon Mar 20 22:01:22 UTC 2023 kill -USR1 6225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6225 killed at Mon Mar 20 22:01:22 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:01:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:01:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6296 found at Mon Mar 20 22:01:23 UTC 2023 selfserv_9887 with PID 6296 started at Mon Mar 20 22:01:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1430: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6296 at Mon Mar 20 22:01:47 UTC 2023 kill -USR1 6296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6296 killed at Mon Mar 20 22:01:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:01:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:01:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6367 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6367 found at Mon Mar 20 22:01:47 UTC 2023 selfserv_9887 with PID 6367 started at Mon Mar 20 22:01:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6367 at Mon Mar 20 22:01:48 UTC 2023 kill -USR1 6367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6367 killed at Mon Mar 20 22:01:49 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:01:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:01:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6427 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6427 found at Mon Mar 20 22:01:49 UTC 2023 selfserv_9887 with PID 6427 started at Mon Mar 20 22:01:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1432: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6427 at Mon Mar 20 22:02:13 UTC 2023 kill -USR1 6427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6427 killed at Mon Mar 20 22:02:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:02:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6486 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6486 found at Mon Mar 20 22:02:13 UTC 2023 selfserv_9887 with PID 6486 started at Mon Mar 20 22:02:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6486 at Mon Mar 20 22:02:15 UTC 2023 kill -USR1 6486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6486 killed at Mon Mar 20 22:02:15 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:02:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6551 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6551 found at Mon Mar 20 22:02:15 UTC 2023 selfserv_9887 with PID 6551 started at Mon Mar 20 22:02:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1434: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6551 at Mon Mar 20 22:02:38 UTC 2023 kill -USR1 6551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6551 killed at Mon Mar 20 22:02:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:02:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6607 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6607 found at Mon Mar 20 22:02:38 UTC 2023 selfserv_9887 with PID 6607 started at Mon Mar 20 22:02:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6607 at Mon Mar 20 22:02:40 UTC 2023 kill -USR1 6607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6607 killed at Mon Mar 20 22:02:40 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:02:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6667 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6667 found at Mon Mar 20 22:02:40 UTC 2023 selfserv_9887 with PID 6667 started at Mon Mar 20 22:02:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6667 at Mon Mar 20 22:02:41 UTC 2023 kill -USR1 6667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6667 killed at Mon Mar 20 22:02:41 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:02:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6730 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6730 found at Mon Mar 20 22:02:42 UTC 2023 selfserv_9887 with PID 6730 started at Mon Mar 20 22:02:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6730 at Mon Mar 20 22:02:43 UTC 2023 kill -USR1 6730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6730 killed at Mon Mar 20 22:02:43 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:02:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6790 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6790 found at Mon Mar 20 22:02:43 UTC 2023 selfserv_9887 with PID 6790 started at Mon Mar 20 22:02:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6790 at Mon Mar 20 22:02:44 UTC 2023 kill -USR1 6790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6790 killed at Mon Mar 20 22:02:44 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:02:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6856 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6856 found at Mon Mar 20 22:02:44 UTC 2023 selfserv_9887 with PID 6856 started at Mon Mar 20 22:02:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6856 at Mon Mar 20 22:02:46 UTC 2023 kill -USR1 6856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6856 killed at Mon Mar 20 22:02:46 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:02:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6914 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6914 found at Mon Mar 20 22:02:46 UTC 2023 selfserv_9887 with PID 6914 started at Mon Mar 20 22:02:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6914 at Mon Mar 20 22:02:47 UTC 2023 kill -USR1 6914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6914 killed at Mon Mar 20 22:02:47 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:02:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6974 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6974 found at Mon Mar 20 22:02:47 UTC 2023 selfserv_9887 with PID 6974 started at Mon Mar 20 22:02:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1441: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6974 at Mon Mar 20 22:02:48 UTC 2023 kill -USR1 6974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6974 killed at Mon Mar 20 22:02:48 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 22:02:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7033 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7033 found at Mon Mar 20 22:02:48 UTC 2023 selfserv_9887 with PID 7033 started at Mon Mar 20 22:02:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1442: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7033 at Mon Mar 20 22:02:49 UTC 2023 kill -USR1 7033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7033 killed at Mon Mar 20 22:02:49 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:02:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7093 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7093 found at Mon Mar 20 22:02:49 UTC 2023 selfserv_9887 with PID 7093 started at Mon Mar 20 22:02:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1443: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7093 at Mon Mar 20 22:02:50 UTC 2023 kill -USR1 7093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7093 killed at Mon Mar 20 22:02:51 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:02:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7151 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7151 found at Mon Mar 20 22:02:51 UTC 2023 selfserv_9887 with PID 7151 started at Mon Mar 20 22:02:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7151 at Mon Mar 20 22:02:52 UTC 2023 kill -USR1 7151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7151 killed at Mon Mar 20 22:02:52 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:02:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7209 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7209 found at Mon Mar 20 22:02:52 UTC 2023 selfserv_9887 with PID 7209 started at Mon Mar 20 22:02:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1445: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7209 at Mon Mar 20 22:02:53 UTC 2023 kill -USR1 7209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7209 killed at Mon Mar 20 22:02:53 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:02:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7267 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7267 found at Mon Mar 20 22:02:54 UTC 2023 selfserv_9887 with PID 7267 started at Mon Mar 20 22:02:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1446: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7267 at Mon Mar 20 22:02:55 UTC 2023 kill -USR1 7267 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7267 killed at Mon Mar 20 22:02:55 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:02:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7325 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7325 found at Mon Mar 20 22:02:55 UTC 2023 selfserv_9887 with PID 7325 started at Mon Mar 20 22:02:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1447: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7325 at Mon Mar 20 22:02:56 UTC 2023 kill -USR1 7325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7325 killed at Mon Mar 20 22:02:56 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 22:02:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7367 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7367 found at Mon Mar 20 22:02:56 UTC 2023 selfserv_9887 with PID 7367 started at Mon Mar 20 22:02:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1408: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7367 at Mon Mar 20 22:02:57 UTC 2023 kill -USR1 7367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7367 killed at Mon Mar 20 22:02:57 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 22:02:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7409 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7409 found at Mon Mar 20 22:02:57 UTC 2023 selfserv_9887 with PID 7409 started at Mon Mar 20 22:02:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 7409 at Mon Mar 20 22:02:58 UTC 2023 kill -USR1 7409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7409 killed at Mon Mar 20 22:02:58 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 22:02:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:02:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7452 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7452 found at Mon Mar 20 22:02:58 UTC 2023 selfserv_9887 with PID 7452 started at Mon Mar 20 22:02:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 7452 at Mon Mar 20 22:03:00 UTC 2023 kill -USR1 7452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7452 killed at Mon Mar 20 22:03:00 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 22:03:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:03:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7494 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7494 found at Mon Mar 20 22:03:00 UTC 2023 selfserv_9887 with PID 7494 started at Mon Mar 20 22:03:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 7494 at Mon Mar 20 22:03:01 UTC 2023 kill -USR1 7494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7494 killed at Mon Mar 20 22:03:01 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 22:03:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:03:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7536 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7536 found at Mon Mar 20 22:03:01 UTC 2023 selfserv_9887 with PID 7536 started at Mon Mar 20 22:03:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 7536 at Mon Mar 20 22:03:02 UTC 2023 kill -USR1 7536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7536 killed at Mon Mar 20 22:03:02 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 22:03:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:03:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7580 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7580 found at Mon Mar 20 22:03:02 UTC 2023 selfserv_9887 with PID 7580 started at Mon Mar 20 22:03:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 7580 at Mon Mar 20 22:03:03 UTC 2023 kill -USR1 7580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7580 killed at Mon Mar 20 22:03:03 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 22:03:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:03:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7623 found at Mon Mar 20 22:03:03 UTC 2023 selfserv_9887 with PID 7623 started at Mon Mar 20 22:03:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1414: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 7623 at Mon Mar 20 22:03:04 UTC 2023 kill -USR1 7623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7623 killed at Mon Mar 20 22:03:04 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 22:03:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:03:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7665 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7665 found at Mon Mar 20 22:03:04 UTC 2023 selfserv_9887 with PID 7665 started at Mon Mar 20 22:03:04 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 22:03:04 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 22:04:18 UTC 2023 ssl.sh: #1415: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 7665 at Mon Mar 20 22:04:18 UTC 2023 kill -USR1 7665 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7665 killed at Mon Mar 20 22:04:18 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:04:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7732 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7732 found at Mon Mar 20 22:04:18 UTC 2023 selfserv_9887 with PID 7732 started at Mon Mar 20 22:04:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7732 at Mon Mar 20 22:04:19 UTC 2023 kill -USR1 7732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7732 killed at Mon Mar 20 22:04:19 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7775 found at Mon Mar 20 22:04:19 UTC 2023 selfserv_9887 with PID 7775 started at Mon Mar 20 22:04:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7775 at Mon Mar 20 22:04:20 UTC 2023 kill -USR1 7775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7775 killed at Mon Mar 20 22:04:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7816 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7816 found at Mon Mar 20 22:04:20 UTC 2023 selfserv_9887 with PID 7816 started at Mon Mar 20 22:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7816 at Mon Mar 20 22:04:20 UTC 2023 kill -USR1 7816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7816 killed at Mon Mar 20 22:04:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7856 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7856 found at Mon Mar 20 22:04:21 UTC 2023 selfserv_9887 with PID 7856 started at Mon Mar 20 22:04:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7856 at Mon Mar 20 22:04:21 UTC 2023 kill -USR1 7856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7856 killed at Mon Mar 20 22:04:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7895 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7895 found at Mon Mar 20 22:04:22 UTC 2023 selfserv_9887 with PID 7895 started at Mon Mar 20 22:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7895 at Mon Mar 20 22:04:22 UTC 2023 kill -USR1 7895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7895 killed at Mon Mar 20 22:04:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7937 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7937 found at Mon Mar 20 22:04:22 UTC 2023 selfserv_9887 with PID 7937 started at Mon Mar 20 22:04:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7937 at Mon Mar 20 22:04:23 UTC 2023 kill -USR1 7937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7937 killed at Mon Mar 20 22:04:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7976 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7976 found at Mon Mar 20 22:04:23 UTC 2023 selfserv_9887 with PID 7976 started at Mon Mar 20 22:04:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7976 at Mon Mar 20 22:04:24 UTC 2023 kill -USR1 7976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7976 killed at Mon Mar 20 22:04:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8016 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8016 found at Mon Mar 20 22:04:24 UTC 2023 selfserv_9887 with PID 8016 started at Mon Mar 20 22:04:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8016 at Mon Mar 20 22:04:25 UTC 2023 kill -USR1 8016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8016 killed at Mon Mar 20 22:04:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8055 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8055 found at Mon Mar 20 22:04:25 UTC 2023 selfserv_9887 with PID 8055 started at Mon Mar 20 22:04:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8055 at Mon Mar 20 22:04:25 UTC 2023 kill -USR1 8055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8055 killed at Mon Mar 20 22:04:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8096 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8096 found at Mon Mar 20 22:04:26 UTC 2023 selfserv_9887 with PID 8096 started at Mon Mar 20 22:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8096 at Mon Mar 20 22:04:26 UTC 2023 kill -USR1 8096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8096 killed at Mon Mar 20 22:04:26 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8135 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8135 found at Mon Mar 20 22:04:27 UTC 2023 selfserv_9887 with PID 8135 started at Mon Mar 20 22:04:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8135 at Mon Mar 20 22:04:27 UTC 2023 kill -USR1 8135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8135 killed at Mon Mar 20 22:04:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8175 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8175 found at Mon Mar 20 22:04:27 UTC 2023 selfserv_9887 with PID 8175 started at Mon Mar 20 22:04:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8175 at Mon Mar 20 22:04:28 UTC 2023 kill -USR1 8175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8175 killed at Mon Mar 20 22:04:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8216 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8216 found at Mon Mar 20 22:04:28 UTC 2023 selfserv_9887 with PID 8216 started at Mon Mar 20 22:04:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8216 at Mon Mar 20 22:04:29 UTC 2023 kill -USR1 8216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8216 killed at Mon Mar 20 22:04:29 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8256 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8256 found at Mon Mar 20 22:04:29 UTC 2023 selfserv_9887 with PID 8256 started at Mon Mar 20 22:04:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8256 at Mon Mar 20 22:04:29 UTC 2023 kill -USR1 8256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8256 killed at Mon Mar 20 22:04:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8297 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8297 found at Mon Mar 20 22:04:30 UTC 2023 selfserv_9887 with PID 8297 started at Mon Mar 20 22:04:30 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8297 at Mon Mar 20 22:04:30 UTC 2023 kill -USR1 8297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8297 killed at Mon Mar 20 22:04:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8338 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8338 found at Mon Mar 20 22:04:31 UTC 2023 selfserv_9887 with PID 8338 started at Mon Mar 20 22:04:31 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8338 at Mon Mar 20 22:04:31 UTC 2023 kill -USR1 8338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8338 killed at Mon Mar 20 22:04:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8378 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8378 found at Mon Mar 20 22:04:31 UTC 2023 selfserv_9887 with PID 8378 started at Mon Mar 20 22:04:31 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8378 at Mon Mar 20 22:04:32 UTC 2023 kill -USR1 8378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8378 killed at Mon Mar 20 22:04:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8418 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8418 found at Mon Mar 20 22:04:32 UTC 2023 selfserv_9887 with PID 8418 started at Mon Mar 20 22:04:32 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8418 at Mon Mar 20 22:04:33 UTC 2023 kill -USR1 8418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8418 killed at Mon Mar 20 22:04:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:04:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8458 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8458 found at Mon Mar 20 22:04:33 UTC 2023 selfserv_9887 with PID 8458 started at Mon Mar 20 22:04:33 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8458 at Mon Mar 20 22:04:34 UTC 2023 kill -USR1 8458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8458 killed at Mon Mar 20 22:04:34 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 22:04:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 8498 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8498 found at Mon Mar 20 22:04:34 UTC 2023 selfserv_9887 with PID 8498 started at Mon Mar 20 22:04:34 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 8498 at Mon Mar 20 22:04:49 UTC 2023 kill -USR1 8498 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8498 killed at Mon Mar 20 22:04:50 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:04:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:04:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: exiting with return code 0 kill -0 9063 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9063 found at Mon Mar 20 22:04:50 UTC 2023 selfserv_9887 with PID 9063 started at Mon Mar 20 22:04:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9063 at Mon Mar 20 22:05:14 UTC 2023 kill -USR1 9063 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9063 killed at Mon Mar 20 22:05:14 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:05:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:05:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9887 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9887 found at Mon Mar 20 22:05:14 UTC 2023 selfserv_9887 with PID 9887 started at Mon Mar 20 22:05:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9887 at Mon Mar 20 22:05:17 UTC 2023 kill -USR1 9887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9887 killed at Mon Mar 20 22:05:17 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:05:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:05:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9939 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9939 found at Mon Mar 20 22:05:17 UTC 2023 selfserv_9887 with PID 9939 started at Mon Mar 20 22:05:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9939 at Mon Mar 20 22:05:43 UTC 2023 kill -USR1 9939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9939 killed at Mon Mar 20 22:05:43 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:05:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:05:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9999 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9999 found at Mon Mar 20 22:05:43 UTC 2023 selfserv_9887 with PID 9999 started at Mon Mar 20 22:05:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9999 at Mon Mar 20 22:05:45 UTC 2023 kill -USR1 9999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9999 killed at Mon Mar 20 22:05:46 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:05:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:05:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10070 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10070 found at Mon Mar 20 22:05:46 UTC 2023 selfserv_9887 with PID 10070 started at Mon Mar 20 22:05:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10070 at Mon Mar 20 22:05:48 UTC 2023 kill -USR1 10070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10070 killed at Mon Mar 20 22:05:49 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:05:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10123 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10123 found at Mon Mar 20 22:05:49 UTC 2023 selfserv_9887 with PID 10123 started at Mon Mar 20 22:05:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1566: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10123 at Mon Mar 20 22:06:12 UTC 2023 kill -USR1 10123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10123 killed at Mon Mar 20 22:06:12 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:06:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:06:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10175 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10175 found at Mon Mar 20 22:06:13 UTC 2023 selfserv_9887 with PID 10175 started at Mon Mar 20 22:06:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10175 at Mon Mar 20 22:06:15 UTC 2023 kill -USR1 10175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10175 killed at Mon Mar 20 22:06:15 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:06:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:06:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10239 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10239 found at Mon Mar 20 22:06:15 UTC 2023 selfserv_9887 with PID 10239 started at Mon Mar 20 22:06:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10239 at Mon Mar 20 22:06:18 UTC 2023 kill -USR1 10239 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10239 killed at Mon Mar 20 22:06:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:06:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10291 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10291 found at Mon Mar 20 22:06:18 UTC 2023 selfserv_9887 with PID 10291 started at Mon Mar 20 22:06:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1569: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10291 at Mon Mar 20 22:06:43 UTC 2023 kill -USR1 10291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10291 killed at Mon Mar 20 22:06:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:06:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:06:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10361 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10361 found at Mon Mar 20 22:06:44 UTC 2023 selfserv_9887 with PID 10361 started at Mon Mar 20 22:06:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10361 at Mon Mar 20 22:06:46 UTC 2023 kill -USR1 10361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10361 killed at Mon Mar 20 22:06:46 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:06:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:06:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10425 found at Mon Mar 20 22:06:46 UTC 2023 selfserv_9887 with PID 10425 started at Mon Mar 20 22:06:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1571: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10425 at Mon Mar 20 22:06:49 UTC 2023 kill -USR1 10425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10425 killed at Mon Mar 20 22:06:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:06:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:06:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10477 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10477 found at Mon Mar 20 22:06:49 UTC 2023 selfserv_9887 with PID 10477 started at Mon Mar 20 22:06:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10477 at Mon Mar 20 22:07:14 UTC 2023 kill -USR1 10477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10477 killed at Mon Mar 20 22:07:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:07:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10529 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10529 found at Mon Mar 20 22:07:15 UTC 2023 selfserv_9887 with PID 10529 started at Mon Mar 20 22:07:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10529 at Mon Mar 20 22:07:17 UTC 2023 kill -USR1 10529 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10529 killed at Mon Mar 20 22:07:17 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:07:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10593 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10593 found at Mon Mar 20 22:07:17 UTC 2023 selfserv_9887 with PID 10593 started at Mon Mar 20 22:07:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10593 at Mon Mar 20 22:07:20 UTC 2023 kill -USR1 10593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10593 killed at Mon Mar 20 22:07:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:07:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10645 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10645 found at Mon Mar 20 22:07:20 UTC 2023 selfserv_9887 with PID 10645 started at Mon Mar 20 22:07:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10645 at Mon Mar 20 22:07:44 UTC 2023 kill -USR1 10645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10645 killed at Mon Mar 20 22:07:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:07:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10713 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10713 found at Mon Mar 20 22:07:44 UTC 2023 selfserv_9887 with PID 10713 started at Mon Mar 20 22:07:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10713 at Mon Mar 20 22:07:46 UTC 2023 kill -USR1 10713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10713 killed at Mon Mar 20 22:07:46 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:07:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10769 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10769 found at Mon Mar 20 22:07:47 UTC 2023 selfserv_9887 with PID 10769 started at Mon Mar 20 22:07:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10769 at Mon Mar 20 22:07:49 UTC 2023 kill -USR1 10769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10769 killed at Mon Mar 20 22:07:49 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:07:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10825 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10825 found at Mon Mar 20 22:07:49 UTC 2023 selfserv_9887 with PID 10825 started at Mon Mar 20 22:07:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10825 at Mon Mar 20 22:07:52 UTC 2023 kill -USR1 10825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10825 killed at Mon Mar 20 22:07:52 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:07:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10881 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10881 found at Mon Mar 20 22:07:52 UTC 2023 selfserv_9887 with PID 10881 started at Mon Mar 20 22:07:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10881 at Mon Mar 20 22:07:55 UTC 2023 kill -USR1 10881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10881 killed at Mon Mar 20 22:07:55 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:07:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:07:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10941 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10941 found at Mon Mar 20 22:07:55 UTC 2023 selfserv_9887 with PID 10941 started at Mon Mar 20 22:07:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10941 at Mon Mar 20 22:08:21 UTC 2023 kill -USR1 10941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10941 killed at Mon Mar 20 22:08:21 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:08:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:08:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10993 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10993 found at Mon Mar 20 22:08:21 UTC 2023 selfserv_9887 with PID 10993 started at Mon Mar 20 22:08:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10993 at Mon Mar 20 22:08:23 UTC 2023 kill -USR1 10993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10993 killed at Mon Mar 20 22:08:23 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:08:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:08:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11053 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11053 found at Mon Mar 20 22:08:23 UTC 2023 selfserv_9887 with PID 11053 started at Mon Mar 20 22:08:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11053 at Mon Mar 20 22:08:47 UTC 2023 kill -USR1 11053 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11053 killed at Mon Mar 20 22:08:47 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:08:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:08:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11120 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11120 found at Mon Mar 20 22:08:47 UTC 2023 selfserv_9887 with PID 11120 started at Mon Mar 20 22:08:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11120 at Mon Mar 20 22:08:49 UTC 2023 kill -USR1 11120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11120 killed at Mon Mar 20 22:08:49 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:08:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:08:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11181 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11181 found at Mon Mar 20 22:08:49 UTC 2023 selfserv_9887 with PID 11181 started at Mon Mar 20 22:08:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1584: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11181 at Mon Mar 20 22:09:15 UTC 2023 kill -USR1 11181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11181 killed at Mon Mar 20 22:09:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:09:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:09:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11233 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11233 found at Mon Mar 20 22:09:15 UTC 2023 selfserv_9887 with PID 11233 started at Mon Mar 20 22:09:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11233 at Mon Mar 20 22:09:17 UTC 2023 kill -USR1 11233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11233 killed at Mon Mar 20 22:09:17 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:09:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:09:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11293 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11293 found at Mon Mar 20 22:09:17 UTC 2023 selfserv_9887 with PID 11293 started at Mon Mar 20 22:09:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1586: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11293 at Mon Mar 20 22:09:42 UTC 2023 kill -USR1 11293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11293 killed at Mon Mar 20 22:09:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:09:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:09:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11353 found at Mon Mar 20 22:09:43 UTC 2023 selfserv_9887 with PID 11353 started at Mon Mar 20 22:09:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11353 at Mon Mar 20 22:09:45 UTC 2023 kill -USR1 11353 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11353 killed at Mon Mar 20 22:09:45 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:09:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:09:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11420 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11420 found at Mon Mar 20 22:09:45 UTC 2023 selfserv_9887 with PID 11420 started at Mon Mar 20 22:09:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1588: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11420 at Mon Mar 20 22:10:08 UTC 2023 kill -USR1 11420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11420 killed at Mon Mar 20 22:10:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:10:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11473 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11473 found at Mon Mar 20 22:10:09 UTC 2023 selfserv_9887 with PID 11473 started at Mon Mar 20 22:10:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11473 at Mon Mar 20 22:10:11 UTC 2023 kill -USR1 11473 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11473 killed at Mon Mar 20 22:10:11 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:10:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11525 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11525 found at Mon Mar 20 22:10:11 UTC 2023 selfserv_9887 with PID 11525 started at Mon Mar 20 22:10:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11525 at Mon Mar 20 22:10:14 UTC 2023 kill -USR1 11525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11525 killed at Mon Mar 20 22:10:14 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:10:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11577 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11577 found at Mon Mar 20 22:10:14 UTC 2023 selfserv_9887 with PID 11577 started at Mon Mar 20 22:10:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11577 at Mon Mar 20 22:10:17 UTC 2023 kill -USR1 11577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11577 killed at Mon Mar 20 22:10:17 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:10:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11660 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11660 found at Mon Mar 20 22:10:17 UTC 2023 selfserv_9887 with PID 11660 started at Mon Mar 20 22:10:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11660 at Mon Mar 20 22:10:19 UTC 2023 kill -USR1 11660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11660 killed at Mon Mar 20 22:10:19 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11702 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11702 found at Mon Mar 20 22:10:19 UTC 2023 selfserv_9887 with PID 11702 started at Mon Mar 20 22:10:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11702 at Mon Mar 20 22:10:20 UTC 2023 kill -USR1 11702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11702 killed at Mon Mar 20 22:10:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11742 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11742 found at Mon Mar 20 22:10:20 UTC 2023 selfserv_9887 with PID 11742 started at Mon Mar 20 22:10:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 11742 at Mon Mar 20 22:10:21 UTC 2023 kill -USR1 11742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11742 killed at Mon Mar 20 22:10:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11781 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11781 found at Mon Mar 20 22:10:21 UTC 2023 selfserv_9887 with PID 11781 started at Mon Mar 20 22:10:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11781 at Mon Mar 20 22:10:22 UTC 2023 kill -USR1 11781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11781 killed at Mon Mar 20 22:10:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11820 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11820 found at Mon Mar 20 22:10:22 UTC 2023 selfserv_9887 with PID 11820 started at Mon Mar 20 22:10:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1566: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 11820 at Mon Mar 20 22:10:23 UTC 2023 kill -USR1 11820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11820 killed at Mon Mar 20 22:10:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11859 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11859 found at Mon Mar 20 22:10:23 UTC 2023 selfserv_9887 with PID 11859 started at Mon Mar 20 22:10:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11859 at Mon Mar 20 22:10:24 UTC 2023 kill -USR1 11859 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11859 killed at Mon Mar 20 22:10:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11898 found at Mon Mar 20 22:10:25 UTC 2023 selfserv_9887 with PID 11898 started at Mon Mar 20 22:10:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11898 at Mon Mar 20 22:10:26 UTC 2023 kill -USR1 11898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11898 killed at Mon Mar 20 22:10:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11937 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11937 found at Mon Mar 20 22:10:26 UTC 2023 selfserv_9887 with PID 11937 started at Mon Mar 20 22:10:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11937 at Mon Mar 20 22:10:27 UTC 2023 kill -USR1 11937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11937 killed at Mon Mar 20 22:10:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11976 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11976 found at Mon Mar 20 22:10:27 UTC 2023 selfserv_9887 with PID 11976 started at Mon Mar 20 22:10:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11976 at Mon Mar 20 22:10:28 UTC 2023 kill -USR1 11976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11976 killed at Mon Mar 20 22:10:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12015 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12015 found at Mon Mar 20 22:10:28 UTC 2023 selfserv_9887 with PID 12015 started at Mon Mar 20 22:10:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12015 at Mon Mar 20 22:10:29 UTC 2023 kill -USR1 12015 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12015 killed at Mon Mar 20 22:10:29 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12054 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12054 found at Mon Mar 20 22:10:30 UTC 2023 selfserv_9887 with PID 12054 started at Mon Mar 20 22:10:30 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12054 at Mon Mar 20 22:10:31 UTC 2023 kill -USR1 12054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12054 killed at Mon Mar 20 22:10:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12094 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12094 found at Mon Mar 20 22:10:31 UTC 2023 selfserv_9887 with PID 12094 started at Mon Mar 20 22:10:31 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12094 at Mon Mar 20 22:10:32 UTC 2023 kill -USR1 12094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12094 killed at Mon Mar 20 22:10:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12134 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12134 found at Mon Mar 20 22:10:32 UTC 2023 selfserv_9887 with PID 12134 started at Mon Mar 20 22:10:32 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12134 at Mon Mar 20 22:10:33 UTC 2023 kill -USR1 12134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12134 killed at Mon Mar 20 22:10:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12174 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12174 found at Mon Mar 20 22:10:33 UTC 2023 selfserv_9887 with PID 12174 started at Mon Mar 20 22:10:33 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12174 at Mon Mar 20 22:10:34 UTC 2023 kill -USR1 12174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12174 killed at Mon Mar 20 22:10:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12214 found at Mon Mar 20 22:10:34 UTC 2023 selfserv_9887 with PID 12214 started at Mon Mar 20 22:10:34 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12214 at Mon Mar 20 22:10:35 UTC 2023 kill -USR1 12214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12214 killed at Mon Mar 20 22:10:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12254 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12254 found at Mon Mar 20 22:10:36 UTC 2023 selfserv_9887 with PID 12254 started at Mon Mar 20 22:10:36 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12254 at Mon Mar 20 22:10:37 UTC 2023 kill -USR1 12254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12254 killed at Mon Mar 20 22:10:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12294 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12294 found at Mon Mar 20 22:10:37 UTC 2023 selfserv_9887 with PID 12294 started at Mon Mar 20 22:10:37 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12294 at Mon Mar 20 22:10:38 UTC 2023 kill -USR1 12294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12294 killed at Mon Mar 20 22:10:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12334 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12334 found at Mon Mar 20 22:10:38 UTC 2023 selfserv_9887 with PID 12334 started at Mon Mar 20 22:10:38 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12334 at Mon Mar 20 22:10:39 UTC 2023 kill -USR1 12334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12334 killed at Mon Mar 20 22:10:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:10:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:10:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12374 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12374 found at Mon Mar 20 22:10:39 UTC 2023 selfserv_9887 with PID 12374 started at Mon Mar 20 22:10:39 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12374 at Mon Mar 20 22:10:40 UTC 2023 kill -USR1 12374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12374 killed at Mon Mar 20 22:10:40 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -fips false -force FIPS mode disabled. ssl.sh: #1581: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1582: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1583: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1584: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1585: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1586: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 20 22:10:41 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 20 22:10:41 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 20 22:10:41 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 20 22:10:41 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.30514 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:13:47 2023 Not After : Mon Mar 20 21:13:47 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:19:a9:d0:10:60:aa:da:32:fb:8f:f4:66:9c:c8:f4: d6:ca:69:b9:4c:76:19:18:50:d2:70:a6:91:7d:c3:37: b1:9d:7a:e2:b1:12:2b:94:a2:0a:2a:d2:fe:f8:57:f8: 7c:c1:1c:25:e0:60:dd:96:5f:96:ca:30:0a:5d:5b:b1: dc:6e:30:d1:be:9e:5e:f8:4e:44:c8:4a:ca:0a:ae:3f: bd:24:33:22:37:14:82:20:0d:ae:2a:06:cc:59:bc:bd: 3a:f7:ee:fd:c7:87:c1:50:20:e1:a6:c1:d0:cf:c1:10: a4:fe:af:4b:a4:02:6b:89:33:aa:d9:f1:29:25:f8:86: e7:b9:90:b8:7b:b4:89:bb:4a:fa:cc:16:90:36:c2:da: 93:da:42:aa:02:8e:2d:0f:c4:8c:d4:3d:6d:c5:7d:73: 91:dd:91:28:e0:f2:20:31:31:86:03:5b:a7:1e:83:90: 36:1c:0d:04:a6:df:8f:3f:da:ed:45:e4:13:b7:09:63: 7f:7e:72:f8:82:4b:2d:13:4c:1e:f6:e7:2b:ed:09:1b: 52:36:44:a6:ce:68:1a:b0:83:13:d1:83:87:4e:40:1e: 60:b1:5c:82:75:56:f5:60:68:3a:4c:5c:cd:81:da:2a: 0e:25:0b:91:a7:0a:49:92:80:ef:1e:56:37:94:81:7f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:ef:74:e0:09:95:c8:05:29:5d:9d:aa:25:65:1f:9b: d4:36:4d:2a:66:ce:8d:e6:e9:68:61:42:13:c3:ce:68: e6:ed:f9:4b:15:33:a2:6e:b2:12:d9:8f:7c:f1:8b:6d: 27:7d:c2:40:58:90:44:18:ee:f3:6e:d5:a4:e3:c6:25: 3c:93:68:14:99:ed:da:7c:da:23:08:2f:3d:93:0d:9d: e4:cc:76:e3:61:ca:e5:6b:3d:5e:b3:ee:5b:76:ea:81: f3:94:69:17:c5:2d:3c:06:7f:66:66:a3:65:38:10:15: 7e:d5:6c:69:ff:9b:ad:03:97:eb:b9:04:d9:46:00:ee: 94:4e:87:dc:20:ab:6f:8d:ca:e0:63:8c:25:ea:76:f8: f6:22:17:2a:42:45:2a:99:35:44:ca:80:14:31:1e:5d: 1f:6e:7d:00:d0:95:4c:3b:11:d7:2f:49:1c:08:85:69: 91:2e:44:f3:74:56:f1:ad:ad:9e:37:bb:5b:28:8c:91: 94:32:10:2e:9d:41:46:09:fc:e6:c4:5a:3c:2a:a9:18: ca:62:1b:f7:58:39:d9:f5:92:0b:26:9c:00:ff:d5:38: 97:19:ee:53:03:bb:d3:1f:17:7e:84:8a:51:af:23:b0: 44:05:81:4c:f1:b2:ab:23:1b:e1:fd:fe:2f:75:5a:80 Fingerprint (SHA-256): AA:96:D2:F5:99:5A:43:4B:E2:83:56:F3:F2:11:43:CB:27:11:5C:6E:14:C0:BE:A3:E4:C4:12:78:75:D2:91:04 Fingerprint (SHA1): BF:88:EA:F6:E5:F7:C8:19:47:0A:1F:39:07:AA:61:43:31:76:29:BE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 20 21:13:53 2023 Not After : Mon Mar 20 21:13:53 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:78:5e:7d:17:ab:c0:91:60:5d:59:63:3d:3f:bb:74: a6:d8:d4:7b:f3:33:c0:75:3a:f5:d9:39:1d:08:2a:05: 54:28:17:e3:47:a6:e2:89:db:81:8e:66:1f:c2:71:d9: 70:68:b2:58:c8:3b:e6:a3:e6:fb:82:d1:a9:05:72:43: 41:6f:e9:03:c0:ab:f7:9d:60:e6:80:bd:6e:39:3d:0d: 53:bc:28:e1:12:b0:79:62:07:76:b9:35:fe:be:3d:90: b5:fc:99:45:af:b6:59:c8:9c:aa:7f:6d:53:7a:13:37: 6e:9c:27:81:78:37:29:87:3f:b4:c1:3c:eb:ff:ae:e3: 2f:7e:e2:1c:78:c5:1f:6d:47:0c:12:96:76:89:46:e9: 06:24:54:b7:e8:84:62:16:1e:62:51:c8:d5:34:a5:49: ab:0b:5a:63:1b:d1:1e:c0:32:f7:ee:e3:d1:f3:61:53: 53:18:78:4b:3e:2a:d0:be:dd:4f:f1:24:a5:c2:d7:2f: 10:2b:d1:2e:91:8d:48:30:3a:44:35:4a:95:5a:14:71: c4:3c:54:a5:f8:86:d8:af:94:20:42:e4:5a:6a:af:81: 55:13:f9:08:c0:c3:0f:d0:65:d7:bc:95:80:db:32:f8: 6a:5c:2b:72:f0:da:84:d4:24:16:c6:ae:a8:58:9b:41 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:2a:ad:91:d1:3e:da:7a:29:1b:c0:93:14:cd:52:a0: 86:39:82:71:56:9b:cd:64:df:ec:91:83:96:40:a6:8e: eb:5d:cc:f1:a5:33:81:aa:bb:5b:22:30:3a:21:19:af: 49:8f:d2:e9:cc:f9:a8:bf:b6:eb:2e:a0:8d:21:b5:b2: b4:41:c0:d1:33:40:e1:b0:91:ac:d9:8c:7e:a4:31:41: 93:ed:b5:c0:55:cc:ec:c7:7f:e3:e4:13:18:a1:9f:2b: bb:fd:f4:94:d9:4f:1d:3d:d8:1b:53:88:5a:42:90:fa: ed:6f:40:b4:75:f3:ca:61:11:57:ec:df:ef:3e:b5:5b: 62:81:68:24:72:03:4c:8f:be:1d:d6:04:3d:ad:ad:64: 3a:62:f7:8a:30:93:1a:13:a3:c6:c0:b0:de:4a:1b:90: c7:79:37:ae:f3:2c:5a:ed:14:0f:f4:cc:bf:9a:e1:30: 77:15:10:81:ca:96:05:78:54:7b:ac:a3:a6:e4:46:84: f4:4a:e7:91:40:68:06:8f:93:f4:5a:7f:3e:03:34:46: b2:e6:ff:d6:68:00:d8:07:80:44:26:dd:18:24:59:12: ef:4d:12:14:67:fc:88:ea:cd:5e:b7:64:fb:bd:18:6d: fa:92:ab:cc:41:d9:c4:7d:62:11:52:24:53:26:2b:10 Fingerprint (SHA-256): B0:B4:02:8E:2F:64:69:06:11:4A:1A:6A:AF:0D:8E:A8:6C:67:A9:D1:F9:F8:F7:F3:DF:7B:C5:C7:0C:8B:80:57 Fingerprint (SHA1): 80:13:1C:E2:08:90:44:35:36:D9:05:B4:4A:EE:8C:79:29:55:BA:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA ,, chain-1-clientCA-ec ,, clientCA-ec T,C,C clientCA T,C,C chain-1-clientCA-dsa ,, chain-1-clientCA ,, clientCA-dsa T,C,C chain-2-clientCA-dsa ,, chain-2-clientCA-ec ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.30514 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v1.30514 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 20 21:14:42 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 21:10:18 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 20 21:14:36 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=SHARED_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Mon Mar 20 22:10:56 UTC 2023 Running tests for pkits TIMESTAMP pkits BEGIN: Mon Mar 20 22:10:56 UTC 2023 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Mar 20 22:10:56 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 20 22:10:56 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221057 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9897/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9898 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20230320221129Z nextupdate=20240320221129Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Mar 20 22:11:29 2023 Next Update: Wed Mar 20 22:11:29 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20230320221130Z addcert 2 20230320221130Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Mar 20 22:11:30 2023 Next Update: Wed Mar 20 22:11:29 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:30 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320221130Z nextupdate=20240320221130Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 22:11:30 2023 Next Update: Wed Mar 20 22:11:30 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320221131Z addcert 2 20230320221131Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 22:11:31 2023 Next Update: Wed Mar 20 22:11:30 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:31 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20230320221132Z addcert 4 20230320221132Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Mar 20 22:11:32 2023 Next Update: Wed Mar 20 22:11:30 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:31 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Mon Mar 20 22:11:32 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320221133Z nextupdate=20240320221133Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 22:11:33 2023 Next Update: Wed Mar 20 22:11:33 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320221134Z addcert 2 20230320221134Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 22:11:34 2023 Next Update: Wed Mar 20 22:11:33 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:34 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20230320221135Z addcert 3 20230320221135Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Mar 20 22:11:35 2023 Next Update: Wed Mar 20 22:11:33 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:34 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Mar 20 22:11:35 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320221135Z nextupdate=20240320221135Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 22:11:35 2023 Next Update: Wed Mar 20 22:11:35 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320221136Z addcert 2 20230320221136Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 22:11:36 2023 Next Update: Wed Mar 20 22:11:35 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:36 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20230320221137Z addcert 3 20230320221137Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Mar 20 22:11:37 2023 Next Update: Wed Mar 20 22:11:35 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Mar 20 22:11:36 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Mar 20 22:11:37 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221058 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221059 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 320221060 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 320221061 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 320221062 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 320221063 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 320221064 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 320221065 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 320221066 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 320221067 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 320221068 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 320221069 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 320221070 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 320221071 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 320221072 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 320221073 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Mon Mar 20 22:12:22 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 22:12:22 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 15083 >/dev/null 2>/dev/null httpserv with PID 15083 found at Mon Mar 20 22:12:22 UTC 2023 httpserv with PID 15083 started at Mon Mar 20 22:12:22 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221058 (0x13162f82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:11:51 2023 Not After : Mon Mar 20 22:11:51 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4b:6d:5e:3c:14:f8:c3:9a:e0:a4:d0:41:9f:0e:63: 87:85:a1:4e:eb:ac:ff:b3:eb:79:be:18:15:53:db:87: ab:36:8f:bd:4e:8d:eb:a1:a8:e2:03:d7:8a:f4:8c:41: d7:1a:af:6f:8c:c1:60:12:72:c8:7a:6d:41:81:af:22: 10:a9:5e:cd:27:b4:f4:fc:e7:d8:3d:4b:1d:8d:e9:14: 95:08:3e:93:35:44:ec:83:c5:57:0c:75:0e:94:b8:4f: e6:22:ac:c5:77:5f:9b:09:b4:11:c4:91:d9:de:f5:d7: 60:43:74:87:c4:2e:80:40:09:45:7b:1b:1f:d6:ce:fd: 20:b5:b4:1b:51:83:2d:90:d7:a5:d5:89:60:c6:58:3a: 40:2e:71:21:df:f0:df:fe:ce:6d:48:ae:20:10:60:4c: ca:6b:5b:19:05:64:3a:48:99:96:18:4f:7e:26:41:27: 1a:2d:6b:63:a5:64:fe:db:bb:20:e6:98:92:bd:e2:25: 14:a0:e5:85:07:f6:c0:c7:5d:94:11:3c:72:e5:6c:1c: 8d:60:0f:6f:bf:8b:ee:a3:cc:78:cc:cb:a8:15:6d:4a: 0a:c3:9a:7a:55:7f:be:53:cb:55:67:30:fe:66:3e:b9: e2:3d:c4:4b:bb:b9:8e:2e:18:78:42:74:1a:69:73:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:da:77:04:50:25:00:b3:1d:09:bf:e0:94:1a:35:ed: d4:45:cc:1c:e2:9c:ac:27:be:bd:e5:c1:6c:f5:bd:ef: de:43:e1:e3:15:dc:ee:84:76:4c:7c:2d:ae:92:1f:42: a7:1a:ba:12:47:d9:eb:0c:cf:63:bd:4c:54:a6:2c:05: 53:8f:e1:43:8f:62:9d:68:c5:ed:e5:76:1b:8d:bb:4d: dc:78:6b:fa:9e:38:f2:33:72:38:2a:3c:cc:0d:db:a6: af:14:ba:51:66:a5:23:ad:bd:ec:7a:86:f2:82:72:00: 26:c0:2d:d4:cb:a1:da:d3:94:81:59:1f:dc:cb:8b:1e: aa:e3:06:e0:52:87:44:48:0e:92:e2:fa:b1:a2:a1:d3: 48:58:4b:f9:12:a8:c9:3f:6d:07:6d:42:a1:b6:c4:3c: 75:16:a2:e7:4f:ea:d4:7c:32:cb:80:86:3f:32:5b:5f: 43:c4:5f:d2:ca:6e:b4:52:55:9c:1c:41:8c:3a:c6:ea: 5d:ea:4a:85:9e:04:ec:4d:fc:f1:ec:70:24:45:85:dc: 85:76:16:ca:83:65:a9:aa:06:8c:80:af:2d:bb:fa:b1: 2a:14:ad:4d:40:1e:e4:05:7d:cb:a6:4d:f9:58:eb:a7: 1b:5f:bd:f7:45:c3:67:bc:42:f7:0a:e2:23:11:43:92 Fingerprint (SHA-256): 18:02:A8:44:83:BB:86:81:61:3C:13:1F:0B:BB:1D:7B:B8:4E:E0:B6:BB:68:90:35:7E:D7:07:B2:BD:B2:51:60 Fingerprint (SHA1): D4:68:3E:C9:58:FA:21:30:2B:8C:BD:5B:18:BE:BD:15:A9:DA:D0:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9897 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221057 (0x13162f81) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Mar 20 22:10:57 2023 Not After : Mon Mar 20 22:10:57 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:8d:0f:28:1f:d6:69:d9:c5:c0:36:02:02:8d:b5:87: 6e:90:f8:9d:43:8c:c9:bb:0a:46:6a:fc:81:19:0f:25: c0:1b:5c:ed:83:d2:6f:dd:d8:1f:4d:43:b4:a8:c5:cf: 21:5b:85:c4:a0:a9:9c:0b:44:44:28:d5:cb:7e:91:18: bb:15:e0:86:41:60:de:45:a5:32:a6:ed:00:59:32:a5: e1:bc:44:74:71:11:6b:94:c8:1d:07:59:18:2a:dd:23: 2e:dc:86:cd:1b:be:db:c8:42:b2:8b:8b:1e:7a:51:cf: b4:6e:11:05:f9:d5:b0:12:31:14:1b:e5:3e:f7:a8:39: 98:f4:fd:99:2d:35:95:23:80:02:33:90:f7:b0:56:d7: 7b:48:23:46:38:81:ed:9e:46:fa:5e:47:c7:e1:1b:61: 87:a7:2c:7f:f5:ee:fa:0e:e3:c4:7d:a2:2f:44:3d:49: 6f:16:49:d4:80:f3:af:20:4d:c7:b3:3e:e4:57:d2:42: 4b:e6:c4:3a:74:f5:ba:0e:d3:90:85:a3:b9:d8:51:ef: 5e:00:87:b8:1f:f7:36:dc:ae:df:03:64:9c:f4:9d:dd: e2:54:ef:ad:ff:24:8a:65:65:dd:25:93:1c:11:9c:3f: 91:2a:e1:64:72:b7:99:62:31:af:54:c7:de:2c:7d:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:87:64:53:17:83:87:50:94:11:60:dd:f2:5b:a8:b5: 07:93:20:17:05:c0:97:a7:e8:5b:18:8e:5e:de:6e:2e: 16:e0:ed:27:52:5c:db:ad:cd:ce:04:b6:d9:42:55:94: 71:e9:80:ec:ea:79:05:c0:8b:36:72:7c:f8:66:6b:b7: 02:68:39:68:3c:f7:54:2d:17:e3:b5:17:53:d5:f5:b4: 67:8f:31:00:96:ac:f5:89:fe:66:ad:00:8a:0a:d2:e3: 7b:a0:66:44:b2:94:11:0e:ad:e0:dd:e7:39:a8:98:9e: 00:88:ea:3b:df:5b:d3:b5:34:39:37:3b:09:ac:bd:3c: d8:ba:79:67:28:be:60:c1:40:03:6d:e4:a5:02:10:34: a7:d6:0b:c5:b1:25:26:f4:2d:b0:c5:dc:9b:a9:2e:0d: cc:14:45:7f:cd:8c:42:69:a8:12:90:9f:dc:10:62:10: dc:ea:6a:60:dc:2a:80:f6:0a:ce:86:a6:de:d1:39:9e: f8:55:26:f6:20:6f:5d:b7:d1:94:64:98:66:4f:08:4e: 7a:64:c8:7a:0a:dd:b8:32:dc:5f:af:14:54:ff:4a:a5: a8:b6:98:7f:2c:c8:7f:e6:ef:56:fb:ae:35:19:fa:59: 47:68:78:b5:8e:0a:46:af:f2:a1:a8:98:ba:5b:df:f3 Fingerprint (SHA-256): 9E:E8:FE:A2:E2:5B:2B:8C:1C:14:15:16:5E:79:A6:01:49:F0:86:C0:5C:E5:AB:83:1B:9C:9E:C6:FD:85:4B:32 Fingerprint (SHA1): 9A:7C:79:58:50:C7:7F:96:A5:CC:1B:F1:21:A4:4C:D6:23:9D:DD:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 15083 at Mon Mar 20 22:12:24 UTC 2023 kill -USR1 15083 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 15083 killed at Mon Mar 20 22:12:24 UTC 2023 httpserv starting at Mon Mar 20 22:12:24 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 22:12:24 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 15284 >/dev/null 2>/dev/null httpserv with PID 15284 found at Mon Mar 20 22:12:24 UTC 2023 httpserv with PID 15284 started at Mon Mar 20 22:12:24 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9897 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221057 (0x13162f81) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Mar 20 22:10:57 2023 Not After : Mon Mar 20 22:10:57 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:8d:0f:28:1f:d6:69:d9:c5:c0:36:02:02:8d:b5:87: 6e:90:f8:9d:43:8c:c9:bb:0a:46:6a:fc:81:19:0f:25: c0:1b:5c:ed:83:d2:6f:dd:d8:1f:4d:43:b4:a8:c5:cf: 21:5b:85:c4:a0:a9:9c:0b:44:44:28:d5:cb:7e:91:18: bb:15:e0:86:41:60:de:45:a5:32:a6:ed:00:59:32:a5: e1:bc:44:74:71:11:6b:94:c8:1d:07:59:18:2a:dd:23: 2e:dc:86:cd:1b:be:db:c8:42:b2:8b:8b:1e:7a:51:cf: b4:6e:11:05:f9:d5:b0:12:31:14:1b:e5:3e:f7:a8:39: 98:f4:fd:99:2d:35:95:23:80:02:33:90:f7:b0:56:d7: 7b:48:23:46:38:81:ed:9e:46:fa:5e:47:c7:e1:1b:61: 87:a7:2c:7f:f5:ee:fa:0e:e3:c4:7d:a2:2f:44:3d:49: 6f:16:49:d4:80:f3:af:20:4d:c7:b3:3e:e4:57:d2:42: 4b:e6:c4:3a:74:f5:ba:0e:d3:90:85:a3:b9:d8:51:ef: 5e:00:87:b8:1f:f7:36:dc:ae:df:03:64:9c:f4:9d:dd: e2:54:ef:ad:ff:24:8a:65:65:dd:25:93:1c:11:9c:3f: 91:2a:e1:64:72:b7:99:62:31:af:54:c7:de:2c:7d:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:87:64:53:17:83:87:50:94:11:60:dd:f2:5b:a8:b5: 07:93:20:17:05:c0:97:a7:e8:5b:18:8e:5e:de:6e:2e: 16:e0:ed:27:52:5c:db:ad:cd:ce:04:b6:d9:42:55:94: 71:e9:80:ec:ea:79:05:c0:8b:36:72:7c:f8:66:6b:b7: 02:68:39:68:3c:f7:54:2d:17:e3:b5:17:53:d5:f5:b4: 67:8f:31:00:96:ac:f5:89:fe:66:ad:00:8a:0a:d2:e3: 7b:a0:66:44:b2:94:11:0e:ad:e0:dd:e7:39:a8:98:9e: 00:88:ea:3b:df:5b:d3:b5:34:39:37:3b:09:ac:bd:3c: d8:ba:79:67:28:be:60:c1:40:03:6d:e4:a5:02:10:34: a7:d6:0b:c5:b1:25:26:f4:2d:b0:c5:dc:9b:a9:2e:0d: cc:14:45:7f:cd:8c:42:69:a8:12:90:9f:dc:10:62:10: dc:ea:6a:60:dc:2a:80:f6:0a:ce:86:a6:de:d1:39:9e: f8:55:26:f6:20:6f:5d:b7:d1:94:64:98:66:4f:08:4e: 7a:64:c8:7a:0a:dd:b8:32:dc:5f:af:14:54:ff:4a:a5: a8:b6:98:7f:2c:c8:7f:e6:ef:56:fb:ae:35:19:fa:59: 47:68:78:b5:8e:0a:46:af:f2:a1:a8:98:ba:5b:df:f3 Fingerprint (SHA-256): 9E:E8:FE:A2:E2:5B:2B:8C:1C:14:15:16:5E:79:A6:01:49:F0:86:C0:5C:E5:AB:83:1B:9C:9E:C6:FD:85:4B:32 Fingerprint (SHA1): 9A:7C:79:58:50:C7:7F:96:A5:CC:1B:F1:21:A4:4C:D6:23:9D:DD:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 15284 at Mon Mar 20 22:12:26 UTC 2023 kill -USR1 15284 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 15284 killed at Mon Mar 20 22:12:26 UTC 2023 httpserv starting at Mon Mar 20 22:12:26 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 22:12:26 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 15504 >/dev/null 2>/dev/null httpserv with PID 15504 found at Mon Mar 20 22:12:26 UTC 2023 httpserv with PID 15504 started at Mon Mar 20 22:12:26 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221074 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221075 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320221076 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320221077 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 320221078 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221075 (0x13162f93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:12:30 2023 Not After : Mon Mar 20 22:12:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:c2:5a:d5:ea:74:30:e2:1a:9e:1a:fa:42:a0:ad:2c: 7d:cf:64:f8:25:fa:f2:be:08:f5:83:74:14:c1:36:d2: a3:7e:08:22:9c:fb:b5:29:fc:e6:8e:08:f9:2f:02:39: 7e:dc:b1:c6:9e:eb:31:3a:5e:a2:d4:ca:49:b5:7a:b8: 8b:15:c7:61:ca:4e:a8:e2:b9:d1:6d:7d:57:fe:4c:57: 6b:5a:67:b4:35:49:35:f9:a4:b4:4f:7b:b9:e2:50:53: 59:cb:98:2f:1e:5f:32:da:aa:b0:df:61:38:42:16:84: f4:0c:3f:5a:19:bc:00:6d:2f:2a:d8:13:30:6c:ad:de: c4:36:69:c1:40:10:66:ec:a3:1f:9c:7d:d6:89:54:c2: 94:00:74:e4:70:1b:ef:89:16:ed:2f:f1:ed:18:21:96: 00:7e:31:32:38:4f:c4:54:9b:2c:99:b2:13:e8:8c:a0: 21:c8:dd:43:0d:a2:ce:92:18:13:63:0e:95:52:7e:f0: d8:6f:6c:6f:d6:cf:d1:e0:74:96:cd:6a:36:cf:d0:90: 7c:6e:00:a2:fe:0e:93:7b:1a:af:4d:df:78:6e:67:a9: 84:66:ec:ce:2b:a6:fc:b0:18:24:b9:1e:73:89:11:2a: 82:e9:ac:f3:ea:82:48:b1:ac:28:51:56:8b:5e:6e:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:2e:0a:c7:b4:15:b7:be:fe:37:f8:57:2e:9f:d7:51: a4:0b:62:4f:e8:0f:f4:08:eb:9a:44:93:d3:71:0b:63: ca:b3:25:3f:0d:4a:40:68:09:6e:05:dc:2c:e2:85:08: d3:0e:a1:b8:d0:91:c8:d5:13:0c:1e:84:67:40:be:bc: b2:ac:51:1f:31:fd:bb:f7:71:fa:b6:75:90:ed:c9:50: 63:db:4a:7a:6b:eb:67:32:a0:9d:7f:14:43:e9:39:6f: 91:c0:c6:a3:c7:7d:16:40:26:7c:71:63:cd:23:46:69: 7c:53:97:bc:ab:9b:c6:56:72:66:66:1b:75:bd:ab:60: c7:30:cf:5f:f9:af:1a:5d:c2:59:5c:e7:80:a3:ac:77: 6c:b4:a3:07:1b:41:09:52:4a:eb:a9:31:06:f4:ec:03: a7:9f:36:2c:9c:e4:ae:52:c7:42:f0:17:25:5c:5b:20: dd:55:1a:b4:d8:67:bf:d2:ad:28:50:7a:53:aa:b5:bc: 93:f2:55:5a:3e:95:73:bc:04:52:b4:02:b0:3d:d2:49: 82:ba:c7:6e:0b:e6:4a:dc:9e:99:dc:aa:20:39:44:a6: 0f:ad:23:3f:1b:b3:03:7c:ed:e6:5a:0a:67:d4:af:13: cf:6b:27:8b:e1:8b:0d:1a:5d:06:83:0b:58:1b:d6:83 Fingerprint (SHA-256): 12:37:87:8E:60:50:45:8D:0C:1B:98:DA:EB:08:32:56:D1:EE:F0:F8:EC:36:59:E7:16:A5:4E:4D:D4:3B:AD:C9 Fingerprint (SHA1): 79:97:AE:36:8F:63:30:80:99:98:DA:FB:94:95:4D:C1:3A:BB:33:8F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221074 (0x13162f92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:12:28 2023 Not After : Mon Mar 20 22:12:28 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:b4:d6:f5:0c:b4:b3:06:85:8b:cd:51:9c:52:40:34: 7e:ea:8a:4f:ec:ec:18:9f:c6:5c:02:d8:ad:36:ab:42: e2:50:fe:2e:c7:97:03:f8:d5:22:a6:1f:fc:90:6a:7b: 35:f3:0e:f9:87:00:0e:24:1a:a2:b1:8c:91:a5:23:1b: 2a:6a:c9:9b:f3:21:86:82:e5:3e:f4:10:c7:dc:9d:2a: dc:67:4d:79:3c:52:4f:0b:71:51:7d:5b:a5:3e:a8:0b: da:87:8f:a2:57:0e:67:41:83:ba:10:eb:03:5a:9f:f2: 77:26:d2:e1:27:ad:a1:48:34:85:cb:55:5a:8e:db:44: 46:26:e8:f6:87:51:41:05:29:39:55:ca:d2:5b:88:32: e6:72:08:94:ed:00:44:6d:d8:36:8c:a3:09:65:e8:43: 0a:bd:a0:84:b6:11:85:ed:07:b4:35:7c:49:91:d7:c2: 08:ad:33:3c:9f:6b:2a:e0:24:83:62:c7:16:6b:f0:dc: c3:a4:b1:20:b4:6d:a0:49:2d:1b:e7:f8:99:78:f4:50: 8b:e9:a4:50:fa:df:43:30:9e:e4:0b:e2:fb:51:d4:85: db:01:e2:54:38:b2:7f:a9:c7:77:6f:07:41:83:a0:9c: ee:2c:4d:5a:72:d5:6e:c6:46:92:7d:d6:6b:fd:aa:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:69:a1:a1:c6:5b:3f:bd:84:89:d4:d3:91:93:bf:a7: 3e:5a:84:1d:3a:f7:df:4e:ac:a4:5e:69:35:5d:ad:15: 53:74:c1:93:4f:81:6b:b5:28:4d:e7:03:fb:ef:9a:de: e8:7c:16:49:ed:c7:af:be:97:f8:b5:43:27:ac:60:a9: cd:78:48:30:27:f0:4a:f8:01:a8:6b:3b:99:09:26:56: 16:7e:46:28:49:fe:45:33:6e:72:28:c2:7c:24:30:b3: fc:05:3d:6f:9e:bc:e8:b2:85:ba:e1:72:57:bb:7e:46: 3d:25:a9:92:53:24:ab:04:e1:57:87:01:ec:76:4f:76: f5:cc:2e:2c:ff:e6:f9:81:f0:b7:6f:c1:08:60:0e:24: c7:b2:c3:5c:5a:f3:be:53:8d:98:81:d6:c9:6b:f5:ff: 6f:87:6e:32:49:1b:f5:b3:3e:1a:79:a1:f8:cd:55:94: 25:36:19:e1:03:4f:90:70:6e:79:f5:e6:34:86:79:b4: 5b:91:7b:a0:94:1a:ff:37:72:52:5d:da:b6:06:09:a2: c8:4b:ac:dd:97:b8:84:c8:c6:23:15:bd:16:4e:28:e5: c8:78:a6:a4:69:63:ce:6b:5c:38:0b:78:92:22:b9:50: 44:6b:2a:fe:33:b4:98:d4:d9:61:7b:3a:fc:39:f8:90 Fingerprint (SHA-256): 27:A7:B1:11:1C:6B:BF:52:3F:16:C2:5A:89:9F:A4:9E:29:AC:7F:11:0A:3D:A4:47:7B:40:8A:37:30:E3:E1:C1 Fingerprint (SHA1): CA:42:4E:44:60:9D:17:5E:62:A7:27:31:B1:2F:C7:54:EC:40:CC:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221074 (0x13162f92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:12:28 2023 Not After : Mon Mar 20 22:12:28 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:b4:d6:f5:0c:b4:b3:06:85:8b:cd:51:9c:52:40:34: 7e:ea:8a:4f:ec:ec:18:9f:c6:5c:02:d8:ad:36:ab:42: e2:50:fe:2e:c7:97:03:f8:d5:22:a6:1f:fc:90:6a:7b: 35:f3:0e:f9:87:00:0e:24:1a:a2:b1:8c:91:a5:23:1b: 2a:6a:c9:9b:f3:21:86:82:e5:3e:f4:10:c7:dc:9d:2a: dc:67:4d:79:3c:52:4f:0b:71:51:7d:5b:a5:3e:a8:0b: da:87:8f:a2:57:0e:67:41:83:ba:10:eb:03:5a:9f:f2: 77:26:d2:e1:27:ad:a1:48:34:85:cb:55:5a:8e:db:44: 46:26:e8:f6:87:51:41:05:29:39:55:ca:d2:5b:88:32: e6:72:08:94:ed:00:44:6d:d8:36:8c:a3:09:65:e8:43: 0a:bd:a0:84:b6:11:85:ed:07:b4:35:7c:49:91:d7:c2: 08:ad:33:3c:9f:6b:2a:e0:24:83:62:c7:16:6b:f0:dc: c3:a4:b1:20:b4:6d:a0:49:2d:1b:e7:f8:99:78:f4:50: 8b:e9:a4:50:fa:df:43:30:9e:e4:0b:e2:fb:51:d4:85: db:01:e2:54:38:b2:7f:a9:c7:77:6f:07:41:83:a0:9c: ee:2c:4d:5a:72:d5:6e:c6:46:92:7d:d6:6b:fd:aa:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:69:a1:a1:c6:5b:3f:bd:84:89:d4:d3:91:93:bf:a7: 3e:5a:84:1d:3a:f7:df:4e:ac:a4:5e:69:35:5d:ad:15: 53:74:c1:93:4f:81:6b:b5:28:4d:e7:03:fb:ef:9a:de: e8:7c:16:49:ed:c7:af:be:97:f8:b5:43:27:ac:60:a9: cd:78:48:30:27:f0:4a:f8:01:a8:6b:3b:99:09:26:56: 16:7e:46:28:49:fe:45:33:6e:72:28:c2:7c:24:30:b3: fc:05:3d:6f:9e:bc:e8:b2:85:ba:e1:72:57:bb:7e:46: 3d:25:a9:92:53:24:ab:04:e1:57:87:01:ec:76:4f:76: f5:cc:2e:2c:ff:e6:f9:81:f0:b7:6f:c1:08:60:0e:24: c7:b2:c3:5c:5a:f3:be:53:8d:98:81:d6:c9:6b:f5:ff: 6f:87:6e:32:49:1b:f5:b3:3e:1a:79:a1:f8:cd:55:94: 25:36:19:e1:03:4f:90:70:6e:79:f5:e6:34:86:79:b4: 5b:91:7b:a0:94:1a:ff:37:72:52:5d:da:b6:06:09:a2: c8:4b:ac:dd:97:b8:84:c8:c6:23:15:bd:16:4e:28:e5: c8:78:a6:a4:69:63:ce:6b:5c:38:0b:78:92:22:b9:50: 44:6b:2a:fe:33:b4:98:d4:d9:61:7b:3a:fc:39:f8:90 Fingerprint (SHA-256): 27:A7:B1:11:1C:6B:BF:52:3F:16:C2:5A:89:9F:A4:9E:29:AC:7F:11:0A:3D:A4:47:7B:40:8A:37:30:E3:E1:C1 Fingerprint (SHA1): CA:42:4E:44:60:9D:17:5E:62:A7:27:31:B1:2F:C7:54:EC:40:CC:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221075 (0x13162f93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:12:30 2023 Not After : Mon Mar 20 22:12:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:c2:5a:d5:ea:74:30:e2:1a:9e:1a:fa:42:a0:ad:2c: 7d:cf:64:f8:25:fa:f2:be:08:f5:83:74:14:c1:36:d2: a3:7e:08:22:9c:fb:b5:29:fc:e6:8e:08:f9:2f:02:39: 7e:dc:b1:c6:9e:eb:31:3a:5e:a2:d4:ca:49:b5:7a:b8: 8b:15:c7:61:ca:4e:a8:e2:b9:d1:6d:7d:57:fe:4c:57: 6b:5a:67:b4:35:49:35:f9:a4:b4:4f:7b:b9:e2:50:53: 59:cb:98:2f:1e:5f:32:da:aa:b0:df:61:38:42:16:84: f4:0c:3f:5a:19:bc:00:6d:2f:2a:d8:13:30:6c:ad:de: c4:36:69:c1:40:10:66:ec:a3:1f:9c:7d:d6:89:54:c2: 94:00:74:e4:70:1b:ef:89:16:ed:2f:f1:ed:18:21:96: 00:7e:31:32:38:4f:c4:54:9b:2c:99:b2:13:e8:8c:a0: 21:c8:dd:43:0d:a2:ce:92:18:13:63:0e:95:52:7e:f0: d8:6f:6c:6f:d6:cf:d1:e0:74:96:cd:6a:36:cf:d0:90: 7c:6e:00:a2:fe:0e:93:7b:1a:af:4d:df:78:6e:67:a9: 84:66:ec:ce:2b:a6:fc:b0:18:24:b9:1e:73:89:11:2a: 82:e9:ac:f3:ea:82:48:b1:ac:28:51:56:8b:5e:6e:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:2e:0a:c7:b4:15:b7:be:fe:37:f8:57:2e:9f:d7:51: a4:0b:62:4f:e8:0f:f4:08:eb:9a:44:93:d3:71:0b:63: ca:b3:25:3f:0d:4a:40:68:09:6e:05:dc:2c:e2:85:08: d3:0e:a1:b8:d0:91:c8:d5:13:0c:1e:84:67:40:be:bc: b2:ac:51:1f:31:fd:bb:f7:71:fa:b6:75:90:ed:c9:50: 63:db:4a:7a:6b:eb:67:32:a0:9d:7f:14:43:e9:39:6f: 91:c0:c6:a3:c7:7d:16:40:26:7c:71:63:cd:23:46:69: 7c:53:97:bc:ab:9b:c6:56:72:66:66:1b:75:bd:ab:60: c7:30:cf:5f:f9:af:1a:5d:c2:59:5c:e7:80:a3:ac:77: 6c:b4:a3:07:1b:41:09:52:4a:eb:a9:31:06:f4:ec:03: a7:9f:36:2c:9c:e4:ae:52:c7:42:f0:17:25:5c:5b:20: dd:55:1a:b4:d8:67:bf:d2:ad:28:50:7a:53:aa:b5:bc: 93:f2:55:5a:3e:95:73:bc:04:52:b4:02:b0:3d:d2:49: 82:ba:c7:6e:0b:e6:4a:dc:9e:99:dc:aa:20:39:44:a6: 0f:ad:23:3f:1b:b3:03:7c:ed:e6:5a:0a:67:d4:af:13: cf:6b:27:8b:e1:8b:0d:1a:5d:06:83:0b:58:1b:d6:83 Fingerprint (SHA-256): 12:37:87:8E:60:50:45:8D:0C:1B:98:DA:EB:08:32:56:D1:EE:F0:F8:EC:36:59:E7:16:A5:4E:4D:D4:3B:AD:C9 Fingerprint (SHA1): 79:97:AE:36:8F:63:30:80:99:98:DA:FB:94:95:4D:C1:3A:BB:33:8F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221075 (0x13162f93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:12:30 2023 Not After : Mon Mar 20 22:12:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:c2:5a:d5:ea:74:30:e2:1a:9e:1a:fa:42:a0:ad:2c: 7d:cf:64:f8:25:fa:f2:be:08:f5:83:74:14:c1:36:d2: a3:7e:08:22:9c:fb:b5:29:fc:e6:8e:08:f9:2f:02:39: 7e:dc:b1:c6:9e:eb:31:3a:5e:a2:d4:ca:49:b5:7a:b8: 8b:15:c7:61:ca:4e:a8:e2:b9:d1:6d:7d:57:fe:4c:57: 6b:5a:67:b4:35:49:35:f9:a4:b4:4f:7b:b9:e2:50:53: 59:cb:98:2f:1e:5f:32:da:aa:b0:df:61:38:42:16:84: f4:0c:3f:5a:19:bc:00:6d:2f:2a:d8:13:30:6c:ad:de: c4:36:69:c1:40:10:66:ec:a3:1f:9c:7d:d6:89:54:c2: 94:00:74:e4:70:1b:ef:89:16:ed:2f:f1:ed:18:21:96: 00:7e:31:32:38:4f:c4:54:9b:2c:99:b2:13:e8:8c:a0: 21:c8:dd:43:0d:a2:ce:92:18:13:63:0e:95:52:7e:f0: d8:6f:6c:6f:d6:cf:d1:e0:74:96:cd:6a:36:cf:d0:90: 7c:6e:00:a2:fe:0e:93:7b:1a:af:4d:df:78:6e:67:a9: 84:66:ec:ce:2b:a6:fc:b0:18:24:b9:1e:73:89:11:2a: 82:e9:ac:f3:ea:82:48:b1:ac:28:51:56:8b:5e:6e:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:2e:0a:c7:b4:15:b7:be:fe:37:f8:57:2e:9f:d7:51: a4:0b:62:4f:e8:0f:f4:08:eb:9a:44:93:d3:71:0b:63: ca:b3:25:3f:0d:4a:40:68:09:6e:05:dc:2c:e2:85:08: d3:0e:a1:b8:d0:91:c8:d5:13:0c:1e:84:67:40:be:bc: b2:ac:51:1f:31:fd:bb:f7:71:fa:b6:75:90:ed:c9:50: 63:db:4a:7a:6b:eb:67:32:a0:9d:7f:14:43:e9:39:6f: 91:c0:c6:a3:c7:7d:16:40:26:7c:71:63:cd:23:46:69: 7c:53:97:bc:ab:9b:c6:56:72:66:66:1b:75:bd:ab:60: c7:30:cf:5f:f9:af:1a:5d:c2:59:5c:e7:80:a3:ac:77: 6c:b4:a3:07:1b:41:09:52:4a:eb:a9:31:06:f4:ec:03: a7:9f:36:2c:9c:e4:ae:52:c7:42:f0:17:25:5c:5b:20: dd:55:1a:b4:d8:67:bf:d2:ad:28:50:7a:53:aa:b5:bc: 93:f2:55:5a:3e:95:73:bc:04:52:b4:02:b0:3d:d2:49: 82:ba:c7:6e:0b:e6:4a:dc:9e:99:dc:aa:20:39:44:a6: 0f:ad:23:3f:1b:b3:03:7c:ed:e6:5a:0a:67:d4:af:13: cf:6b:27:8b:e1:8b:0d:1a:5d:06:83:0b:58:1b:d6:83 Fingerprint (SHA-256): 12:37:87:8E:60:50:45:8D:0C:1B:98:DA:EB:08:32:56:D1:EE:F0:F8:EC:36:59:E7:16:A5:4E:4D:D4:3B:AD:C9 Fingerprint (SHA1): 79:97:AE:36:8F:63:30:80:99:98:DA:FB:94:95:4D:C1:3A:BB:33:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221075 (0x13162f93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:12:30 2023 Not After : Mon Mar 20 22:12:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:c2:5a:d5:ea:74:30:e2:1a:9e:1a:fa:42:a0:ad:2c: 7d:cf:64:f8:25:fa:f2:be:08:f5:83:74:14:c1:36:d2: a3:7e:08:22:9c:fb:b5:29:fc:e6:8e:08:f9:2f:02:39: 7e:dc:b1:c6:9e:eb:31:3a:5e:a2:d4:ca:49:b5:7a:b8: 8b:15:c7:61:ca:4e:a8:e2:b9:d1:6d:7d:57:fe:4c:57: 6b:5a:67:b4:35:49:35:f9:a4:b4:4f:7b:b9:e2:50:53: 59:cb:98:2f:1e:5f:32:da:aa:b0:df:61:38:42:16:84: f4:0c:3f:5a:19:bc:00:6d:2f:2a:d8:13:30:6c:ad:de: c4:36:69:c1:40:10:66:ec:a3:1f:9c:7d:d6:89:54:c2: 94:00:74:e4:70:1b:ef:89:16:ed:2f:f1:ed:18:21:96: 00:7e:31:32:38:4f:c4:54:9b:2c:99:b2:13:e8:8c:a0: 21:c8:dd:43:0d:a2:ce:92:18:13:63:0e:95:52:7e:f0: d8:6f:6c:6f:d6:cf:d1:e0:74:96:cd:6a:36:cf:d0:90: 7c:6e:00:a2:fe:0e:93:7b:1a:af:4d:df:78:6e:67:a9: 84:66:ec:ce:2b:a6:fc:b0:18:24:b9:1e:73:89:11:2a: 82:e9:ac:f3:ea:82:48:b1:ac:28:51:56:8b:5e:6e:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:2e:0a:c7:b4:15:b7:be:fe:37:f8:57:2e:9f:d7:51: a4:0b:62:4f:e8:0f:f4:08:eb:9a:44:93:d3:71:0b:63: ca:b3:25:3f:0d:4a:40:68:09:6e:05:dc:2c:e2:85:08: d3:0e:a1:b8:d0:91:c8:d5:13:0c:1e:84:67:40:be:bc: b2:ac:51:1f:31:fd:bb:f7:71:fa:b6:75:90:ed:c9:50: 63:db:4a:7a:6b:eb:67:32:a0:9d:7f:14:43:e9:39:6f: 91:c0:c6:a3:c7:7d:16:40:26:7c:71:63:cd:23:46:69: 7c:53:97:bc:ab:9b:c6:56:72:66:66:1b:75:bd:ab:60: c7:30:cf:5f:f9:af:1a:5d:c2:59:5c:e7:80:a3:ac:77: 6c:b4:a3:07:1b:41:09:52:4a:eb:a9:31:06:f4:ec:03: a7:9f:36:2c:9c:e4:ae:52:c7:42:f0:17:25:5c:5b:20: dd:55:1a:b4:d8:67:bf:d2:ad:28:50:7a:53:aa:b5:bc: 93:f2:55:5a:3e:95:73:bc:04:52:b4:02:b0:3d:d2:49: 82:ba:c7:6e:0b:e6:4a:dc:9e:99:dc:aa:20:39:44:a6: 0f:ad:23:3f:1b:b3:03:7c:ed:e6:5a:0a:67:d4:af:13: cf:6b:27:8b:e1:8b:0d:1a:5d:06:83:0b:58:1b:d6:83 Fingerprint (SHA-256): 12:37:87:8E:60:50:45:8D:0C:1B:98:DA:EB:08:32:56:D1:EE:F0:F8:EC:36:59:E7:16:A5:4E:4D:D4:3B:AD:C9 Fingerprint (SHA1): 79:97:AE:36:8F:63:30:80:99:98:DA:FB:94:95:4D:C1:3A:BB:33:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221074 (0x13162f92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:12:28 2023 Not After : Mon Mar 20 22:12:28 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:b4:d6:f5:0c:b4:b3:06:85:8b:cd:51:9c:52:40:34: 7e:ea:8a:4f:ec:ec:18:9f:c6:5c:02:d8:ad:36:ab:42: e2:50:fe:2e:c7:97:03:f8:d5:22:a6:1f:fc:90:6a:7b: 35:f3:0e:f9:87:00:0e:24:1a:a2:b1:8c:91:a5:23:1b: 2a:6a:c9:9b:f3:21:86:82:e5:3e:f4:10:c7:dc:9d:2a: dc:67:4d:79:3c:52:4f:0b:71:51:7d:5b:a5:3e:a8:0b: da:87:8f:a2:57:0e:67:41:83:ba:10:eb:03:5a:9f:f2: 77:26:d2:e1:27:ad:a1:48:34:85:cb:55:5a:8e:db:44: 46:26:e8:f6:87:51:41:05:29:39:55:ca:d2:5b:88:32: e6:72:08:94:ed:00:44:6d:d8:36:8c:a3:09:65:e8:43: 0a:bd:a0:84:b6:11:85:ed:07:b4:35:7c:49:91:d7:c2: 08:ad:33:3c:9f:6b:2a:e0:24:83:62:c7:16:6b:f0:dc: c3:a4:b1:20:b4:6d:a0:49:2d:1b:e7:f8:99:78:f4:50: 8b:e9:a4:50:fa:df:43:30:9e:e4:0b:e2:fb:51:d4:85: db:01:e2:54:38:b2:7f:a9:c7:77:6f:07:41:83:a0:9c: ee:2c:4d:5a:72:d5:6e:c6:46:92:7d:d6:6b:fd:aa:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:69:a1:a1:c6:5b:3f:bd:84:89:d4:d3:91:93:bf:a7: 3e:5a:84:1d:3a:f7:df:4e:ac:a4:5e:69:35:5d:ad:15: 53:74:c1:93:4f:81:6b:b5:28:4d:e7:03:fb:ef:9a:de: e8:7c:16:49:ed:c7:af:be:97:f8:b5:43:27:ac:60:a9: cd:78:48:30:27:f0:4a:f8:01:a8:6b:3b:99:09:26:56: 16:7e:46:28:49:fe:45:33:6e:72:28:c2:7c:24:30:b3: fc:05:3d:6f:9e:bc:e8:b2:85:ba:e1:72:57:bb:7e:46: 3d:25:a9:92:53:24:ab:04:e1:57:87:01:ec:76:4f:76: f5:cc:2e:2c:ff:e6:f9:81:f0:b7:6f:c1:08:60:0e:24: c7:b2:c3:5c:5a:f3:be:53:8d:98:81:d6:c9:6b:f5:ff: 6f:87:6e:32:49:1b:f5:b3:3e:1a:79:a1:f8:cd:55:94: 25:36:19:e1:03:4f:90:70:6e:79:f5:e6:34:86:79:b4: 5b:91:7b:a0:94:1a:ff:37:72:52:5d:da:b6:06:09:a2: c8:4b:ac:dd:97:b8:84:c8:c6:23:15:bd:16:4e:28:e5: c8:78:a6:a4:69:63:ce:6b:5c:38:0b:78:92:22:b9:50: 44:6b:2a:fe:33:b4:98:d4:d9:61:7b:3a:fc:39:f8:90 Fingerprint (SHA-256): 27:A7:B1:11:1C:6B:BF:52:3F:16:C2:5A:89:9F:A4:9E:29:AC:7F:11:0A:3D:A4:47:7B:40:8A:37:30:E3:E1:C1 Fingerprint (SHA1): CA:42:4E:44:60:9D:17:5E:62:A7:27:31:B1:2F:C7:54:EC:40:CC:6A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221074 (0x13162f92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:12:28 2023 Not After : Mon Mar 20 22:12:28 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:b4:d6:f5:0c:b4:b3:06:85:8b:cd:51:9c:52:40:34: 7e:ea:8a:4f:ec:ec:18:9f:c6:5c:02:d8:ad:36:ab:42: e2:50:fe:2e:c7:97:03:f8:d5:22:a6:1f:fc:90:6a:7b: 35:f3:0e:f9:87:00:0e:24:1a:a2:b1:8c:91:a5:23:1b: 2a:6a:c9:9b:f3:21:86:82:e5:3e:f4:10:c7:dc:9d:2a: dc:67:4d:79:3c:52:4f:0b:71:51:7d:5b:a5:3e:a8:0b: da:87:8f:a2:57:0e:67:41:83:ba:10:eb:03:5a:9f:f2: 77:26:d2:e1:27:ad:a1:48:34:85:cb:55:5a:8e:db:44: 46:26:e8:f6:87:51:41:05:29:39:55:ca:d2:5b:88:32: e6:72:08:94:ed:00:44:6d:d8:36:8c:a3:09:65:e8:43: 0a:bd:a0:84:b6:11:85:ed:07:b4:35:7c:49:91:d7:c2: 08:ad:33:3c:9f:6b:2a:e0:24:83:62:c7:16:6b:f0:dc: c3:a4:b1:20:b4:6d:a0:49:2d:1b:e7:f8:99:78:f4:50: 8b:e9:a4:50:fa:df:43:30:9e:e4:0b:e2:fb:51:d4:85: db:01:e2:54:38:b2:7f:a9:c7:77:6f:07:41:83:a0:9c: ee:2c:4d:5a:72:d5:6e:c6:46:92:7d:d6:6b:fd:aa:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:69:a1:a1:c6:5b:3f:bd:84:89:d4:d3:91:93:bf:a7: 3e:5a:84:1d:3a:f7:df:4e:ac:a4:5e:69:35:5d:ad:15: 53:74:c1:93:4f:81:6b:b5:28:4d:e7:03:fb:ef:9a:de: e8:7c:16:49:ed:c7:af:be:97:f8:b5:43:27:ac:60:a9: cd:78:48:30:27:f0:4a:f8:01:a8:6b:3b:99:09:26:56: 16:7e:46:28:49:fe:45:33:6e:72:28:c2:7c:24:30:b3: fc:05:3d:6f:9e:bc:e8:b2:85:ba:e1:72:57:bb:7e:46: 3d:25:a9:92:53:24:ab:04:e1:57:87:01:ec:76:4f:76: f5:cc:2e:2c:ff:e6:f9:81:f0:b7:6f:c1:08:60:0e:24: c7:b2:c3:5c:5a:f3:be:53:8d:98:81:d6:c9:6b:f5:ff: 6f:87:6e:32:49:1b:f5:b3:3e:1a:79:a1:f8:cd:55:94: 25:36:19:e1:03:4f:90:70:6e:79:f5:e6:34:86:79:b4: 5b:91:7b:a0:94:1a:ff:37:72:52:5d:da:b6:06:09:a2: c8:4b:ac:dd:97:b8:84:c8:c6:23:15:bd:16:4e:28:e5: c8:78:a6:a4:69:63:ce:6b:5c:38:0b:78:92:22:b9:50: 44:6b:2a:fe:33:b4:98:d4:d9:61:7b:3a:fc:39:f8:90 Fingerprint (SHA-256): 27:A7:B1:11:1C:6B:BF:52:3F:16:C2:5A:89:9F:A4:9E:29:AC:7F:11:0A:3D:A4:47:7B:40:8A:37:30:E3:E1:C1 Fingerprint (SHA1): CA:42:4E:44:60:9D:17:5E:62:A7:27:31:B1:2F:C7:54:EC:40:CC:6A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221079 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221080 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221081 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221082 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221083 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221084 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221085 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221086 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221087 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 320221088 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 320221089 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 320221090 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 320221091 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 320221092 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 320221093 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 320221094 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 320221095 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 320221096 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 320221097 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 320221098 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 320221099 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 320221100 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221101 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221079 (0x13162f97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 20 22:12:40 2023 Not After : Mon Mar 20 22:12:40 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:f9:26:25:f5:9c:5f:c0:a8:e5:ff:c6:89:e0:d3:25: 64:87:1d:1b:db:da:9f:44:08:95:02:ab:e7:c2:37:e7: 73:cd:e9:6a:4f:61:96:09:b4:12:e2:e8:03:17:2b:33: 9c:29:2d:c8:be:aa:18:4a:1d:f5:d8:58:d6:94:44:44: b5:70:74:f7:90:2b:32:f5:d6:04:36:d3:09:de:77:5c: ee:d0:33:5e:ac:04:de:5c:3b:f0:9f:fa:5f:b5:c9:e7: f6:ef:94:49:c8:bc:35:08:b7:c3:f0:78:34:c4:fa:39: 93:20:c5:bf:0a:5c:34:97:3f:64:a1:2e:8e:96:5c:c4: b4:b5:5b:3e:26:7d:c0:d9:41:01:24:e3:e2:f3:73:44: a7:78:08:e0:30:24:16:87:2e:71:64:66:b7:d6:4b:f6: 10:ff:36:ff:29:6c:bc:8d:40:b3:ae:5a:55:ff:a2:3e: 4a:52:82:6f:ef:0b:56:a4:63:7a:72:c2:a6:1e:e9:15: c1:0e:26:68:7e:c7:b3:a9:82:eb:cf:d7:68:19:e3:20: ac:c7:41:7f:08:f5:b2:b7:c7:e5:9c:d6:3a:38:76:2f: 0f:d3:86:e5:1b:c1:59:0a:90:01:99:ac:dd:64:25:be: cf:92:45:75:d2:05:b7:ec:9f:7b:f6:de:75:b7:d6:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:4c:49:10:54:2a:a8:ed:f3:a4:bd:bb:c6:1e:51:02: b1:65:00:57:e6:08:e7:27:7e:6c:c6:eb:5c:7e:37:37: 61:23:49:71:6a:45:7e:d4:02:1e:70:21:fb:08:6d:cd: 55:2c:fe:4a:b6:5b:af:5f:5b:92:b7:df:89:d1:59:e3: e1:da:82:52:8a:b2:f6:10:6a:69:82:89:76:35:34:0d: 78:9f:05:f4:b9:bf:45:fe:2a:1d:e3:37:bc:65:84:cc: 56:bc:58:4d:84:7d:ba:51:ce:27:26:f0:2a:89:4b:f1: 0f:ef:47:83:49:24:ae:f2:47:06:bd:ec:17:a5:fe:cd: 18:3e:65:1d:29:18:98:a0:51:35:48:a2:e7:bf:e3:87: 27:95:47:2e:f2:97:73:d4:a7:5e:cd:86:21:17:fd:fb: 4c:71:1f:d8:6b:22:c7:46:e6:22:08:a4:81:28:db:9a: 44:8f:c7:46:eb:40:06:4f:a3:47:6a:96:a2:7c:ec:9c: 74:60:7c:9f:49:ce:df:4d:82:74:03:52:bd:f4:9d:13: a5:39:b3:02:1e:93:7f:38:d5:fd:34:1a:84:19:42:6b: 60:eb:86:20:39:b3:7e:bc:df:d3:28:65:c5:18:73:d9: c2:3b:c4:d3:51:58:50:e1:5d:b4:46:e7:9e:f3:22:52 Fingerprint (SHA-256): 1C:47:36:76:24:CC:33:F5:E6:CC:4A:DA:42:EC:4F:04:BE:73:A1:89:2B:29:F1:85:5A:8C:01:59:CC:73:9F:32 Fingerprint (SHA1): 48:0F:D7:4B:0B:3E:AF:3D:8A:EF:F1:0F:1C:AC:CD:69:F6:5E:83:23 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221080 (0x13162f98) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 20 22:12:41 2023 Not After : Mon Mar 20 22:12:41 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:b9:bf:8c:8d:24:fe:7f:e7:94:8b:92:2a:a1:54:cf: 85:37:42:dd:96:be:84:c7:8a:0b:e2:82:39:69:ba:40: eb:e7:3b:aa:db:7b:61:0d:19:18:a9:bb:17:39:7a:4e: 20:02:9a:25:99:86:87:47:ca:e3:3b:3e:de:29:f5:6e: e1:f8:f0:ab:00:59:bd:f4:7d:65:ef:7b:8d:58:3f:f8: 6f:86:6d:74:b0:e9:60:54:04:fa:d5:91:da:aa:e8:59: 42:7e:18:63:25:80:c7:e5:96:df:6d:39:1d:15:c5:9b: 29:f2:78:78:da:1c:3c:3b:85:ff:a4:85:e5:62:88:dc: 24:f8:29:c3:b1:2a:ed:87:45:e6:12:dc:7d:51:f9:2f: 1c:50:46:dd:a2:f8:81:0a:73:59:cb:59:6c:df:c1:63: d5:09:94:a0:98:8c:ef:18:4e:8b:a9:3a:c8:00:c1:71: a2:f8:fb:14:de:54:ae:b3:88:75:2b:b6:14:95:f9:56: df:bb:80:78:ef:97:49:be:6b:96:5c:d3:96:a2:9d:79: 87:bd:af:92:d7:d2:07:c8:a3:9b:e6:ba:9f:4f:39:60: 3d:ce:be:2e:dc:70:12:c5:67:70:47:ad:58:da:94:3e: 9e:4f:05:e7:8c:85:e9:d4:68:cd:94:de:08:9f:4a:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: dd:f3:c3:3d:06:03:af:84:8c:f3:47:55:bc:f8:d0:17: 2d:33:58:bd:bd:56:bf:c3:93:1b:5f:7b:a2:de:f6:a6: fa:eb:bc:37:84:84:fe:cf:6b:2b:7d:a1:cd:52:f0:f9: 9f:01:fa:bb:77:8e:53:4b:8a:df:f8:51:a9:55:e9:13: ab:d3:29:43:9e:27:e7:bd:49:f7:c6:e3:4e:a5:ec:71: 68:74:28:09:d7:dd:72:90:81:eb:24:0b:8c:39:ea:83: c5:cc:8c:fd:30:0b:b0:32:c8:3e:3b:8f:86:23:f6:17: 65:1c:2e:f5:21:71:bb:ac:7a:17:fe:84:1f:0b:6f:73: 6b:ea:6a:58:af:a7:5e:6d:0d:f9:e1:9b:50:ff:9d:0e: 32:e1:89:cc:4b:34:7a:4e:84:dd:aa:7f:b3:f8:e7:7b: 1c:0c:76:3d:18:a2:6e:fe:56:19:de:ce:c4:d5:61:af: 0f:27:e9:2a:07:79:b2:13:08:24:9d:0c:40:ba:1e:c7: d0:f8:8a:72:fa:81:75:eb:2b:3e:7d:05:41:70:c1:1f: 5d:26:62:52:5e:f2:cc:9d:90:da:10:42:83:83:76:6e: dd:1f:3e:11:8a:97:bd:59:0a:ff:94:02:f5:68:5e:df: 3c:5e:9b:e8:eb:8b:6c:fc:06:6b:0b:d8:06:f0:33:93 Fingerprint (SHA-256): F9:16:2B:76:87:87:03:A7:4F:02:B7:14:07:52:85:7C:45:2F:A5:1F:92:A8:D7:5D:14:2E:B0:8F:E9:18:A0:DB Fingerprint (SHA1): 4C:F6:CC:60:7C:64:0C:06:41:03:E5:F2:D8:DB:98:AD:FB:84:D7:68 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221081 (0x13162f99) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 20 22:12:42 2023 Not After : Mon Mar 20 22:12:42 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:57:42:c1:f1:05:2e:98:5e:b5:29:57:d4:68:3b:01: be:91:36:06:b0:2e:3c:ee:c4:af:c0:50:01:66:0d:b4: 3f:6e:93:a4:8a:d2:ff:55:fd:d5:cf:9e:12:14:8a:5b: e0:af:7b:1d:0d:d5:ca:b5:7e:82:ce:0e:e6:f4:6f:30: 50:5c:d9:67:fa:8f:f9:2f:3d:75:25:99:82:0c:9f:24: 2f:14:0c:34:d1:8a:70:61:52:52:e8:26:66:2e:b3:c3: 68:9e:b5:66:49:16:b0:7a:27:4a:bd:e9:bf:20:63:91: fb:cc:a8:57:54:be:30:82:1c:6b:9d:c5:9a:e8:a8:59: 9d:39:40:bd:73:b9:93:91:ce:4e:e1:4a:e4:a7:1c:fe: 85:7a:ee:a5:e6:91:d3:94:73:ab:82:49:63:30:e2:18: 70:15:e2:41:c8:98:04:fc:02:6d:87:21:91:ec:53:a2: 84:2f:5a:4e:dd:99:c4:b4:36:7d:ba:14:db:5f:9a:1d: 24:48:51:8e:b9:f8:e4:e6:e5:e1:5c:12:ee:b5:4d:20: 8b:e8:27:c0:0c:f2:5c:39:5f:38:a5:38:4c:31:53:1d: 56:58:f2:6f:01:b8:f0:ac:20:56:42:38:2a:ec:7e:d5: 33:4a:b7:00:32:24:6d:41:19:67:91:3f:6c:12:c6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:bb:6e:2d:73:b6:e3:3b:45:51:04:56:80:3d:49:94: f4:fc:06:08:2f:5d:eb:3b:a3:b4:fc:ee:13:1f:5f:21: 22:20:53:52:cd:23:4b:06:fe:d4:31:12:60:d2:68:d9: 4f:79:7e:66:c8:21:c5:7b:c5:80:db:69:fc:13:58:b6: a3:62:7f:58:28:99:0f:8e:89:bc:92:0a:b2:26:b2:26: 81:62:19:77:e3:aa:03:24:f6:5c:8b:99:e3:22:53:85: 02:b9:9a:31:8f:19:04:47:7e:56:91:59:93:95:b8:31: e8:b5:0d:f8:cc:d4:c5:e0:97:34:01:91:95:e8:b7:c5: 23:ba:97:18:c3:dd:de:78:2f:0d:66:03:67:52:94:23: 2c:e4:4c:12:4d:25:cf:05:1b:a8:58:45:7d:d5:89:23: 6d:8d:cb:9e:1a:b2:57:55:3a:fb:18:2b:c1:b9:9e:eb: 05:22:0e:79:0d:a4:45:26:8f:27:a3:3f:bb:7a:52:24: 67:0f:42:f5:cb:13:b0:93:0b:41:1a:8e:ea:e7:0f:42: e1:c6:61:15:54:c1:b2:8e:ea:8c:0b:bd:e9:3d:94:5d: b9:87:f7:6d:e6:28:27:41:e5:0a:4a:6f:c2:3f:a8:b6: af:3c:28:70:b1:03:b4:44:a2:54:a1:d3:4d:d8:26:d0 Fingerprint (SHA-256): 9F:A6:F9:30:93:74:3B:70:F1:C5:73:47:96:F7:68:79:C0:7F:14:3F:A5:F0:D1:3C:7F:72:56:71:07:D3:69:9C Fingerprint (SHA1): 72:4D:2F:94:60:A3:6C:D6:B6:36:81:2A:9F:0A:80:CC:90:88:91:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221082 (0x13162f9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 20 22:12:43 2023 Not After : Mon Mar 20 22:12:43 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:a7:0c:12:15:a8:0a:62:e5:64:ec:f5:f3:21:0f:0a: f8:19:2f:2d:35:e9:e0:e7:f0:b7:1c:e1:f6:29:0d:70: 09:f5:35:7c:e9:6f:fd:1b:9e:d1:9c:0a:de:21:84:e2: 6c:c6:fd:d8:0b:58:2f:a9:bd:86:37:0d:96:8d:e9:e5: 3a:4b:4c:3c:e5:18:6b:6b:f3:04:0b:49:64:b1:89:17: 4c:17:5a:ca:4d:cc:80:29:85:c5:df:a3:de:d0:da:a8: 60:7d:91:34:31:1c:67:1b:d4:13:17:25:36:c3:00:49: 4b:75:75:53:a3:6e:42:6b:5a:9a:02:2c:c0:46:68:12: 3f:5c:c9:49:25:5f:b4:a5:4b:c0:81:25:85:ba:1c:ff: f5:24:1c:0e:26:65:22:2a:92:c6:53:3d:b6:8c:2d:1b: b7:eb:44:90:90:01:21:c2:c3:1a:87:6a:f6:1f:2c:cf: 3c:d6:02:00:47:8b:5e:a0:16:96:52:bc:9b:53:3d:5b: 6d:95:28:10:e7:cd:e7:15:f6:fb:02:8b:bf:35:2e:bc: 62:ee:43:ce:15:41:0f:ef:cd:99:5f:72:a5:a9:a7:08: ab:c1:96:95:15:c5:23:75:ba:82:fb:b8:83:5f:4b:8c: 0f:b9:a1:92:38:4b:c6:ef:fa:e6:5c:38:7e:8c:57:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e9:cc:cd:8e:ad:69:8d:d7:88:32:07:7b:47:88:11:a7: 8f:d8:8e:5b:db:ff:9a:20:50:e7:25:18:01:1c:15:09: 1e:47:e8:98:6d:89:7e:62:4f:49:1c:4b:eb:23:5d:cd: 21:73:74:5c:22:2c:4e:9d:68:79:71:12:36:75:ea:25: a6:35:73:e4:4e:c6:12:fd:8d:00:f4:fa:21:29:6b:8e: c6:c1:2d:c9:62:2e:e7:17:36:a4:c4:12:7b:c0:f1:3a: d4:d4:93:95:c9:88:89:19:6b:8a:c6:ad:3c:a6:b9:1f: e8:96:43:5c:04:aa:4d:6a:00:fc:04:9b:61:b1:9c:af: 75:3b:b3:a1:34:04:20:4b:de:82:04:ed:1f:d2:83:ab: 6b:c5:0e:ba:ee:17:6f:69:13:95:97:8b:9c:b8:ce:13: a4:ca:83:5b:b3:a8:ca:16:67:fe:bb:e4:1f:79:28:9f: 37:35:fa:e0:75:07:43:a6:ea:f2:87:d2:61:8a:40:a1: 29:92:ff:c2:8d:53:80:84:05:8a:9d:74:55:e6:aa:bd: c6:51:57:cf:54:19:33:d7:81:ca:e2:62:8a:09:c4:15: 8f:ba:7e:56:32:61:26:21:91:21:60:a8:b1:54:46:d9: 5e:1c:9e:58:37:43:4c:17:8b:c4:e6:5f:77:c9:55:67 Fingerprint (SHA-256): E6:4A:F8:31:2F:90:04:C3:CA:B3:05:90:0C:04:BC:8F:0B:FF:E4:72:3E:09:D0:83:64:23:67:4A:08:C4:17:D4 Fingerprint (SHA1): 33:E9:AD:45:F2:6E:2C:EA:86:1D:91:3B:BE:44:B8:DF:99:82:D9:6D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221083 (0x13162f9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 20 22:12:44 2023 Not After : Mon Mar 20 22:12:44 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e4:fc:bf:34:b5:ba:5d:93:ed:55:7d:a5:6c:96:0c: ec:b0:b8:f3:6c:e5:8f:c7:a4:0e:f2:c8:4a:36:85:67: 02:a6:5f:56:a7:f0:86:4d:9a:81:1f:08:7c:8a:41:a9: 4f:be:fe:06:01:a2:98:d4:14:30:f1:ef:2d:47:0e:e5: 06:29:1c:e1:79:b7:3a:ce:07:bd:08:ec:78:1b:63:20: e3:cb:63:83:15:2d:f5:6d:18:b8:63:c3:21:3f:54:48: c8:46:b8:35:f0:25:84:f5:62:50:5d:a4:96:ab:d2:2d: 1e:60:f1:47:99:19:d9:ee:17:77:90:b0:c5:77:6d:0d: f9:f5:5e:31:ba:da:8c:53:4b:6b:38:84:0b:b5:e4:7a: 0a:78:70:8e:21:fa:d2:9d:79:3a:8c:71:3e:0e:88:fc: a3:40:42:ab:aa:ab:d2:01:f9:62:38:d7:b3:de:8e:b9: cd:ed:7b:7d:dd:07:7f:26:1b:9f:f4:3c:a2:b2:b8:22: 49:8e:99:6e:51:8c:94:7b:5b:17:00:ca:31:51:b8:44: 35:4c:b3:f1:96:d4:8c:6b:0d:ec:fd:40:64:f9:48:ef: f8:49:ee:f5:6c:81:8f:fc:08:66:75:45:73:a1:20:f3: 40:8e:ee:9c:db:a3:21:8c:e9:fd:ae:6d:47:00:dc:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:27:77:ce:af:d3:34:2e:8d:aa:74:a1:02:71:1b:64: a2:e1:c3:6f:9d:fa:71:c8:1c:4f:fe:a7:7b:ae:7d:97: 60:fc:12:f5:03:ab:54:f9:5a:38:23:32:b5:03:9d:e5: f6:b1:ee:e2:57:12:75:18:98:4b:30:a5:35:10:97:4e: 50:ef:69:eb:57:29:07:cd:90:77:df:20:12:6b:7e:34: 60:2b:0e:ef:93:de:fa:2b:b1:1c:92:8a:6e:8f:cb:83: 87:8c:33:9a:95:a8:40:4b:25:3c:a3:9a:d4:24:f4:99: ce:31:3f:eb:e2:38:c5:11:fd:49:a6:90:df:25:e7:5a: 10:f5:ee:62:56:f2:91:8c:aa:80:39:e1:81:f1:a5:96: c5:0f:5b:9b:40:a7:33:1d:e5:65:57:2a:70:21:a0:c2: bc:71:87:8d:27:61:39:48:a1:7b:b7:26:49:44:f2:9c: f3:83:9b:7e:60:a9:43:a9:23:58:e4:30:72:35:95:ff: 2d:67:29:d6:fa:7b:56:f4:c5:01:b9:87:41:4e:0c:63: e4:ac:5a:06:0a:55:9a:a3:14:11:6b:cb:bc:7a:80:46: 1c:bd:1d:db:12:78:ba:03:f2:a0:eb:6d:df:1e:88:5c: 5b:80:12:92:d1:90:a2:4a:5f:20:e9:ba:79:38:d3:83 Fingerprint (SHA-256): 01:7A:11:45:DA:0D:70:6B:41:C3:93:07:EC:0B:98:08:37:F6:C4:35:8A:8B:51:6B:40:E8:C9:5D:BC:89:92:74 Fingerprint (SHA1): 38:31:E0:01:B5:54:FE:FC:1A:33:07:68:D4:45:A7:50:92:CF:D2:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221084 (0x13162f9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 20 22:12:46 2023 Not After : Mon Mar 20 22:12:46 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:7f:40:f6:8f:b6:a9:ff:7f:54:82:7b:3f:72:66:2d: aa:e3:ff:56:4b:1b:78:6a:86:92:4b:a3:a9:87:90:1d: aa:61:46:cb:fc:7c:f1:1a:41:3a:0a:aa:ad:a0:4d:3b: 43:a8:69:17:3a:37:23:65:5f:57:8b:4a:74:f9:e6:25: 9d:a3:02:10:c7:2d:ea:9a:ff:9d:78:6f:1c:64:df:74: be:84:1b:f8:da:c0:a2:d0:e7:f7:d0:35:42:44:42:b6: 27:1c:db:9d:04:e7:62:8e:68:5f:b4:6e:dc:91:34:64: bb:28:5a:be:77:a7:8f:c4:05:ba:45:cc:60:2f:59:4f: 02:2a:e1:b2:7a:71:29:e6:cd:80:09:6b:3a:06:fc:2c: 6b:38:28:f8:cd:30:4e:0b:70:9b:bd:35:26:94:d4:65: c0:08:22:31:d9:93:36:54:a2:90:94:21:ab:0a:34:7b: 5f:e5:24:63:4a:d8:04:d0:0c:bf:73:8e:65:80:9c:dc: b3:3e:04:4b:fc:f1:be:d9:ec:e6:f3:4e:09:7a:35:a3: 69:55:bf:92:ac:91:c5:61:78:73:ac:cb:98:17:7e:59: 5c:c9:fa:42:55:33:66:a7:aa:d4:bb:73:77:a5:b9:d0: 32:62:f4:bd:51:0c:9d:e3:59:b7:28:9b:af:39:5b:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:6b:e3:82:3c:7e:09:03:3d:06:c4:77:fb:29:f3:73: ec:e6:e5:7a:99:dc:38:1f:76:61:dc:fc:b4:0b:8e:4b: 63:7e:5e:bb:b3:4c:a1:fc:af:7d:58:8e:2f:fb:eb:76: af:de:ca:f6:46:a7:b0:0a:9d:cc:f8:d2:3d:f5:7f:e5: 19:e2:4a:cc:ea:64:6d:43:36:3a:51:12:d2:46:97:45: 72:a7:a8:eb:2c:37:fa:88:0a:d2:6c:dd:fe:e0:09:76: 10:e7:5a:31:e2:68:9b:c7:0d:48:9e:c8:37:f0:2c:d8: 7b:71:c8:8a:40:a4:01:4a:be:29:df:b7:53:07:32:f0: e2:70:8e:02:6b:45:0a:9d:88:06:3a:3f:cc:7d:15:cc: 2e:52:99:ce:f1:44:1a:bb:60:8e:8e:41:d8:c7:81:06: 0d:17:12:14:93:62:a5:66:db:a2:42:dd:21:86:c4:a6: f1:a1:49:9a:a3:8c:37:0c:26:da:fb:cf:3b:3c:88:8c: 88:17:75:df:20:b9:4a:c9:04:4b:e9:d9:7a:de:66:ed: 09:60:9a:ac:44:cf:c3:d7:d8:2d:41:e0:2f:07:b7:7e: 2f:5a:36:50:c0:3b:1d:da:e7:81:07:31:61:f4:db:72: 81:1c:dd:2f:89:2b:f7:bc:40:40:c9:cb:8b:4f:5d:d1 Fingerprint (SHA-256): FA:AD:AC:FC:2C:DB:06:D4:90:2E:2D:65:CD:9C:83:CE:70:B7:01:E7:72:BD:F5:02:9D:4D:A3:03:2D:2D:B7:14 Fingerprint (SHA1): 62:FB:5A:C9:17:A2:F2:B2:CB:B7:D6:8C:65:2E:60:A4:7A:F1:25:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221085 (0x13162f9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 20 22:12:47 2023 Not After : Mon Mar 20 22:12:47 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:f1:62:64:06:52:70:70:23:14:f8:40:8d:67:b1:97: f0:74:12:d1:09:57:ce:f6:ab:37:86:b1:28:85:50:14: 87:ea:ac:95:22:05:b7:39:91:e2:57:c9:ed:6b:d7:90: c2:b2:bd:07:2d:27:c6:47:29:46:2b:c7:68:54:70:d1: bf:96:6e:3b:a8:ab:f1:0b:4e:12:f8:51:49:68:32:3d: 6c:d4:23:8d:47:38:5b:a7:20:84:c4:9d:bd:16:a4:83: ec:be:8a:a8:55:6d:ba:ab:98:87:6e:95:35:d5:d6:9d: 60:68:18:d8:eb:2c:1c:ae:be:5a:33:3d:63:44:cf:a4: b6:ca:13:0f:be:b0:85:c0:80:d5:86:5c:dd:ea:70:0c: f5:a7:3d:53:70:9b:69:50:da:c7:2d:d3:11:9c:4b:84: 48:b2:f7:08:58:d2:88:19:62:74:14:7f:63:39:5e:63: 9b:67:53:26:d1:0b:59:6c:43:80:0d:69:75:7b:97:58: 9e:6d:0d:52:57:ca:0e:f4:4a:1a:3a:1e:4d:b9:0c:1f: 28:89:ec:ea:6f:9e:21:f4:7a:d5:21:6c:25:62:e3:53: 87:6d:bf:47:02:65:89:b3:8c:5f:e2:3e:40:a4:59:23: b6:ab:59:f0:68:d7:9b:a2:e5:99:b7:a6:fd:57:ed:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:b1:a1:6f:85:13:7c:6f:b8:e5:0f:b7:e8:a2:be:49: 3b:2f:88:64:a3:44:bf:57:ed:d3:47:9a:1a:15:58:59: 2a:c4:57:f6:7f:1a:c0:92:5d:ca:78:95:5c:53:97:86: 9a:9f:b8:79:eb:18:5e:9d:98:b0:b0:fa:c9:df:47:24: 83:95:7d:51:ba:0a:c4:11:b2:be:43:e8:da:52:c5:af: 6d:e4:92:dd:1f:6d:55:c7:d5:a7:c6:f6:eb:c8:23:49: a0:93:65:c8:d8:57:09:d1:88:1c:9d:98:6c:42:c5:e1: cd:54:00:37:9b:4c:ff:7b:c5:ec:73:da:81:79:ce:02: a4:df:f6:77:fd:6f:20:41:51:3f:e3:a8:bb:f4:17:10: 6b:5f:24:39:b4:18:f7:b7:c4:ca:b5:4a:62:66:8c:6c: b3:fb:89:d6:99:99:bc:cc:5c:5e:eb:a6:e0:fc:e2:82: 5e:ef:64:05:cd:43:1a:a0:d9:28:af:cf:82:35:34:47: 3e:20:b8:36:fa:a6:69:7b:08:fe:dc:be:b6:e9:19:01: 2f:ea:e5:44:3d:be:9c:0d:f6:b1:21:72:b9:70:b2:41: 29:0f:96:b2:99:fa:8d:73:d9:86:2f:72:83:cf:03:b5: 74:33:21:89:b4:6a:fe:a8:42:6a:8a:c3:0a:f4:fb:61 Fingerprint (SHA-256): 11:69:E6:D0:8E:B8:2C:02:7A:95:E8:CE:44:01:BB:FE:1B:FB:E7:0A:1E:51:2E:15:81:48:96:D8:35:47:A0:32 Fingerprint (SHA1): 7E:8C:C2:8E:18:DD:90:E9:EB:72:6E:CF:90:9E:64:F9:F4:C7:49:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221086 (0x13162f9e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 20 22:12:48 2023 Not After : Mon Mar 20 22:12:48 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d9:fd:c8:08:6c:2d:6f:66:d6:d8:78:ca:4a:39:01: c7:00:05:02:8f:48:a7:8f:a3:d8:11:69:35:a6:02:19: 27:0c:f4:e0:94:5a:d1:81:f6:73:b0:56:03:e7:67:7e: bc:55:e8:32:11:87:c9:c4:5f:34:fa:7a:3a:89:30:97: 8a:50:99:72:c7:fc:c8:8b:89:a7:36:d2:02:d4:3a:ed: b8:da:f9:b0:87:f8:9a:28:00:b5:77:81:f1:d6:5e:6c: 25:be:49:ae:29:9a:5c:af:4c:61:c3:d6:1e:d8:c6:f5: c9:40:cd:0e:20:c4:dd:44:62:6b:ae:f0:5f:6b:2e:8d: fb:8b:85:e4:f5:4e:a3:2a:42:72:e0:07:42:36:4b:5c: ec:80:ee:04:31:f3:5b:88:ee:6f:1d:55:0f:a4:c2:aa: df:d4:01:df:94:f1:ee:c9:50:a9:7f:b1:e6:77:56:d2: 05:a2:22:90:0a:4a:6b:25:4f:03:b8:06:f3:35:a3:8e: 34:30:2d:f8:6f:4c:fe:08:77:4a:40:0b:a0:f9:a9:6e: a8:18:27:80:58:d9:ac:c6:a9:45:88:55:33:85:53:db: 7f:4c:31:00:b4:88:af:97:06:9f:7f:a8:68:36:8c:d2: 0e:da:a0:71:7c:b8:7c:29:6a:40:78:df:7f:b1:6e:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:d8:1d:48:59:70:b7:aa:02:ac:38:ea:1e:a5:93:c7: 5d:54:b9:29:ea:f4:23:82:f4:e9:5f:23:f2:e1:db:1e: 31:c4:4e:27:eb:5d:35:2a:0d:5f:1f:af:62:37:7f:1c: dc:d7:9a:2e:ba:d4:74:9d:5f:57:fe:a0:47:49:87:d8: a7:21:1e:f7:9e:e9:ed:a9:33:f2:87:5a:7f:3c:7b:ad: ef:94:b2:72:26:12:4a:78:dc:30:79:5b:45:ac:bf:5c: a4:04:db:73:e2:73:6f:fe:c5:08:ae:80:92:cd:9a:66: 2c:1d:11:d6:b7:e5:03:fa:8d:38:87:7e:8d:9d:d9:05: 75:8e:bc:3f:e7:b4:7b:cd:f2:81:29:53:28:1f:d9:18: 16:b9:79:69:bf:0e:ea:86:6c:72:16:9b:7b:35:28:0c: 21:95:3c:1d:37:89:aa:40:0d:74:63:48:a1:ba:2b:84: 49:dc:43:96:c4:bd:bb:5f:49:29:2c:b6:7a:99:c5:ab: 9e:b2:95:78:dd:62:e2:cb:1c:4e:52:d4:00:4c:00:a8: 42:74:1f:e2:0e:4f:c0:28:fa:c3:74:d4:b3:63:47:da: c4:71:ea:b9:95:fb:00:e0:f6:e4:b9:0e:0e:ef:f8:71: 37:b1:aa:86:d6:1d:7e:24:68:6e:5e:c0:19:33:95:fe Fingerprint (SHA-256): 85:C4:22:F4:5D:02:80:72:57:64:45:32:65:95:32:FF:05:07:26:48:95:DE:F5:12:5A:EA:77:C1:75:6D:B0:8C Fingerprint (SHA1): 5A:FF:63:32:F5:97:C9:79:93:CD:14:9F:2E:47:E5:6F:1A:13:2B:06 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221087 (0x13162f9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 20 22:12:49 2023 Not After : Mon Mar 20 22:12:49 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:67:70:65:d4:32:55:d5:53:60:4c:61:8d:33:08:ed: d6:3d:7d:e7:70:ef:2b:97:ec:58:4e:57:ef:f9:44:2f: 08:59:2b:ff:3d:2c:96:da:56:6a:15:1a:d0:e6:d5:f1: 6a:97:cf:d1:de:93:66:bf:20:9d:dd:ac:60:00:4f:e3: ab:a3:02:42:da:6b:31:5c:46:72:ef:c6:b2:0f:f8:d7: e6:f1:eb:bc:15:6b:2a:0d:f3:d4:52:b9:cb:51:e8:0f: 88:fe:1c:87:22:69:60:9d:08:f0:29:d6:e8:c8:bb:ef: 75:39:fb:6c:a2:e7:35:4f:c2:78:72:56:77:07:50:06: 16:25:c4:df:cb:01:93:81:a7:8a:17:32:c2:a8:c2:fd: 40:98:52:cd:e5:48:18:87:3b:0e:6a:87:bb:5e:c6:f5: be:f3:96:2f:ed:a8:a5:1e:8f:9f:e3:37:e6:d6:4a:2a: b0:79:9e:92:5e:3c:0f:31:7b:4d:e6:2a:fb:f0:81:4c: 92:cc:46:ec:13:65:e8:5d:61:bc:6b:2a:27:2a:79:fa: 65:68:05:92:36:75:2e:cc:52:71:a9:f4:e8:1b:7f:d2: a5:a6:44:46:0d:38:66:b7:fe:17:6d:47:91:d9:dc:ca: ec:fa:41:dd:ad:c7:13:98:04:13:c7:34:03:66:98:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:23:1f:44:34:79:37:dd:1a:f2:f8:c3:49:4b:da:d5: 39:9d:bf:94:27:bb:52:3a:3a:20:3f:05:a3:6a:30:08: 32:55:01:7f:12:ef:ab:a1:01:96:1c:7c:7f:93:69:f4: 4b:40:bc:ff:b1:cf:f3:c7:7d:23:82:39:6c:91:0f:7f: a1:93:d1:d0:17:89:bb:c8:87:3b:fb:98:cb:76:43:67: 9d:ed:f7:00:b3:65:f8:c9:a7:f0:89:c8:64:2f:ad:3c: 7b:8c:d7:0f:75:5f:d0:a5:75:32:ff:4e:14:17:0c:28: ef:7f:58:35:06:be:17:18:18:c4:63:6f:a5:e0:58:a5: 83:8b:1e:30:69:51:a5:c7:0a:1c:5e:27:46:e7:91:9c: 95:25:90:6d:b9:87:cc:9d:4d:e4:f9:05:ec:c1:97:f9: 20:24:23:5f:c6:2e:5d:3b:15:6a:f0:95:d2:0b:3e:f8: 6c:21:50:88:d8:5f:e3:09:f7:41:ea:ee:4b:8b:75:a7: b0:d3:eb:a6:c8:c8:e3:13:55:0d:ad:2f:c4:ba:d9:5b: 43:68:1c:c9:e7:f5:f4:c7:68:b3:5f:a2:4f:35:58:e0: 61:3d:f5:fa:d6:d2:a4:70:c7:58:f0:76:f9:e4:b3:1b: 1e:1a:5c:38:bc:fd:bf:1f:fb:f7:58:2e:f5:88:b8:38 Fingerprint (SHA-256): 36:48:12:B5:3C:A6:EE:FD:29:47:46:A1:D4:E5:65:7F:22:CB:4A:39:10:90:76:72:24:62:CD:B8:9F:75:92:F0 Fingerprint (SHA1): 18:3E:D9:D5:B0:7B:0C:D2:C1:AE:90:A9:1E:58:5B:8A:61:AF:75:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221102 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221103 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221104 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320221105 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221102 (0x13162fae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:07 2023 Not After : Mon Mar 20 22:13:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:e2:56:70:36:b9:29:ac:31:e9:59:f5:e2:28:2c:0f: df:c3:17:d0:cc:68:a8:77:3f:f9:8b:65:05:17:6a:af: 73:04:d5:b6:aa:42:41:ba:c3:07:16:05:96:d1:84:64: 10:11:49:3a:df:8e:3a:fe:ee:d4:ec:fc:d1:7f:b1:8b: 0b:85:4e:75:51:5c:bb:09:d8:e0:59:55:3f:6a:ed:9c: 41:23:83:36:6e:af:0b:6e:a7:cd:a2:1e:09:4c:12:e5: 95:28:48:aa:8d:20:d8:e5:54:b3:d4:58:51:0e:66:10: 47:d6:72:69:76:00:e9:67:ed:6e:8b:50:b7:87:a8:b8: 77:30:7d:df:74:b9:25:92:d5:c1:a9:99:37:4e:91:5a: c3:07:62:e7:f6:fa:91:34:ca:c2:86:ef:54:e4:0e:99: f2:8b:0f:4b:db:86:b7:b7:e4:cd:29:df:53:45:d6:75: f7:21:d0:dd:9f:f5:20:88:e3:e7:44:a3:f7:f9:c3:18: 18:e7:dc:b8:c4:b3:f5:50:cf:6c:c0:47:74:9e:e1:b7: 9d:22:74:f8:3a:d9:b0:72:e8:c7:7d:29:df:c7:bc:95: 16:0c:84:61:a4:74:15:db:f7:3f:f5:56:a7:87:76:0a: 86:d6:42:fc:01:e1:d8:d3:3c:da:79:b5:2a:b2:b6:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:00:19:e3:b2:5d:9b:ff:ae:f6:b9:d3:2a:7d:f3:1f: ac:6a:8a:6a:45:28:32:6e:b9:3a:29:97:31:49:fb:cb: 7b:07:45:3b:99:c0:2c:99:2d:ec:d8:93:ad:98:b7:ba: 79:22:b4:f8:03:00:a0:2f:d6:d8:29:52:ea:14:13:6a: 0c:43:d6:f5:a2:99:4f:80:3c:67:98:2d:1d:bd:de:16: d2:8a:a0:6d:cf:3c:59:8e:ff:02:b4:2d:b0:72:f2:30: f6:33:0c:b4:c9:67:67:bb:ee:98:fa:19:be:fb:4e:65: 9c:49:50:32:f4:3a:18:5b:6b:ca:3a:6d:da:3f:c1:1b: 08:7b:6d:73:e0:e7:a6:db:c6:e2:2c:b8:45:aa:fa:f0: 17:ec:bf:30:3e:66:a3:cf:6d:34:e5:f7:c9:d7:80:1d: d7:39:a8:54:4a:cd:5c:b9:0f:5e:47:c9:10:1a:e5:70: 3e:8b:26:5c:10:6b:84:99:7a:d8:f3:e6:e7:56:65:07: 83:e9:46:33:aa:51:7b:0c:ec:7d:8d:f8:2d:66:c6:d7: d7:a6:32:ec:a0:58:cd:fb:8a:fe:fc:9e:5d:64:99:fd: 09:e9:b5:93:3c:44:44:89:a2:e0:ac:16:7f:69:d8:5d: 95:2c:19:b1:cc:f6:b7:5e:89:fb:07:30:d2:f6:78:56 Fingerprint (SHA-256): 19:69:0A:79:E3:75:FA:BB:4F:93:AE:F8:2C:B8:85:78:1E:1D:5C:67:4E:17:93:4F:FC:C7:82:22:5A:51:32:86 Fingerprint (SHA1): E7:3A:7C:2C:9F:5B:07:24:60:23:7B:4D:32:36:CD:C1:B6:00:26:B7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221103 (0x13162faf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:09 2023 Not After : Mon Mar 20 22:13:09 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:10:4c:37:61:95:38:5e:cc:4e:c4:bf:f5:72:d5:ce: 1f:ce:6b:65:f5:94:49:3e:9f:fa:6e:ac:f4:0b:db:f5: 28:cd:84:22:15:35:3f:f0:44:0f:90:10:0d:fe:25:41: c7:c3:e3:80:03:c5:17:98:fa:cf:9c:e2:73:34:4c:2c: a3:84:4f:63:c5:1e:12:0b:0e:53:ca:cc:3c:55:e9:9c: d0:f6:e5:9e:00:d8:c4:09:36:cd:67:c6:93:ec:3f:34: 47:0b:3e:65:80:59:eb:3b:c2:17:91:60:d8:34:ad:aa: c5:94:4d:51:a1:d2:35:29:6e:c3:a2:ef:37:3a:64:3a: a1:20:48:ee:8a:9c:31:f1:54:26:77:75:1a:a0:db:c3: 45:68:3b:5d:78:97:38:49:dd:52:55:6f:1a:49:b1:e0: 21:fe:de:1c:be:52:30:c0:50:54:77:aa:9b:cc:94:6c: 6a:48:af:7e:bb:e5:a5:ed:28:ad:4f:63:55:b3:41:b9: 5e:00:a4:a4:57:2c:23:d8:99:07:f1:ab:1f:92:c4:91: 2b:af:a9:7a:ac:7d:02:34:79:45:7a:a5:ef:54:fa:50: ee:e3:f5:a0:dd:3f:60:dd:92:0a:d8:91:7a:cc:b5:6e: c3:39:52:37:eb:17:fe:6c:64:a5:c1:15:c3:97:0c:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:3a:c1:a9:42:f0:58:b3:66:e9:e4:20:52:1c:ee:df: 80:08:26:ad:5b:98:f8:04:9e:7a:03:fc:f8:05:33:e8: 9a:db:1e:93:f8:bf:df:b7:07:ec:f7:e7:49:64:b1:51: 9c:7e:d0:74:31:f4:3e:60:7d:73:19:8b:11:26:96:c8: 99:8b:dd:a9:f4:1d:a1:95:fa:ec:db:73:b9:dd:23:02: 4f:9c:f4:c2:2d:14:e6:b5:a6:e8:0b:7d:ab:cb:95:19: b5:29:f0:af:21:ac:e9:85:7f:1b:05:a8:e7:6e:0f:a2: b6:12:1b:b3:69:ca:76:93:7f:bd:d2:02:de:1a:27:19: b6:bb:2c:7a:26:c3:e6:ca:5c:b7:13:7b:15:39:40:05: 33:51:0c:a9:8d:77:2e:ed:9a:a4:e9:7c:22:fb:54:a3: ac:1a:3e:7b:2e:bf:1e:18:3d:7d:52:31:54:ff:94:9d: 72:0c:5f:d9:38:66:2e:ba:b9:b7:9d:ff:2b:e4:ea:61: cf:10:dd:67:55:84:03:b8:c1:d0:0d:7c:7a:cc:6e:ee: 63:1a:44:06:5f:5f:5d:59:49:32:0b:ac:a5:5c:0d:3a: 24:ea:fd:5e:16:bc:b1:6a:1f:dd:57:97:66:06:7c:5b: d0:cc:34:27:96:76:49:29:2a:3e:55:03:5a:6b:f9:34 Fingerprint (SHA-256): E1:F8:24:23:CB:0A:DA:5A:92:3B:F2:D9:58:31:54:4D:C5:36:87:AB:E1:9D:6A:24:7D:C2:4B:F3:83:AC:CC:C7 Fingerprint (SHA1): C7:EE:84:EB:24:75:3E:E1:5A:58:08:59:A1:9A:BD:40:90:7F:78:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221104 (0x13162fb0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:13:11 2023 Not After : Mon Mar 20 22:13:11 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:22:68:ef:be:85:86:f1:76:69:aa:5c:00:29:48:dd: c5:ce:17:23:7f:77:94:6d:92:b3:2b:4c:b8:f3:49:b3: 8c:dc:e0:21:c4:80:83:34:ac:9d:8b:2b:9d:a0:8c:40: 73:7d:2a:e8:74:0d:5e:6c:c7:05:91:d1:37:1e:3b:1d: f9:74:27:4e:9c:bd:08:1e:77:4f:62:1f:6e:42:b2:f4: db:5a:ab:20:21:d4:04:a5:f6:be:0b:f7:75:de:22:90: 79:08:86:e5:4f:7b:3e:06:7c:f4:e1:0f:de:64:06:f2: 5f:82:86:5e:4c:93:ca:03:1d:76:ba:83:e7:7a:c1:62: d4:d1:1a:9c:a5:63:b3:25:84:8a:0c:ba:86:aa:36:da: d8:bc:5f:01:ed:bc:5b:22:8d:e4:03:2f:b7:cb:ee:bd: 3a:71:15:a0:d9:da:10:97:d3:24:25:a0:0d:25:2e:42: 87:5c:f6:8b:3d:47:61:22:4d:20:1c:1d:25:fa:c6:b3: 1b:0e:4a:ed:ad:2b:c6:b8:b3:08:97:22:ed:63:26:32: 8c:be:63:30:7e:b0:a4:61:04:09:84:c0:70:f4:ea:a2: e3:18:d5:a0:9a:4b:63:a9:d3:d9:ab:95:39:80:78:08: 58:38:df:99:84:c6:a8:e6:d6:4e:a7:88:be:3c:38:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:38:f2:cc:96:f9:22:70:92:e0:62:b0:99:04:b5:51: 75:2b:a5:f8:b0:e0:ab:15:04:23:63:9e:43:6e:10:b6: 4f:00:84:a0:15:3d:d0:26:2a:3a:5a:d4:8f:93:0c:ba: 37:72:b9:0a:87:ef:95:88:f3:c6:c5:10:29:36:50:66: 19:a2:63:82:a8:56:01:cd:ba:a6:4a:d0:fb:8d:ac:b9: 8d:2d:b6:e0:80:6c:ac:46:91:7b:b7:b0:1b:8b:b3:1f: 86:48:53:a0:fc:e6:c5:e0:56:1e:6e:fc:e4:55:ff:7f: 49:bc:dd:62:3e:12:dc:d7:f9:a6:26:9c:5c:56:60:1e: 2e:ee:0a:e7:ab:c3:8e:e9:be:30:0a:2d:e2:2e:57:a3: 3a:96:f0:82:25:e4:0f:b7:30:63:33:4c:c8:58:1b:6e: aa:c9:55:32:ec:ad:b7:dd:a4:6b:a6:e2:85:0f:3c:b4: 60:7c:52:39:fa:35:45:e3:23:65:ba:44:9f:b3:87:12: 9d:d0:04:5c:45:d5:0d:60:7e:3d:28:c7:57:66:a1:68: c8:57:3c:9a:dc:22:d7:c8:ea:06:d1:3d:eb:7e:5f:bc: d3:53:b4:e8:59:66:7b:d5:0c:29:ce:ad:f9:0d:ae:14: 44:00:bb:77:d4:1c:93:0c:cc:89:12:19:2f:24:d4:db Fingerprint (SHA-256): 01:CE:73:D2:B6:94:64:F2:47:D9:9E:1B:D2:07:73:56:B3:ED:8C:87:B5:E1:5B:26:59:2D:A5:AB:23:9B:93:FA Fingerprint (SHA1): 8F:C1:13:43:4B:97:74:8E:4E:B9:FE:DC:4A:2E:5C:ED:77:96:25:D6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221102 (0x13162fae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:07 2023 Not After : Mon Mar 20 22:13:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:e2:56:70:36:b9:29:ac:31:e9:59:f5:e2:28:2c:0f: df:c3:17:d0:cc:68:a8:77:3f:f9:8b:65:05:17:6a:af: 73:04:d5:b6:aa:42:41:ba:c3:07:16:05:96:d1:84:64: 10:11:49:3a:df:8e:3a:fe:ee:d4:ec:fc:d1:7f:b1:8b: 0b:85:4e:75:51:5c:bb:09:d8:e0:59:55:3f:6a:ed:9c: 41:23:83:36:6e:af:0b:6e:a7:cd:a2:1e:09:4c:12:e5: 95:28:48:aa:8d:20:d8:e5:54:b3:d4:58:51:0e:66:10: 47:d6:72:69:76:00:e9:67:ed:6e:8b:50:b7:87:a8:b8: 77:30:7d:df:74:b9:25:92:d5:c1:a9:99:37:4e:91:5a: c3:07:62:e7:f6:fa:91:34:ca:c2:86:ef:54:e4:0e:99: f2:8b:0f:4b:db:86:b7:b7:e4:cd:29:df:53:45:d6:75: f7:21:d0:dd:9f:f5:20:88:e3:e7:44:a3:f7:f9:c3:18: 18:e7:dc:b8:c4:b3:f5:50:cf:6c:c0:47:74:9e:e1:b7: 9d:22:74:f8:3a:d9:b0:72:e8:c7:7d:29:df:c7:bc:95: 16:0c:84:61:a4:74:15:db:f7:3f:f5:56:a7:87:76:0a: 86:d6:42:fc:01:e1:d8:d3:3c:da:79:b5:2a:b2:b6:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:00:19:e3:b2:5d:9b:ff:ae:f6:b9:d3:2a:7d:f3:1f: ac:6a:8a:6a:45:28:32:6e:b9:3a:29:97:31:49:fb:cb: 7b:07:45:3b:99:c0:2c:99:2d:ec:d8:93:ad:98:b7:ba: 79:22:b4:f8:03:00:a0:2f:d6:d8:29:52:ea:14:13:6a: 0c:43:d6:f5:a2:99:4f:80:3c:67:98:2d:1d:bd:de:16: d2:8a:a0:6d:cf:3c:59:8e:ff:02:b4:2d:b0:72:f2:30: f6:33:0c:b4:c9:67:67:bb:ee:98:fa:19:be:fb:4e:65: 9c:49:50:32:f4:3a:18:5b:6b:ca:3a:6d:da:3f:c1:1b: 08:7b:6d:73:e0:e7:a6:db:c6:e2:2c:b8:45:aa:fa:f0: 17:ec:bf:30:3e:66:a3:cf:6d:34:e5:f7:c9:d7:80:1d: d7:39:a8:54:4a:cd:5c:b9:0f:5e:47:c9:10:1a:e5:70: 3e:8b:26:5c:10:6b:84:99:7a:d8:f3:e6:e7:56:65:07: 83:e9:46:33:aa:51:7b:0c:ec:7d:8d:f8:2d:66:c6:d7: d7:a6:32:ec:a0:58:cd:fb:8a:fe:fc:9e:5d:64:99:fd: 09:e9:b5:93:3c:44:44:89:a2:e0:ac:16:7f:69:d8:5d: 95:2c:19:b1:cc:f6:b7:5e:89:fb:07:30:d2:f6:78:56 Fingerprint (SHA-256): 19:69:0A:79:E3:75:FA:BB:4F:93:AE:F8:2C:B8:85:78:1E:1D:5C:67:4E:17:93:4F:FC:C7:82:22:5A:51:32:86 Fingerprint (SHA1): E7:3A:7C:2C:9F:5B:07:24:60:23:7B:4D:32:36:CD:C1:B6:00:26:B7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221103 (0x13162faf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:09 2023 Not After : Mon Mar 20 22:13:09 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:10:4c:37:61:95:38:5e:cc:4e:c4:bf:f5:72:d5:ce: 1f:ce:6b:65:f5:94:49:3e:9f:fa:6e:ac:f4:0b:db:f5: 28:cd:84:22:15:35:3f:f0:44:0f:90:10:0d:fe:25:41: c7:c3:e3:80:03:c5:17:98:fa:cf:9c:e2:73:34:4c:2c: a3:84:4f:63:c5:1e:12:0b:0e:53:ca:cc:3c:55:e9:9c: d0:f6:e5:9e:00:d8:c4:09:36:cd:67:c6:93:ec:3f:34: 47:0b:3e:65:80:59:eb:3b:c2:17:91:60:d8:34:ad:aa: c5:94:4d:51:a1:d2:35:29:6e:c3:a2:ef:37:3a:64:3a: a1:20:48:ee:8a:9c:31:f1:54:26:77:75:1a:a0:db:c3: 45:68:3b:5d:78:97:38:49:dd:52:55:6f:1a:49:b1:e0: 21:fe:de:1c:be:52:30:c0:50:54:77:aa:9b:cc:94:6c: 6a:48:af:7e:bb:e5:a5:ed:28:ad:4f:63:55:b3:41:b9: 5e:00:a4:a4:57:2c:23:d8:99:07:f1:ab:1f:92:c4:91: 2b:af:a9:7a:ac:7d:02:34:79:45:7a:a5:ef:54:fa:50: ee:e3:f5:a0:dd:3f:60:dd:92:0a:d8:91:7a:cc:b5:6e: c3:39:52:37:eb:17:fe:6c:64:a5:c1:15:c3:97:0c:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:3a:c1:a9:42:f0:58:b3:66:e9:e4:20:52:1c:ee:df: 80:08:26:ad:5b:98:f8:04:9e:7a:03:fc:f8:05:33:e8: 9a:db:1e:93:f8:bf:df:b7:07:ec:f7:e7:49:64:b1:51: 9c:7e:d0:74:31:f4:3e:60:7d:73:19:8b:11:26:96:c8: 99:8b:dd:a9:f4:1d:a1:95:fa:ec:db:73:b9:dd:23:02: 4f:9c:f4:c2:2d:14:e6:b5:a6:e8:0b:7d:ab:cb:95:19: b5:29:f0:af:21:ac:e9:85:7f:1b:05:a8:e7:6e:0f:a2: b6:12:1b:b3:69:ca:76:93:7f:bd:d2:02:de:1a:27:19: b6:bb:2c:7a:26:c3:e6:ca:5c:b7:13:7b:15:39:40:05: 33:51:0c:a9:8d:77:2e:ed:9a:a4:e9:7c:22:fb:54:a3: ac:1a:3e:7b:2e:bf:1e:18:3d:7d:52:31:54:ff:94:9d: 72:0c:5f:d9:38:66:2e:ba:b9:b7:9d:ff:2b:e4:ea:61: cf:10:dd:67:55:84:03:b8:c1:d0:0d:7c:7a:cc:6e:ee: 63:1a:44:06:5f:5f:5d:59:49:32:0b:ac:a5:5c:0d:3a: 24:ea:fd:5e:16:bc:b1:6a:1f:dd:57:97:66:06:7c:5b: d0:cc:34:27:96:76:49:29:2a:3e:55:03:5a:6b:f9:34 Fingerprint (SHA-256): E1:F8:24:23:CB:0A:DA:5A:92:3B:F2:D9:58:31:54:4D:C5:36:87:AB:E1:9D:6A:24:7D:C2:4B:F3:83:AC:CC:C7 Fingerprint (SHA1): C7:EE:84:EB:24:75:3E:E1:5A:58:08:59:A1:9A:BD:40:90:7F:78:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221104 (0x13162fb0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:13:11 2023 Not After : Mon Mar 20 22:13:11 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:22:68:ef:be:85:86:f1:76:69:aa:5c:00:29:48:dd: c5:ce:17:23:7f:77:94:6d:92:b3:2b:4c:b8:f3:49:b3: 8c:dc:e0:21:c4:80:83:34:ac:9d:8b:2b:9d:a0:8c:40: 73:7d:2a:e8:74:0d:5e:6c:c7:05:91:d1:37:1e:3b:1d: f9:74:27:4e:9c:bd:08:1e:77:4f:62:1f:6e:42:b2:f4: db:5a:ab:20:21:d4:04:a5:f6:be:0b:f7:75:de:22:90: 79:08:86:e5:4f:7b:3e:06:7c:f4:e1:0f:de:64:06:f2: 5f:82:86:5e:4c:93:ca:03:1d:76:ba:83:e7:7a:c1:62: d4:d1:1a:9c:a5:63:b3:25:84:8a:0c:ba:86:aa:36:da: d8:bc:5f:01:ed:bc:5b:22:8d:e4:03:2f:b7:cb:ee:bd: 3a:71:15:a0:d9:da:10:97:d3:24:25:a0:0d:25:2e:42: 87:5c:f6:8b:3d:47:61:22:4d:20:1c:1d:25:fa:c6:b3: 1b:0e:4a:ed:ad:2b:c6:b8:b3:08:97:22:ed:63:26:32: 8c:be:63:30:7e:b0:a4:61:04:09:84:c0:70:f4:ea:a2: e3:18:d5:a0:9a:4b:63:a9:d3:d9:ab:95:39:80:78:08: 58:38:df:99:84:c6:a8:e6:d6:4e:a7:88:be:3c:38:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:38:f2:cc:96:f9:22:70:92:e0:62:b0:99:04:b5:51: 75:2b:a5:f8:b0:e0:ab:15:04:23:63:9e:43:6e:10:b6: 4f:00:84:a0:15:3d:d0:26:2a:3a:5a:d4:8f:93:0c:ba: 37:72:b9:0a:87:ef:95:88:f3:c6:c5:10:29:36:50:66: 19:a2:63:82:a8:56:01:cd:ba:a6:4a:d0:fb:8d:ac:b9: 8d:2d:b6:e0:80:6c:ac:46:91:7b:b7:b0:1b:8b:b3:1f: 86:48:53:a0:fc:e6:c5:e0:56:1e:6e:fc:e4:55:ff:7f: 49:bc:dd:62:3e:12:dc:d7:f9:a6:26:9c:5c:56:60:1e: 2e:ee:0a:e7:ab:c3:8e:e9:be:30:0a:2d:e2:2e:57:a3: 3a:96:f0:82:25:e4:0f:b7:30:63:33:4c:c8:58:1b:6e: aa:c9:55:32:ec:ad:b7:dd:a4:6b:a6:e2:85:0f:3c:b4: 60:7c:52:39:fa:35:45:e3:23:65:ba:44:9f:b3:87:12: 9d:d0:04:5c:45:d5:0d:60:7e:3d:28:c7:57:66:a1:68: c8:57:3c:9a:dc:22:d7:c8:ea:06:d1:3d:eb:7e:5f:bc: d3:53:b4:e8:59:66:7b:d5:0c:29:ce:ad:f9:0d:ae:14: 44:00:bb:77:d4:1c:93:0c:cc:89:12:19:2f:24:d4:db Fingerprint (SHA-256): 01:CE:73:D2:B6:94:64:F2:47:D9:9E:1B:D2:07:73:56:B3:ED:8C:87:B5:E1:5B:26:59:2D:A5:AB:23:9B:93:FA Fingerprint (SHA1): 8F:C1:13:43:4B:97:74:8E:4E:B9:FE:DC:4A:2E:5C:ED:77:96:25:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221106 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221107 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221108 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320221109 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320221110 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221106 (0x13162fb2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:17 2023 Not After : Mon Mar 20 22:13:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:1f:e8:27:cf:d6:06:66:48:3a:92:51:b6:8a:31:85: ea:ff:4b:8b:51:ae:e9:e7:00:4e:05:e9:b7:a2:d2:77: 27:86:04:86:d3:70:3d:2b:60:d5:a2:de:b6:1c:da:9e: 24:cf:73:03:8f:c1:5b:07:92:2e:c6:c6:6b:7d:b2:82: 56:4a:d5:f0:38:4e:31:75:0a:fe:a0:c5:d6:a7:68:6b: 76:01:3a:fe:13:f8:3a:15:d8:a3:f5:b8:8a:6d:cf:80: 58:6c:50:8d:96:0f:0d:9c:e0:a7:63:2d:cf:c2:f2:05: 75:aa:75:14:6d:84:90:03:31:cb:b0:64:4e:64:61:b6: 79:91:5d:4f:f8:11:83:9d:eb:54:6c:df:48:e6:f5:f7: 95:53:d8:fd:9d:ba:c7:8f:c3:8c:41:26:54:4c:21:11: 1f:81:33:58:d4:b1:d1:30:6e:87:e0:85:8b:cc:42:39: f9:57:ba:9f:0a:39:c9:f9:42:58:af:b3:3d:06:4d:a0: ea:78:33:19:66:ef:2b:dc:5e:c7:a1:24:30:8b:4b:cb: d9:aa:85:d6:76:79:11:1f:a3:c0:d6:13:ec:64:58:5f: e7:da:63:55:c9:e0:34:1c:b1:0c:0d:4c:db:58:38:e1: 1e:dd:eb:bf:a6:e0:2c:cf:a2:04:44:84:82:d2:e3:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:e7:4f:6d:4d:50:40:cb:b8:c8:d4:e8:50:39:98:1f: a9:26:ee:5c:fa:3e:b1:af:4c:5d:f8:b9:b0:a2:29:07: 35:a4:1c:fd:cc:2d:94:c1:f7:05:0f:50:4e:5b:42:3b: 30:10:e3:99:ec:6b:65:ac:7f:32:87:c7:1f:12:ac:62: 8c:89:62:d1:f2:3f:ea:ec:91:64:ca:fd:ed:25:3f:2c: c7:2b:9f:95:dd:f2:77:66:61:ce:fd:6a:cc:83:90:26: 7b:9c:bb:76:fc:f3:ff:9e:a4:c3:52:7b:0d:f3:90:20: ab:e2:1c:86:2c:3c:98:b7:08:8f:d7:88:c8:19:1f:5d: f1:e7:04:8b:e0:64:0e:63:b3:65:cd:b8:f0:ab:92:e3: 1e:0a:02:ea:18:48:ce:60:3b:91:6a:aa:25:b5:62:6a: 5f:7c:e1:22:ca:f3:f3:7c:50:19:53:51:1d:4c:6f:a3: 4c:30:7c:45:07:34:f6:b4:52:3f:0c:51:2e:a5:5d:fb: c5:91:47:92:55:c4:f7:e6:7a:f1:ab:76:7f:bf:b5:d5: 9e:2b:03:5e:7c:e8:04:8d:2f:66:e9:36:38:85:5c:49: 1b:54:c6:ea:8e:bc:0b:d2:fd:f2:0b:09:28:99:98:fb: 0a:de:f5:06:5b:ab:ce:85:ee:9e:b9:6a:65:f0:76:89 Fingerprint (SHA-256): 9B:3F:29:2F:B7:9D:15:4C:4B:00:D4:9D:3E:CA:9F:E7:D9:37:4B:DC:E1:CF:68:6F:9E:F2:95:A4:97:81:59:0D Fingerprint (SHA1): 5F:91:3E:84:69:D2:28:CA:CF:E0:29:A9:45:AE:28:73:10:43:9F:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221107 (0x13162fb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:18 2023 Not After : Mon Mar 20 22:13:18 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:29:13:6d:5d:05:13:ae:34:73:a1:7a:57:c3:53:5c: dc:69:0d:a6:67:b9:61:b0:75:81:3d:4c:a1:b5:b8:71: de:e9:9b:c1:21:56:61:66:39:a5:05:d9:09:6d:9c:29: df:27:65:ba:9e:58:d9:a1:60:5b:8a:3f:6e:bd:31:04: 9a:fe:12:f3:0a:82:d6:f4:95:dc:d3:57:dc:ad:f7:e4: ab:a2:35:d5:3c:cd:20:cf:5c:24:b7:37:04:fe:b2:2c: 10:5d:24:79:5f:3e:37:95:1a:fe:01:3f:5b:73:c5:46: a3:f7:7b:41:75:72:49:6b:74:8c:87:b1:e9:a5:08:76: 98:4d:5b:52:61:8b:29:b7:ca:8b:c0:bc:4e:b5:65:94: 9d:e4:af:55:4d:de:b0:ca:23:7c:6e:35:72:d9:58:f2: 86:9d:57:56:89:6f:68:1a:31:dd:45:68:4d:fa:2b:ec: fd:cf:24:44:41:a2:05:a8:ef:8d:77:31:73:00:20:2e: 27:a8:bb:97:0e:8a:ae:db:90:36:26:cd:5f:2b:c8:4a: f9:d8:07:23:38:be:a1:c3:76:a5:79:05:07:0c:13:58: 36:94:ab:25:a8:dc:8a:31:90:a0:fd:ec:9a:76:da:77: c9:6b:2c:ed:8f:66:46:36:f5:1e:78:5c:e4:8a:6e:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:af:e1:d7:4a:d3:57:43:48:ba:eb:dc:2f:fe:26:67: 4a:b2:c1:05:46:25:09:5f:e7:ca:f2:8b:72:fd:96:37: 11:ad:ce:11:94:9a:00:b1:93:3e:9c:a2:ba:0b:c5:05: b8:35:09:15:9d:aa:5b:d6:a9:a9:99:3e:d2:a6:89:f2: 1d:c4:0e:93:60:c2:39:e7:e1:6c:82:af:3d:72:a3:7c: 39:00:26:76:06:77:a7:7e:07:e9:32:8a:11:d8:9a:99: 2b:f0:bc:b6:58:8a:cc:19:f5:75:64:ac:e3:02:6d:36: b6:3c:5c:03:60:85:c7:66:b0:e3:e6:64:b7:c2:c6:88: 87:99:84:14:51:9c:d1:91:49:91:01:32:78:d3:a0:e8: 43:a4:a1:12:e4:73:5e:01:ac:b5:ae:c5:84:0e:0c:d7: fa:03:c6:25:57:6f:e7:60:90:80:81:d6:25:73:da:a9: 80:81:16:07:cb:2d:c8:d3:13:1a:7b:30:b1:f0:62:7f: e0:ec:65:2a:f9:64:c0:f6:e7:d2:94:ab:af:49:1c:d1: 3c:a1:21:f8:5c:98:bb:e6:3f:7a:89:90:0a:fb:39:5e: 1f:fb:ac:0f:0d:62:c1:ff:23:7b:aa:2b:2a:62:b6:31: cb:6d:78:71:62:34:bf:04:ae:c4:dd:50:cf:f0:93:eb Fingerprint (SHA-256): C8:69:1B:E3:1F:EC:EE:36:B4:EE:E6:16:6D:A9:D0:DD:4D:3A:09:0F:BE:3A:53:1B:48:4E:80:B7:DD:43:D6:61 Fingerprint (SHA1): 2E:EC:63:FA:21:A1:7D:CC:FD:61:79:6F:61:B9:43:49:83:B6:90:58 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221108 (0x13162fb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:13:19 2023 Not After : Mon Mar 20 22:13:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:b7:93:ba:6a:e8:57:73:e6:c1:47:13:50:b9:ef:f1: 51:ad:2e:cc:c8:f1:b7:b6:62:8c:ad:e2:1c:90:d6:2d: 88:85:a1:87:e9:b8:3f:cc:72:79:24:73:11:84:0a:9f: 86:20:ef:06:73:fd:64:a6:88:0e:f1:42:e6:b7:4b:ad: c4:06:2b:c8:09:88:05:67:62:11:b4:24:bb:cc:c4:01: fd:f4:b7:b9:a4:15:38:3b:7e:ee:c3:3b:40:7b:6d:b0: 90:2c:79:b0:ed:ea:45:4c:35:da:3d:a3:f4:35:fc:95: b4:b4:8a:dd:d7:bc:4e:e8:a2:9d:40:68:7c:4b:a0:fd: c8:2e:18:04:eb:06:9e:47:72:c3:29:c2:bf:8d:0b:d7: d7:53:00:e6:a9:d3:59:b7:e4:d8:f4:a8:4f:95:f2:ab: 3b:10:bc:1e:54:1c:f0:5a:2b:27:98:d1:c5:0a:1d:68: e0:57:01:cf:3f:d4:5d:e9:10:eb:fb:ca:56:42:b3:d4: 9e:a6:07:80:87:8e:75:07:33:2a:98:8d:a8:d5:cc:b5: 49:91:9b:a0:2d:05:9f:ab:58:71:5d:15:ce:ea:cb:c3: 54:7e:71:2e:85:21:f5:c2:7c:d7:c4:f8:5e:4b:37:ec: aa:b3:f8:40:5d:a5:65:d6:7d:ad:97:83:32:70:f4:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:82:ec:0b:44:de:2b:cf:00:75:38:e6:b1:89:f5:4d: 32:0d:5c:06:02:11:fe:fa:0b:6b:68:05:ee:a7:26:70: ed:57:40:3b:dc:f2:82:9d:b2:8e:8d:d7:75:c8:e9:a0: c5:cd:b1:92:35:fb:6e:ab:5c:b7:98:00:82:17:b0:03: 9b:49:20:7b:c5:5b:0b:37:64:1d:85:63:b9:92:4e:9c: 74:51:d2:74:a9:ce:35:a6:5b:70:b6:3a:af:d8:93:56: 56:5a:86:c1:84:40:25:67:b7:60:51:1e:f1:13:e3:9a: 94:c9:ee:74:82:e7:4a:38:90:ef:29:0d:0b:bc:48:67: 73:3d:93:4e:29:ff:08:22:1f:df:ef:db:b1:fc:26:25: aa:a4:98:3f:b4:9f:2a:4a:af:09:4d:d4:2a:37:8d:c1: 4d:0b:eb:8f:87:18:76:99:e4:70:4b:6b:11:11:1e:c6: ae:56:29:b4:d3:21:68:93:1d:70:c6:8a:33:23:5f:9f: ba:e0:ff:40:72:51:ed:ba:61:f0:02:be:15:1c:01:9f: c7:3f:41:c3:72:e5:19:e6:71:1c:66:2e:ca:53:ed:80: 44:10:10:09:0f:fa:0c:33:9f:c1:88:30:5b:d4:5b:c8: e8:a8:f1:9b:7d:ff:aa:8f:82:00:71:68:c8:50:48:0d Fingerprint (SHA-256): CC:3A:7B:D8:7A:53:6C:AF:B5:50:EE:BA:C2:0E:70:D1:06:1D:A1:0A:32:E1:02:C5:D4:4F:5B:CE:D3:0C:18:26 Fingerprint (SHA1): 1A:8D:56:CF:DA:54:80:8A:BC:BB:CF:B4:23:DD:68:9D:AE:85:E2:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221106 (0x13162fb2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:17 2023 Not After : Mon Mar 20 22:13:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:1f:e8:27:cf:d6:06:66:48:3a:92:51:b6:8a:31:85: ea:ff:4b:8b:51:ae:e9:e7:00:4e:05:e9:b7:a2:d2:77: 27:86:04:86:d3:70:3d:2b:60:d5:a2:de:b6:1c:da:9e: 24:cf:73:03:8f:c1:5b:07:92:2e:c6:c6:6b:7d:b2:82: 56:4a:d5:f0:38:4e:31:75:0a:fe:a0:c5:d6:a7:68:6b: 76:01:3a:fe:13:f8:3a:15:d8:a3:f5:b8:8a:6d:cf:80: 58:6c:50:8d:96:0f:0d:9c:e0:a7:63:2d:cf:c2:f2:05: 75:aa:75:14:6d:84:90:03:31:cb:b0:64:4e:64:61:b6: 79:91:5d:4f:f8:11:83:9d:eb:54:6c:df:48:e6:f5:f7: 95:53:d8:fd:9d:ba:c7:8f:c3:8c:41:26:54:4c:21:11: 1f:81:33:58:d4:b1:d1:30:6e:87:e0:85:8b:cc:42:39: f9:57:ba:9f:0a:39:c9:f9:42:58:af:b3:3d:06:4d:a0: ea:78:33:19:66:ef:2b:dc:5e:c7:a1:24:30:8b:4b:cb: d9:aa:85:d6:76:79:11:1f:a3:c0:d6:13:ec:64:58:5f: e7:da:63:55:c9:e0:34:1c:b1:0c:0d:4c:db:58:38:e1: 1e:dd:eb:bf:a6:e0:2c:cf:a2:04:44:84:82:d2:e3:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:e7:4f:6d:4d:50:40:cb:b8:c8:d4:e8:50:39:98:1f: a9:26:ee:5c:fa:3e:b1:af:4c:5d:f8:b9:b0:a2:29:07: 35:a4:1c:fd:cc:2d:94:c1:f7:05:0f:50:4e:5b:42:3b: 30:10:e3:99:ec:6b:65:ac:7f:32:87:c7:1f:12:ac:62: 8c:89:62:d1:f2:3f:ea:ec:91:64:ca:fd:ed:25:3f:2c: c7:2b:9f:95:dd:f2:77:66:61:ce:fd:6a:cc:83:90:26: 7b:9c:bb:76:fc:f3:ff:9e:a4:c3:52:7b:0d:f3:90:20: ab:e2:1c:86:2c:3c:98:b7:08:8f:d7:88:c8:19:1f:5d: f1:e7:04:8b:e0:64:0e:63:b3:65:cd:b8:f0:ab:92:e3: 1e:0a:02:ea:18:48:ce:60:3b:91:6a:aa:25:b5:62:6a: 5f:7c:e1:22:ca:f3:f3:7c:50:19:53:51:1d:4c:6f:a3: 4c:30:7c:45:07:34:f6:b4:52:3f:0c:51:2e:a5:5d:fb: c5:91:47:92:55:c4:f7:e6:7a:f1:ab:76:7f:bf:b5:d5: 9e:2b:03:5e:7c:e8:04:8d:2f:66:e9:36:38:85:5c:49: 1b:54:c6:ea:8e:bc:0b:d2:fd:f2:0b:09:28:99:98:fb: 0a:de:f5:06:5b:ab:ce:85:ee:9e:b9:6a:65:f0:76:89 Fingerprint (SHA-256): 9B:3F:29:2F:B7:9D:15:4C:4B:00:D4:9D:3E:CA:9F:E7:D9:37:4B:DC:E1:CF:68:6F:9E:F2:95:A4:97:81:59:0D Fingerprint (SHA1): 5F:91:3E:84:69:D2:28:CA:CF:E0:29:A9:45:AE:28:73:10:43:9F:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221107 (0x13162fb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:18 2023 Not After : Mon Mar 20 22:13:18 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:29:13:6d:5d:05:13:ae:34:73:a1:7a:57:c3:53:5c: dc:69:0d:a6:67:b9:61:b0:75:81:3d:4c:a1:b5:b8:71: de:e9:9b:c1:21:56:61:66:39:a5:05:d9:09:6d:9c:29: df:27:65:ba:9e:58:d9:a1:60:5b:8a:3f:6e:bd:31:04: 9a:fe:12:f3:0a:82:d6:f4:95:dc:d3:57:dc:ad:f7:e4: ab:a2:35:d5:3c:cd:20:cf:5c:24:b7:37:04:fe:b2:2c: 10:5d:24:79:5f:3e:37:95:1a:fe:01:3f:5b:73:c5:46: a3:f7:7b:41:75:72:49:6b:74:8c:87:b1:e9:a5:08:76: 98:4d:5b:52:61:8b:29:b7:ca:8b:c0:bc:4e:b5:65:94: 9d:e4:af:55:4d:de:b0:ca:23:7c:6e:35:72:d9:58:f2: 86:9d:57:56:89:6f:68:1a:31:dd:45:68:4d:fa:2b:ec: fd:cf:24:44:41:a2:05:a8:ef:8d:77:31:73:00:20:2e: 27:a8:bb:97:0e:8a:ae:db:90:36:26:cd:5f:2b:c8:4a: f9:d8:07:23:38:be:a1:c3:76:a5:79:05:07:0c:13:58: 36:94:ab:25:a8:dc:8a:31:90:a0:fd:ec:9a:76:da:77: c9:6b:2c:ed:8f:66:46:36:f5:1e:78:5c:e4:8a:6e:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:af:e1:d7:4a:d3:57:43:48:ba:eb:dc:2f:fe:26:67: 4a:b2:c1:05:46:25:09:5f:e7:ca:f2:8b:72:fd:96:37: 11:ad:ce:11:94:9a:00:b1:93:3e:9c:a2:ba:0b:c5:05: b8:35:09:15:9d:aa:5b:d6:a9:a9:99:3e:d2:a6:89:f2: 1d:c4:0e:93:60:c2:39:e7:e1:6c:82:af:3d:72:a3:7c: 39:00:26:76:06:77:a7:7e:07:e9:32:8a:11:d8:9a:99: 2b:f0:bc:b6:58:8a:cc:19:f5:75:64:ac:e3:02:6d:36: b6:3c:5c:03:60:85:c7:66:b0:e3:e6:64:b7:c2:c6:88: 87:99:84:14:51:9c:d1:91:49:91:01:32:78:d3:a0:e8: 43:a4:a1:12:e4:73:5e:01:ac:b5:ae:c5:84:0e:0c:d7: fa:03:c6:25:57:6f:e7:60:90:80:81:d6:25:73:da:a9: 80:81:16:07:cb:2d:c8:d3:13:1a:7b:30:b1:f0:62:7f: e0:ec:65:2a:f9:64:c0:f6:e7:d2:94:ab:af:49:1c:d1: 3c:a1:21:f8:5c:98:bb:e6:3f:7a:89:90:0a:fb:39:5e: 1f:fb:ac:0f:0d:62:c1:ff:23:7b:aa:2b:2a:62:b6:31: cb:6d:78:71:62:34:bf:04:ae:c4:dd:50:cf:f0:93:eb Fingerprint (SHA-256): C8:69:1B:E3:1F:EC:EE:36:B4:EE:E6:16:6D:A9:D0:DD:4D:3A:09:0F:BE:3A:53:1B:48:4E:80:B7:DD:43:D6:61 Fingerprint (SHA1): 2E:EC:63:FA:21:A1:7D:CC:FD:61:79:6F:61:B9:43:49:83:B6:90:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221108 (0x13162fb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:13:19 2023 Not After : Mon Mar 20 22:13:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:b7:93:ba:6a:e8:57:73:e6:c1:47:13:50:b9:ef:f1: 51:ad:2e:cc:c8:f1:b7:b6:62:8c:ad:e2:1c:90:d6:2d: 88:85:a1:87:e9:b8:3f:cc:72:79:24:73:11:84:0a:9f: 86:20:ef:06:73:fd:64:a6:88:0e:f1:42:e6:b7:4b:ad: c4:06:2b:c8:09:88:05:67:62:11:b4:24:bb:cc:c4:01: fd:f4:b7:b9:a4:15:38:3b:7e:ee:c3:3b:40:7b:6d:b0: 90:2c:79:b0:ed:ea:45:4c:35:da:3d:a3:f4:35:fc:95: b4:b4:8a:dd:d7:bc:4e:e8:a2:9d:40:68:7c:4b:a0:fd: c8:2e:18:04:eb:06:9e:47:72:c3:29:c2:bf:8d:0b:d7: d7:53:00:e6:a9:d3:59:b7:e4:d8:f4:a8:4f:95:f2:ab: 3b:10:bc:1e:54:1c:f0:5a:2b:27:98:d1:c5:0a:1d:68: e0:57:01:cf:3f:d4:5d:e9:10:eb:fb:ca:56:42:b3:d4: 9e:a6:07:80:87:8e:75:07:33:2a:98:8d:a8:d5:cc:b5: 49:91:9b:a0:2d:05:9f:ab:58:71:5d:15:ce:ea:cb:c3: 54:7e:71:2e:85:21:f5:c2:7c:d7:c4:f8:5e:4b:37:ec: aa:b3:f8:40:5d:a5:65:d6:7d:ad:97:83:32:70:f4:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:82:ec:0b:44:de:2b:cf:00:75:38:e6:b1:89:f5:4d: 32:0d:5c:06:02:11:fe:fa:0b:6b:68:05:ee:a7:26:70: ed:57:40:3b:dc:f2:82:9d:b2:8e:8d:d7:75:c8:e9:a0: c5:cd:b1:92:35:fb:6e:ab:5c:b7:98:00:82:17:b0:03: 9b:49:20:7b:c5:5b:0b:37:64:1d:85:63:b9:92:4e:9c: 74:51:d2:74:a9:ce:35:a6:5b:70:b6:3a:af:d8:93:56: 56:5a:86:c1:84:40:25:67:b7:60:51:1e:f1:13:e3:9a: 94:c9:ee:74:82:e7:4a:38:90:ef:29:0d:0b:bc:48:67: 73:3d:93:4e:29:ff:08:22:1f:df:ef:db:b1:fc:26:25: aa:a4:98:3f:b4:9f:2a:4a:af:09:4d:d4:2a:37:8d:c1: 4d:0b:eb:8f:87:18:76:99:e4:70:4b:6b:11:11:1e:c6: ae:56:29:b4:d3:21:68:93:1d:70:c6:8a:33:23:5f:9f: ba:e0:ff:40:72:51:ed:ba:61:f0:02:be:15:1c:01:9f: c7:3f:41:c3:72:e5:19:e6:71:1c:66:2e:ca:53:ed:80: 44:10:10:09:0f:fa:0c:33:9f:c1:88:30:5b:d4:5b:c8: e8:a8:f1:9b:7d:ff:aa:8f:82:00:71:68:c8:50:48:0d Fingerprint (SHA-256): CC:3A:7B:D8:7A:53:6C:AF:B5:50:EE:BA:C2:0E:70:D1:06:1D:A1:0A:32:E1:02:C5:D4:4F:5B:CE:D3:0C:18:26 Fingerprint (SHA1): 1A:8D:56:CF:DA:54:80:8A:BC:BB:CF:B4:23:DD:68:9D:AE:85:E2:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221106 (0x13162fb2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:17 2023 Not After : Mon Mar 20 22:13:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:1f:e8:27:cf:d6:06:66:48:3a:92:51:b6:8a:31:85: ea:ff:4b:8b:51:ae:e9:e7:00:4e:05:e9:b7:a2:d2:77: 27:86:04:86:d3:70:3d:2b:60:d5:a2:de:b6:1c:da:9e: 24:cf:73:03:8f:c1:5b:07:92:2e:c6:c6:6b:7d:b2:82: 56:4a:d5:f0:38:4e:31:75:0a:fe:a0:c5:d6:a7:68:6b: 76:01:3a:fe:13:f8:3a:15:d8:a3:f5:b8:8a:6d:cf:80: 58:6c:50:8d:96:0f:0d:9c:e0:a7:63:2d:cf:c2:f2:05: 75:aa:75:14:6d:84:90:03:31:cb:b0:64:4e:64:61:b6: 79:91:5d:4f:f8:11:83:9d:eb:54:6c:df:48:e6:f5:f7: 95:53:d8:fd:9d:ba:c7:8f:c3:8c:41:26:54:4c:21:11: 1f:81:33:58:d4:b1:d1:30:6e:87:e0:85:8b:cc:42:39: f9:57:ba:9f:0a:39:c9:f9:42:58:af:b3:3d:06:4d:a0: ea:78:33:19:66:ef:2b:dc:5e:c7:a1:24:30:8b:4b:cb: d9:aa:85:d6:76:79:11:1f:a3:c0:d6:13:ec:64:58:5f: e7:da:63:55:c9:e0:34:1c:b1:0c:0d:4c:db:58:38:e1: 1e:dd:eb:bf:a6:e0:2c:cf:a2:04:44:84:82:d2:e3:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:e7:4f:6d:4d:50:40:cb:b8:c8:d4:e8:50:39:98:1f: a9:26:ee:5c:fa:3e:b1:af:4c:5d:f8:b9:b0:a2:29:07: 35:a4:1c:fd:cc:2d:94:c1:f7:05:0f:50:4e:5b:42:3b: 30:10:e3:99:ec:6b:65:ac:7f:32:87:c7:1f:12:ac:62: 8c:89:62:d1:f2:3f:ea:ec:91:64:ca:fd:ed:25:3f:2c: c7:2b:9f:95:dd:f2:77:66:61:ce:fd:6a:cc:83:90:26: 7b:9c:bb:76:fc:f3:ff:9e:a4:c3:52:7b:0d:f3:90:20: ab:e2:1c:86:2c:3c:98:b7:08:8f:d7:88:c8:19:1f:5d: f1:e7:04:8b:e0:64:0e:63:b3:65:cd:b8:f0:ab:92:e3: 1e:0a:02:ea:18:48:ce:60:3b:91:6a:aa:25:b5:62:6a: 5f:7c:e1:22:ca:f3:f3:7c:50:19:53:51:1d:4c:6f:a3: 4c:30:7c:45:07:34:f6:b4:52:3f:0c:51:2e:a5:5d:fb: c5:91:47:92:55:c4:f7:e6:7a:f1:ab:76:7f:bf:b5:d5: 9e:2b:03:5e:7c:e8:04:8d:2f:66:e9:36:38:85:5c:49: 1b:54:c6:ea:8e:bc:0b:d2:fd:f2:0b:09:28:99:98:fb: 0a:de:f5:06:5b:ab:ce:85:ee:9e:b9:6a:65:f0:76:89 Fingerprint (SHA-256): 9B:3F:29:2F:B7:9D:15:4C:4B:00:D4:9D:3E:CA:9F:E7:D9:37:4B:DC:E1:CF:68:6F:9E:F2:95:A4:97:81:59:0D Fingerprint (SHA1): 5F:91:3E:84:69:D2:28:CA:CF:E0:29:A9:45:AE:28:73:10:43:9F:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221106 (0x13162fb2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:17 2023 Not After : Mon Mar 20 22:13:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:1f:e8:27:cf:d6:06:66:48:3a:92:51:b6:8a:31:85: ea:ff:4b:8b:51:ae:e9:e7:00:4e:05:e9:b7:a2:d2:77: 27:86:04:86:d3:70:3d:2b:60:d5:a2:de:b6:1c:da:9e: 24:cf:73:03:8f:c1:5b:07:92:2e:c6:c6:6b:7d:b2:82: 56:4a:d5:f0:38:4e:31:75:0a:fe:a0:c5:d6:a7:68:6b: 76:01:3a:fe:13:f8:3a:15:d8:a3:f5:b8:8a:6d:cf:80: 58:6c:50:8d:96:0f:0d:9c:e0:a7:63:2d:cf:c2:f2:05: 75:aa:75:14:6d:84:90:03:31:cb:b0:64:4e:64:61:b6: 79:91:5d:4f:f8:11:83:9d:eb:54:6c:df:48:e6:f5:f7: 95:53:d8:fd:9d:ba:c7:8f:c3:8c:41:26:54:4c:21:11: 1f:81:33:58:d4:b1:d1:30:6e:87:e0:85:8b:cc:42:39: f9:57:ba:9f:0a:39:c9:f9:42:58:af:b3:3d:06:4d:a0: ea:78:33:19:66:ef:2b:dc:5e:c7:a1:24:30:8b:4b:cb: d9:aa:85:d6:76:79:11:1f:a3:c0:d6:13:ec:64:58:5f: e7:da:63:55:c9:e0:34:1c:b1:0c:0d:4c:db:58:38:e1: 1e:dd:eb:bf:a6:e0:2c:cf:a2:04:44:84:82:d2:e3:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:e7:4f:6d:4d:50:40:cb:b8:c8:d4:e8:50:39:98:1f: a9:26:ee:5c:fa:3e:b1:af:4c:5d:f8:b9:b0:a2:29:07: 35:a4:1c:fd:cc:2d:94:c1:f7:05:0f:50:4e:5b:42:3b: 30:10:e3:99:ec:6b:65:ac:7f:32:87:c7:1f:12:ac:62: 8c:89:62:d1:f2:3f:ea:ec:91:64:ca:fd:ed:25:3f:2c: c7:2b:9f:95:dd:f2:77:66:61:ce:fd:6a:cc:83:90:26: 7b:9c:bb:76:fc:f3:ff:9e:a4:c3:52:7b:0d:f3:90:20: ab:e2:1c:86:2c:3c:98:b7:08:8f:d7:88:c8:19:1f:5d: f1:e7:04:8b:e0:64:0e:63:b3:65:cd:b8:f0:ab:92:e3: 1e:0a:02:ea:18:48:ce:60:3b:91:6a:aa:25:b5:62:6a: 5f:7c:e1:22:ca:f3:f3:7c:50:19:53:51:1d:4c:6f:a3: 4c:30:7c:45:07:34:f6:b4:52:3f:0c:51:2e:a5:5d:fb: c5:91:47:92:55:c4:f7:e6:7a:f1:ab:76:7f:bf:b5:d5: 9e:2b:03:5e:7c:e8:04:8d:2f:66:e9:36:38:85:5c:49: 1b:54:c6:ea:8e:bc:0b:d2:fd:f2:0b:09:28:99:98:fb: 0a:de:f5:06:5b:ab:ce:85:ee:9e:b9:6a:65:f0:76:89 Fingerprint (SHA-256): 9B:3F:29:2F:B7:9D:15:4C:4B:00:D4:9D:3E:CA:9F:E7:D9:37:4B:DC:E1:CF:68:6F:9E:F2:95:A4:97:81:59:0D Fingerprint (SHA1): 5F:91:3E:84:69:D2:28:CA:CF:E0:29:A9:45:AE:28:73:10:43:9F:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221107 (0x13162fb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:18 2023 Not After : Mon Mar 20 22:13:18 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:29:13:6d:5d:05:13:ae:34:73:a1:7a:57:c3:53:5c: dc:69:0d:a6:67:b9:61:b0:75:81:3d:4c:a1:b5:b8:71: de:e9:9b:c1:21:56:61:66:39:a5:05:d9:09:6d:9c:29: df:27:65:ba:9e:58:d9:a1:60:5b:8a:3f:6e:bd:31:04: 9a:fe:12:f3:0a:82:d6:f4:95:dc:d3:57:dc:ad:f7:e4: ab:a2:35:d5:3c:cd:20:cf:5c:24:b7:37:04:fe:b2:2c: 10:5d:24:79:5f:3e:37:95:1a:fe:01:3f:5b:73:c5:46: a3:f7:7b:41:75:72:49:6b:74:8c:87:b1:e9:a5:08:76: 98:4d:5b:52:61:8b:29:b7:ca:8b:c0:bc:4e:b5:65:94: 9d:e4:af:55:4d:de:b0:ca:23:7c:6e:35:72:d9:58:f2: 86:9d:57:56:89:6f:68:1a:31:dd:45:68:4d:fa:2b:ec: fd:cf:24:44:41:a2:05:a8:ef:8d:77:31:73:00:20:2e: 27:a8:bb:97:0e:8a:ae:db:90:36:26:cd:5f:2b:c8:4a: f9:d8:07:23:38:be:a1:c3:76:a5:79:05:07:0c:13:58: 36:94:ab:25:a8:dc:8a:31:90:a0:fd:ec:9a:76:da:77: c9:6b:2c:ed:8f:66:46:36:f5:1e:78:5c:e4:8a:6e:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:af:e1:d7:4a:d3:57:43:48:ba:eb:dc:2f:fe:26:67: 4a:b2:c1:05:46:25:09:5f:e7:ca:f2:8b:72:fd:96:37: 11:ad:ce:11:94:9a:00:b1:93:3e:9c:a2:ba:0b:c5:05: b8:35:09:15:9d:aa:5b:d6:a9:a9:99:3e:d2:a6:89:f2: 1d:c4:0e:93:60:c2:39:e7:e1:6c:82:af:3d:72:a3:7c: 39:00:26:76:06:77:a7:7e:07:e9:32:8a:11:d8:9a:99: 2b:f0:bc:b6:58:8a:cc:19:f5:75:64:ac:e3:02:6d:36: b6:3c:5c:03:60:85:c7:66:b0:e3:e6:64:b7:c2:c6:88: 87:99:84:14:51:9c:d1:91:49:91:01:32:78:d3:a0:e8: 43:a4:a1:12:e4:73:5e:01:ac:b5:ae:c5:84:0e:0c:d7: fa:03:c6:25:57:6f:e7:60:90:80:81:d6:25:73:da:a9: 80:81:16:07:cb:2d:c8:d3:13:1a:7b:30:b1:f0:62:7f: e0:ec:65:2a:f9:64:c0:f6:e7:d2:94:ab:af:49:1c:d1: 3c:a1:21:f8:5c:98:bb:e6:3f:7a:89:90:0a:fb:39:5e: 1f:fb:ac:0f:0d:62:c1:ff:23:7b:aa:2b:2a:62:b6:31: cb:6d:78:71:62:34:bf:04:ae:c4:dd:50:cf:f0:93:eb Fingerprint (SHA-256): C8:69:1B:E3:1F:EC:EE:36:B4:EE:E6:16:6D:A9:D0:DD:4D:3A:09:0F:BE:3A:53:1B:48:4E:80:B7:DD:43:D6:61 Fingerprint (SHA1): 2E:EC:63:FA:21:A1:7D:CC:FD:61:79:6F:61:B9:43:49:83:B6:90:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221107 (0x13162fb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:13:18 2023 Not After : Mon Mar 20 22:13:18 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:29:13:6d:5d:05:13:ae:34:73:a1:7a:57:c3:53:5c: dc:69:0d:a6:67:b9:61:b0:75:81:3d:4c:a1:b5:b8:71: de:e9:9b:c1:21:56:61:66:39:a5:05:d9:09:6d:9c:29: df:27:65:ba:9e:58:d9:a1:60:5b:8a:3f:6e:bd:31:04: 9a:fe:12:f3:0a:82:d6:f4:95:dc:d3:57:dc:ad:f7:e4: ab:a2:35:d5:3c:cd:20:cf:5c:24:b7:37:04:fe:b2:2c: 10:5d:24:79:5f:3e:37:95:1a:fe:01:3f:5b:73:c5:46: a3:f7:7b:41:75:72:49:6b:74:8c:87:b1:e9:a5:08:76: 98:4d:5b:52:61:8b:29:b7:ca:8b:c0:bc:4e:b5:65:94: 9d:e4:af:55:4d:de:b0:ca:23:7c:6e:35:72:d9:58:f2: 86:9d:57:56:89:6f:68:1a:31:dd:45:68:4d:fa:2b:ec: fd:cf:24:44:41:a2:05:a8:ef:8d:77:31:73:00:20:2e: 27:a8:bb:97:0e:8a:ae:db:90:36:26:cd:5f:2b:c8:4a: f9:d8:07:23:38:be:a1:c3:76:a5:79:05:07:0c:13:58: 36:94:ab:25:a8:dc:8a:31:90:a0:fd:ec:9a:76:da:77: c9:6b:2c:ed:8f:66:46:36:f5:1e:78:5c:e4:8a:6e:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:af:e1:d7:4a:d3:57:43:48:ba:eb:dc:2f:fe:26:67: 4a:b2:c1:05:46:25:09:5f:e7:ca:f2:8b:72:fd:96:37: 11:ad:ce:11:94:9a:00:b1:93:3e:9c:a2:ba:0b:c5:05: b8:35:09:15:9d:aa:5b:d6:a9:a9:99:3e:d2:a6:89:f2: 1d:c4:0e:93:60:c2:39:e7:e1:6c:82:af:3d:72:a3:7c: 39:00:26:76:06:77:a7:7e:07:e9:32:8a:11:d8:9a:99: 2b:f0:bc:b6:58:8a:cc:19:f5:75:64:ac:e3:02:6d:36: b6:3c:5c:03:60:85:c7:66:b0:e3:e6:64:b7:c2:c6:88: 87:99:84:14:51:9c:d1:91:49:91:01:32:78:d3:a0:e8: 43:a4:a1:12:e4:73:5e:01:ac:b5:ae:c5:84:0e:0c:d7: fa:03:c6:25:57:6f:e7:60:90:80:81:d6:25:73:da:a9: 80:81:16:07:cb:2d:c8:d3:13:1a:7b:30:b1:f0:62:7f: e0:ec:65:2a:f9:64:c0:f6:e7:d2:94:ab:af:49:1c:d1: 3c:a1:21:f8:5c:98:bb:e6:3f:7a:89:90:0a:fb:39:5e: 1f:fb:ac:0f:0d:62:c1:ff:23:7b:aa:2b:2a:62:b6:31: cb:6d:78:71:62:34:bf:04:ae:c4:dd:50:cf:f0:93:eb Fingerprint (SHA-256): C8:69:1B:E3:1F:EC:EE:36:B4:EE:E6:16:6D:A9:D0:DD:4D:3A:09:0F:BE:3A:53:1B:48:4E:80:B7:DD:43:D6:61 Fingerprint (SHA1): 2E:EC:63:FA:21:A1:7D:CC:FD:61:79:6F:61:B9:43:49:83:B6:90:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221108 (0x13162fb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:13:19 2023 Not After : Mon Mar 20 22:13:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:b7:93:ba:6a:e8:57:73:e6:c1:47:13:50:b9:ef:f1: 51:ad:2e:cc:c8:f1:b7:b6:62:8c:ad:e2:1c:90:d6:2d: 88:85:a1:87:e9:b8:3f:cc:72:79:24:73:11:84:0a:9f: 86:20:ef:06:73:fd:64:a6:88:0e:f1:42:e6:b7:4b:ad: c4:06:2b:c8:09:88:05:67:62:11:b4:24:bb:cc:c4:01: fd:f4:b7:b9:a4:15:38:3b:7e:ee:c3:3b:40:7b:6d:b0: 90:2c:79:b0:ed:ea:45:4c:35:da:3d:a3:f4:35:fc:95: b4:b4:8a:dd:d7:bc:4e:e8:a2:9d:40:68:7c:4b:a0:fd: c8:2e:18:04:eb:06:9e:47:72:c3:29:c2:bf:8d:0b:d7: d7:53:00:e6:a9:d3:59:b7:e4:d8:f4:a8:4f:95:f2:ab: 3b:10:bc:1e:54:1c:f0:5a:2b:27:98:d1:c5:0a:1d:68: e0:57:01:cf:3f:d4:5d:e9:10:eb:fb:ca:56:42:b3:d4: 9e:a6:07:80:87:8e:75:07:33:2a:98:8d:a8:d5:cc:b5: 49:91:9b:a0:2d:05:9f:ab:58:71:5d:15:ce:ea:cb:c3: 54:7e:71:2e:85:21:f5:c2:7c:d7:c4:f8:5e:4b:37:ec: aa:b3:f8:40:5d:a5:65:d6:7d:ad:97:83:32:70:f4:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:82:ec:0b:44:de:2b:cf:00:75:38:e6:b1:89:f5:4d: 32:0d:5c:06:02:11:fe:fa:0b:6b:68:05:ee:a7:26:70: ed:57:40:3b:dc:f2:82:9d:b2:8e:8d:d7:75:c8:e9:a0: c5:cd:b1:92:35:fb:6e:ab:5c:b7:98:00:82:17:b0:03: 9b:49:20:7b:c5:5b:0b:37:64:1d:85:63:b9:92:4e:9c: 74:51:d2:74:a9:ce:35:a6:5b:70:b6:3a:af:d8:93:56: 56:5a:86:c1:84:40:25:67:b7:60:51:1e:f1:13:e3:9a: 94:c9:ee:74:82:e7:4a:38:90:ef:29:0d:0b:bc:48:67: 73:3d:93:4e:29:ff:08:22:1f:df:ef:db:b1:fc:26:25: aa:a4:98:3f:b4:9f:2a:4a:af:09:4d:d4:2a:37:8d:c1: 4d:0b:eb:8f:87:18:76:99:e4:70:4b:6b:11:11:1e:c6: ae:56:29:b4:d3:21:68:93:1d:70:c6:8a:33:23:5f:9f: ba:e0:ff:40:72:51:ed:ba:61:f0:02:be:15:1c:01:9f: c7:3f:41:c3:72:e5:19:e6:71:1c:66:2e:ca:53:ed:80: 44:10:10:09:0f:fa:0c:33:9f:c1:88:30:5b:d4:5b:c8: e8:a8:f1:9b:7d:ff:aa:8f:82:00:71:68:c8:50:48:0d Fingerprint (SHA-256): CC:3A:7B:D8:7A:53:6C:AF:B5:50:EE:BA:C2:0E:70:D1:06:1D:A1:0A:32:E1:02:C5:D4:4F:5B:CE:D3:0C:18:26 Fingerprint (SHA1): 1A:8D:56:CF:DA:54:80:8A:BC:BB:CF:B4:23:DD:68:9D:AE:85:E2:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221108 (0x13162fb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:13:19 2023 Not After : Mon Mar 20 22:13:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:b7:93:ba:6a:e8:57:73:e6:c1:47:13:50:b9:ef:f1: 51:ad:2e:cc:c8:f1:b7:b6:62:8c:ad:e2:1c:90:d6:2d: 88:85:a1:87:e9:b8:3f:cc:72:79:24:73:11:84:0a:9f: 86:20:ef:06:73:fd:64:a6:88:0e:f1:42:e6:b7:4b:ad: c4:06:2b:c8:09:88:05:67:62:11:b4:24:bb:cc:c4:01: fd:f4:b7:b9:a4:15:38:3b:7e:ee:c3:3b:40:7b:6d:b0: 90:2c:79:b0:ed:ea:45:4c:35:da:3d:a3:f4:35:fc:95: b4:b4:8a:dd:d7:bc:4e:e8:a2:9d:40:68:7c:4b:a0:fd: c8:2e:18:04:eb:06:9e:47:72:c3:29:c2:bf:8d:0b:d7: d7:53:00:e6:a9:d3:59:b7:e4:d8:f4:a8:4f:95:f2:ab: 3b:10:bc:1e:54:1c:f0:5a:2b:27:98:d1:c5:0a:1d:68: e0:57:01:cf:3f:d4:5d:e9:10:eb:fb:ca:56:42:b3:d4: 9e:a6:07:80:87:8e:75:07:33:2a:98:8d:a8:d5:cc:b5: 49:91:9b:a0:2d:05:9f:ab:58:71:5d:15:ce:ea:cb:c3: 54:7e:71:2e:85:21:f5:c2:7c:d7:c4:f8:5e:4b:37:ec: aa:b3:f8:40:5d:a5:65:d6:7d:ad:97:83:32:70:f4:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:82:ec:0b:44:de:2b:cf:00:75:38:e6:b1:89:f5:4d: 32:0d:5c:06:02:11:fe:fa:0b:6b:68:05:ee:a7:26:70: ed:57:40:3b:dc:f2:82:9d:b2:8e:8d:d7:75:c8:e9:a0: c5:cd:b1:92:35:fb:6e:ab:5c:b7:98:00:82:17:b0:03: 9b:49:20:7b:c5:5b:0b:37:64:1d:85:63:b9:92:4e:9c: 74:51:d2:74:a9:ce:35:a6:5b:70:b6:3a:af:d8:93:56: 56:5a:86:c1:84:40:25:67:b7:60:51:1e:f1:13:e3:9a: 94:c9:ee:74:82:e7:4a:38:90:ef:29:0d:0b:bc:48:67: 73:3d:93:4e:29:ff:08:22:1f:df:ef:db:b1:fc:26:25: aa:a4:98:3f:b4:9f:2a:4a:af:09:4d:d4:2a:37:8d:c1: 4d:0b:eb:8f:87:18:76:99:e4:70:4b:6b:11:11:1e:c6: ae:56:29:b4:d3:21:68:93:1d:70:c6:8a:33:23:5f:9f: ba:e0:ff:40:72:51:ed:ba:61:f0:02:be:15:1c:01:9f: c7:3f:41:c3:72:e5:19:e6:71:1c:66:2e:ca:53:ed:80: 44:10:10:09:0f:fa:0c:33:9f:c1:88:30:5b:d4:5b:c8: e8:a8:f1:9b:7d:ff:aa:8f:82:00:71:68:c8:50:48:0d Fingerprint (SHA-256): CC:3A:7B:D8:7A:53:6C:AF:B5:50:EE:BA:C2:0E:70:D1:06:1D:A1:0A:32:E1:02:C5:D4:4F:5B:CE:D3:0C:18:26 Fingerprint (SHA1): 1A:8D:56:CF:DA:54:80:8A:BC:BB:CF:B4:23:DD:68:9D:AE:85:E2:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221111 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320221112 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221113 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 320221114 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320221115 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320221116 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 320221117 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221111 (0x13162fb7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:28 2023 Not After : Mon Mar 20 22:13:28 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:c4:45:e3:2e:4b:a7:d0:04:60:99:cf:67:6f:57:7f: f0:03:4f:fd:87:19:63:be:8d:29:8b:68:93:bf:4a:77: 29:83:1f:b7:71:a4:26:ad:c2:b2:91:6b:4d:67:a1:30: 21:24:3b:2c:29:01:75:a7:a2:0d:15:5c:4e:69:4d:2c: 63:c5:f0:c0:09:d0:83:4f:62:58:f6:a1:6a:a8:e9:35: a4:ca:03:75:f5:b5:6c:73:81:98:05:e2:7f:1c:f5:ee: 43:57:2d:91:1e:5b:48:91:81:08:69:b1:88:bb:16:14: 15:ad:ac:4f:4f:51:60:2d:74:37:44:02:18:39:3c:08: 8d:eb:3e:d6:40:a7:ba:cc:e8:d8:b6:4d:9b:a5:15:48: 40:2c:03:91:9e:7f:41:51:62:2a:a4:85:ee:30:15:cf: a9:27:dd:33:2c:3e:c7:56:0a:db:62:51:67:94:19:f9: 79:3d:d4:3d:8d:ff:f5:f8:d0:8b:43:67:49:3e:87:af: 03:37:7f:eb:c2:8b:49:21:03:4f:60:59:12:98:6c:c0: f0:33:6b:8c:b5:86:e4:da:27:07:b0:b6:45:0d:00:61: 59:82:98:c5:2e:21:fe:95:85:5a:9f:94:30:77:28:e7: cc:5f:60:6d:e7:d2:fe:15:34:d2:d1:7e:8c:48:4d:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:27:54:af:8e:2d:1e:48:d1:5e:69:a9:b3:22:f6:0e: 14:c0:63:f6:a0:4d:27:77:64:63:9b:89:06:1a:62:65: e6:8f:1d:a1:db:eb:eb:88:f6:aa:83:6f:ce:e6:b7:61: a4:de:14:ee:7f:3d:fb:45:df:e6:46:40:4c:cf:dd:96: fc:6e:7e:12:37:e3:8c:bd:4f:71:25:9d:1d:c4:f7:82: ef:56:37:77:5e:65:89:c6:0b:47:8e:34:5f:d9:8e:51: 9e:aa:bf:10:fb:76:fd:b1:76:80:e6:f0:4a:60:29:ea: cd:d0:83:7b:f4:41:16:cb:64:63:27:5a:88:33:69:b2: c3:e4:2e:6a:85:ca:d9:9c:32:a3:c5:36:fc:a2:0b:11: 2c:34:7b:e6:a6:7d:ef:92:fe:3c:cb:be:3b:02:bb:62: 57:ab:74:13:a8:c3:00:ef:e2:c9:ca:19:6b:bc:f0:15: fb:3e:ad:c8:2b:dc:ca:86:57:50:83:08:52:ee:41:c1: 0d:ed:58:12:e4:53:5e:e9:4b:3a:fb:3c:25:6f:37:f1: 6c:76:0d:de:07:15:d8:cc:9b:21:e2:56:5a:55:c7:e0: c8:94:27:26:6d:f1:1c:59:de:72:da:8e:b1:2f:c0:70: d1:a4:f8:4e:a3:d7:ac:91:9d:ab:a6:7b:fd:e4:a2:17 Fingerprint (SHA-256): B1:94:AB:5A:64:65:DA:46:2D:92:21:35:0E:06:58:EA:3C:D3:B1:0D:6C:76:0D:79:35:89:9F:BF:AC:DA:60:43 Fingerprint (SHA1): C9:A0:81:C1:89:75:CC:3F:B1:28:59:73:1A:62:37:93:EC:E0:B3:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221111 (0x13162fb7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:28 2023 Not After : Mon Mar 20 22:13:28 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:c4:45:e3:2e:4b:a7:d0:04:60:99:cf:67:6f:57:7f: f0:03:4f:fd:87:19:63:be:8d:29:8b:68:93:bf:4a:77: 29:83:1f:b7:71:a4:26:ad:c2:b2:91:6b:4d:67:a1:30: 21:24:3b:2c:29:01:75:a7:a2:0d:15:5c:4e:69:4d:2c: 63:c5:f0:c0:09:d0:83:4f:62:58:f6:a1:6a:a8:e9:35: a4:ca:03:75:f5:b5:6c:73:81:98:05:e2:7f:1c:f5:ee: 43:57:2d:91:1e:5b:48:91:81:08:69:b1:88:bb:16:14: 15:ad:ac:4f:4f:51:60:2d:74:37:44:02:18:39:3c:08: 8d:eb:3e:d6:40:a7:ba:cc:e8:d8:b6:4d:9b:a5:15:48: 40:2c:03:91:9e:7f:41:51:62:2a:a4:85:ee:30:15:cf: a9:27:dd:33:2c:3e:c7:56:0a:db:62:51:67:94:19:f9: 79:3d:d4:3d:8d:ff:f5:f8:d0:8b:43:67:49:3e:87:af: 03:37:7f:eb:c2:8b:49:21:03:4f:60:59:12:98:6c:c0: f0:33:6b:8c:b5:86:e4:da:27:07:b0:b6:45:0d:00:61: 59:82:98:c5:2e:21:fe:95:85:5a:9f:94:30:77:28:e7: cc:5f:60:6d:e7:d2:fe:15:34:d2:d1:7e:8c:48:4d:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:27:54:af:8e:2d:1e:48:d1:5e:69:a9:b3:22:f6:0e: 14:c0:63:f6:a0:4d:27:77:64:63:9b:89:06:1a:62:65: e6:8f:1d:a1:db:eb:eb:88:f6:aa:83:6f:ce:e6:b7:61: a4:de:14:ee:7f:3d:fb:45:df:e6:46:40:4c:cf:dd:96: fc:6e:7e:12:37:e3:8c:bd:4f:71:25:9d:1d:c4:f7:82: ef:56:37:77:5e:65:89:c6:0b:47:8e:34:5f:d9:8e:51: 9e:aa:bf:10:fb:76:fd:b1:76:80:e6:f0:4a:60:29:ea: cd:d0:83:7b:f4:41:16:cb:64:63:27:5a:88:33:69:b2: c3:e4:2e:6a:85:ca:d9:9c:32:a3:c5:36:fc:a2:0b:11: 2c:34:7b:e6:a6:7d:ef:92:fe:3c:cb:be:3b:02:bb:62: 57:ab:74:13:a8:c3:00:ef:e2:c9:ca:19:6b:bc:f0:15: fb:3e:ad:c8:2b:dc:ca:86:57:50:83:08:52:ee:41:c1: 0d:ed:58:12:e4:53:5e:e9:4b:3a:fb:3c:25:6f:37:f1: 6c:76:0d:de:07:15:d8:cc:9b:21:e2:56:5a:55:c7:e0: c8:94:27:26:6d:f1:1c:59:de:72:da:8e:b1:2f:c0:70: d1:a4:f8:4e:a3:d7:ac:91:9d:ab:a6:7b:fd:e4:a2:17 Fingerprint (SHA-256): B1:94:AB:5A:64:65:DA:46:2D:92:21:35:0E:06:58:EA:3C:D3:B1:0D:6C:76:0D:79:35:89:9F:BF:AC:DA:60:43 Fingerprint (SHA1): C9:A0:81:C1:89:75:CC:3F:B1:28:59:73:1A:62:37:93:EC:E0:B3:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221118 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320221119 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 320221120 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 320221121 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 320221122 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 320221123 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 320221124 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 320221125 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 320221126 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 320221127 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 320221128 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 320221129 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 320221130 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 320221131 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 320221132 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 320221133 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 320221134 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 320221135 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 320221136 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 320221137 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 320221138 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 320221139 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 320221140 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 320221141 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 320221142 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 320221143 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 320221144 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 320221145 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 320221146 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 320221147 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221118 (0x13162fbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:13:41 2023 Not After : Mon Mar 20 22:13:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:83:32:57:c4:81:63:02:17:b8:bd:c8:42:8b:f6:8e: 10:75:6d:2a:2a:ea:7a:f9:e6:33:63:c1:79:5e:85:e4: 95:d3:f4:42:70:06:00:51:d2:22:7e:b9:8d:03:1f:6c: 39:98:ac:91:e9:0d:b1:45:e0:97:bf:3e:57:c0:21:6c: 4d:34:80:86:c7:81:a2:d4:91:78:f2:6a:d7:6a:3a:46: 91:eb:85:58:93:f3:4e:34:2c:4d:94:9c:72:96:18:79: 96:3b:ba:8a:1d:c4:c2:56:d4:1e:1c:48:b1:c9:01:a5: 02:e4:88:95:10:81:3b:f7:e5:0e:ef:d6:b6:48:03:70: 12:0b:4c:f9:4f:7c:a9:3c:12:45:23:d0:5c:26:8e:d7: e0:08:6f:0e:9f:53:4e:36:89:e4:31:27:ed:64:56:75: ca:b4:30:26:b9:5e:3f:5a:bc:7a:8c:b6:dc:cd:9b:7a: 7e:38:1b:5f:f6:ec:e4:68:26:32:54:5a:2a:4b:c6:ef: 38:55:c2:33:e3:6b:f9:34:70:59:70:7b:cd:91:76:ca: 83:7a:5e:6d:ab:d0:5d:84:20:85:2b:0d:9f:5d:04:78: c1:a4:94:c1:f1:77:c2:cf:c5:a1:a9:e3:06:62:35:71: 63:4a:7a:ad:14:9c:bb:ed:77:7d:27:44:8a:49:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:26:00:6c:c0:a1:8b:1a:b6:02:99:b9:50:41:0e:d2: 7b:32:61:51:f8:ab:80:ab:34:43:7f:de:f0:82:69:40: 33:e9:80:7c:e1:34:74:f9:10:2e:31:bc:85:71:d6:c6: 20:99:8f:37:db:7e:d4:af:29:69:3e:21:10:de:bc:0d: d4:9a:ec:bb:a6:15:50:8a:13:c1:81:ad:ab:1e:58:c0: 77:46:08:f1:08:e2:2b:f1:8f:11:45:64:08:19:43:26: 6f:82:ee:87:99:de:0a:f9:ee:e0:db:51:22:c2:ad:a9: 40:14:f4:1e:52:80:34:b5:2c:a7:e2:7a:5e:5e:2e:63: 59:7d:58:53:58:dd:03:81:73:82:f4:f6:44:d5:e5:af: 2b:34:d6:af:93:e3:f9:90:8e:02:e1:1f:5d:c4:aa:c3: bc:b3:67:7f:c3:46:dc:0c:39:54:ae:96:37:03:d6:e9: 07:b6:ae:bd:39:78:be:3e:41:45:f7:f3:cf:ea:c2:d6: 96:a1:90:a6:66:6d:bb:2d:6a:05:9a:82:54:3b:84:50: ca:1c:d3:9c:04:2d:e3:06:a0:45:c4:ae:36:6f:75:d8: e6:ef:39:80:0b:4b:76:06:5a:b1:41:4a:25:78:98:7c: 74:d1:74:5a:ba:63:fd:d4:84:4b:5e:6d:9a:f1:43:e0 Fingerprint (SHA-256): 1A:72:02:D9:BF:B1:38:D6:3F:41:A9:C6:54:19:A3:3B:59:7D:DC:E8:94:05:A1:C2:04:1D:34:1A:74:E4:DA:0A Fingerprint (SHA1): 19:66:FF:50:14:86:1A:C4:90:93:63:7E:18:6B:29:0B:13:5E:54:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221148 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 320221149 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 320221150 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 320221151 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 320221152 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 320221153 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 320221154 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221148 (0x13162fdc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:14:33 2023 Not After : Mon Mar 20 22:14:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:6e:04:04:02:49:3a:a1:96:c6:57:93:1d:82:89:82: 34:4a:2b:b3:ec:f8:43:23:07:be:fc:be:44:c1:73:fd: 9a:8f:3d:93:2b:83:c8:39:be:c6:11:f7:88:59:6c:01: cf:99:09:b0:04:78:96:38:a1:d9:09:b9:19:a0:d6:44: 6e:9a:56:e9:d5:34:cc:57:9a:c3:f4:2e:15:9e:90:33: 69:4f:4f:31:b1:77:89:ac:1f:75:0a:11:6b:9d:8e:41: 32:5d:4d:37:74:d9:c3:d9:30:60:87:f2:dd:54:51:df: 84:21:17:b8:8e:1d:fd:9a:5e:6d:a2:45:f4:0f:68:5f: c2:73:29:ec:67:bd:91:e7:62:00:74:5a:4f:5d:ac:df: 64:39:04:a5:60:9a:28:58:c9:bc:ab:7d:f9:7f:36:71: a1:59:e5:08:a0:55:da:56:02:c4:97:8d:d8:9c:94:72: 06:7a:0a:3d:72:41:fe:f1:16:25:33:b8:96:b1:b4:eb: b2:9f:95:e7:96:dd:c3:36:57:42:87:72:eb:5d:7b:fc: 3a:46:f5:dd:c2:4c:2f:0b:0a:d5:18:b5:41:67:7f:b5: eb:28:86:9f:66:8b:b5:c9:c1:16:59:27:03:f3:2d:d7: c4:5c:45:bb:18:ff:a9:02:5d:91:34:f5:e8:22:14:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:8b:13:5f:61:ae:09:f6:3f:f0:53:e1:42:1e:6a:17: 06:ff:d0:c9:a2:ac:4b:9b:37:07:1b:5d:de:a4:92:54: 19:7b:ce:d4:57:66:c2:41:ca:0e:4e:73:1f:18:7b:5b: d0:fe:31:db:10:84:6e:13:76:19:01:e8:9b:46:3e:c4: 55:9a:8c:09:21:c3:9f:50:b6:63:42:ee:8d:e9:cf:5b: 41:1b:ea:e4:e6:c4:ac:ce:82:9b:d3:16:e4:ac:10:d8: ed:fa:29:c6:ca:7d:92:97:77:e8:59:01:03:35:e9:9f: c6:66:fb:04:f2:0e:37:43:ba:9c:64:f8:9e:0d:6a:0c: fe:77:92:85:59:48:94:bc:9f:23:68:29:e2:7e:9a:0d: 19:4d:21:f0:10:3b:e1:2f:9e:cb:93:43:28:87:c0:f4: c9:1b:e7:d8:a2:ed:00:24:5e:b1:87:52:de:44:4a:df: 3c:f4:98:63:f0:73:04:77:0a:3b:c9:02:ba:18:30:b0: ce:fd:a5:b5:5e:10:eb:22:6c:02:4f:26:30:f8:94:05: fc:28:0c:0e:40:25:df:6c:c2:1c:3b:f2:d6:e7:69:7f: bd:a6:4c:9d:ae:35:76:86:01:c4:da:df:7c:7f:3d:8b: b0:aa:35:fa:ef:1e:81:da:fc:4a:e3:0d:e2:26:bd:59 Fingerprint (SHA-256): D4:53:0C:50:F1:9F:63:4B:EB:AC:32:06:AB:C9:66:31:78:A7:D1:BA:3F:65:4E:DA:06:AD:8E:08:56:E4:32:96 Fingerprint (SHA1): 91:C7:5C:A5:BA:C3:44:5D:C4:DD:50:9E:4E:E0:4E:9B:A9:DE:2E:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221148 (0x13162fdc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:14:33 2023 Not After : Mon Mar 20 22:14:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:6e:04:04:02:49:3a:a1:96:c6:57:93:1d:82:89:82: 34:4a:2b:b3:ec:f8:43:23:07:be:fc:be:44:c1:73:fd: 9a:8f:3d:93:2b:83:c8:39:be:c6:11:f7:88:59:6c:01: cf:99:09:b0:04:78:96:38:a1:d9:09:b9:19:a0:d6:44: 6e:9a:56:e9:d5:34:cc:57:9a:c3:f4:2e:15:9e:90:33: 69:4f:4f:31:b1:77:89:ac:1f:75:0a:11:6b:9d:8e:41: 32:5d:4d:37:74:d9:c3:d9:30:60:87:f2:dd:54:51:df: 84:21:17:b8:8e:1d:fd:9a:5e:6d:a2:45:f4:0f:68:5f: c2:73:29:ec:67:bd:91:e7:62:00:74:5a:4f:5d:ac:df: 64:39:04:a5:60:9a:28:58:c9:bc:ab:7d:f9:7f:36:71: a1:59:e5:08:a0:55:da:56:02:c4:97:8d:d8:9c:94:72: 06:7a:0a:3d:72:41:fe:f1:16:25:33:b8:96:b1:b4:eb: b2:9f:95:e7:96:dd:c3:36:57:42:87:72:eb:5d:7b:fc: 3a:46:f5:dd:c2:4c:2f:0b:0a:d5:18:b5:41:67:7f:b5: eb:28:86:9f:66:8b:b5:c9:c1:16:59:27:03:f3:2d:d7: c4:5c:45:bb:18:ff:a9:02:5d:91:34:f5:e8:22:14:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:8b:13:5f:61:ae:09:f6:3f:f0:53:e1:42:1e:6a:17: 06:ff:d0:c9:a2:ac:4b:9b:37:07:1b:5d:de:a4:92:54: 19:7b:ce:d4:57:66:c2:41:ca:0e:4e:73:1f:18:7b:5b: d0:fe:31:db:10:84:6e:13:76:19:01:e8:9b:46:3e:c4: 55:9a:8c:09:21:c3:9f:50:b6:63:42:ee:8d:e9:cf:5b: 41:1b:ea:e4:e6:c4:ac:ce:82:9b:d3:16:e4:ac:10:d8: ed:fa:29:c6:ca:7d:92:97:77:e8:59:01:03:35:e9:9f: c6:66:fb:04:f2:0e:37:43:ba:9c:64:f8:9e:0d:6a:0c: fe:77:92:85:59:48:94:bc:9f:23:68:29:e2:7e:9a:0d: 19:4d:21:f0:10:3b:e1:2f:9e:cb:93:43:28:87:c0:f4: c9:1b:e7:d8:a2:ed:00:24:5e:b1:87:52:de:44:4a:df: 3c:f4:98:63:f0:73:04:77:0a:3b:c9:02:ba:18:30:b0: ce:fd:a5:b5:5e:10:eb:22:6c:02:4f:26:30:f8:94:05: fc:28:0c:0e:40:25:df:6c:c2:1c:3b:f2:d6:e7:69:7f: bd:a6:4c:9d:ae:35:76:86:01:c4:da:df:7c:7f:3d:8b: b0:aa:35:fa:ef:1e:81:da:fc:4a:e3:0d:e2:26:bd:59 Fingerprint (SHA-256): D4:53:0C:50:F1:9F:63:4B:EB:AC:32:06:AB:C9:66:31:78:A7:D1:BA:3F:65:4E:DA:06:AD:8E:08:56:E4:32:96 Fingerprint (SHA1): 91:C7:5C:A5:BA:C3:44:5D:C4:DD:50:9E:4E:E0:4E:9B:A9:DE:2E:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221155 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221156 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221157 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320221158 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221155 (0x13162fe3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:14:45 2023 Not After : Mon Mar 20 22:14:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:85:fb:b4:c6:47:57:b6:92:40:d2:b0:84:ac:6c: 62:cb:3e:63:f3:35:80:25:13:30:19:3b:ac:7d:42:bf: ac:92:98:e2:05:8a:b4:51:f0:bd:bd:87:8f:6c:d0:12: 01:e4:3e:5d:f1:b1:ff:ea:ac:a5:ff:7b:89:6b:49:e7: 6d:55:c6:c9:1f:6a:bd:16:88:bd:20:7a:d9:45:89:51: 5c:fe:b7:e3:42:54:f3:8e:c0:24:58:ca:72:e2:3b:99: 11:5b:70:e4:18:33:b6:99:4f:fa:54:48:d8:e0:e6:eb: 8c:4b:77:51:39:89:a8:90:1f:62:14:ab:82:db:00:f3: 54:72:75:3c:37:75:a8:00:2a:59:90:9d:c8:50:65:6a: 83:53:0a:52:28:9d:58:17:01:d4:de:f4:14:5a:3c:88: 57:b2:e8:b7:ed:bb:d6:b6:0b:15:2b:d5:7d:78:60:00: 5f:22:d2:6f:82:f5:f7:32:b3:c8:0a:39:79:9c:11:83: 76:f5:32:e1:47:c7:fa:51:78:68:0a:b7:18:c8:f9:29: b3:ce:d9:be:23:bf:be:0f:cc:cc:93:8f:f7:c8:16:6b: 91:b4:1f:f9:fb:be:2a:ca:88:18:99:22:11:de:1b:2c: 2d:86:5a:94:1f:66:c6:bf:5e:0c:f8:c2:e7:37:a6:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:45:76:fa:f4:2e:2b:ea:4c:bf:16:78:16:0e:3d:d8: 32:8f:e0:cf:e8:9a:7e:b5:e9:42:3a:fd:3d:a0:2d:86: 77:cc:f3:d8:91:0a:f8:95:55:02:f9:e0:70:7d:45:fd: 53:53:e9:01:40:47:b3:b9:0e:c7:43:39:65:fe:bc:5b: cc:c9:3c:07:a4:ec:5c:e5:90:18:82:a1:15:1d:7a:22: cf:3f:8c:e6:58:2b:a5:f8:b4:10:87:8d:b6:0d:51:81: e3:0c:25:79:ff:d5:b0:cc:c9:f4:7b:88:d6:e6:11:0d: 9b:b5:68:a9:bf:45:31:62:d6:3d:f7:71:58:8c:40:fb: d8:e1:07:bf:f1:07:ee:42:ae:9c:8a:5e:7f:b9:53:58: b2:1e:57:bc:6c:2e:b5:ea:71:5e:ee:ce:b6:e1:a6:2d: 15:c0:5e:c1:c0:c9:29:e0:88:3b:da:3b:b8:c8:f5:0e: 06:56:ee:a0:3a:00:cd:f6:83:44:3a:aa:de:b2:f3:36: 0b:51:0f:6a:de:0b:d4:ad:07:f3:f0:b3:78:e2:45:db: 97:4c:bd:0c:bb:18:16:75:13:a1:f9:13:b7:9b:a9:9a: 24:e3:2d:d0:17:41:09:f0:3b:ce:0f:50:a8:22:b9:c6: 91:25:50:21:d5:97:4f:3f:b4:bb:9b:7c:13:88:4f:3b Fingerprint (SHA-256): E2:18:F9:B9:7F:2C:E0:0F:8A:F6:2B:BA:73:AA:08:70:FE:67:EB:A3:A1:F2:0D:68:6A:49:C1:83:7A:AA:4D:02 Fingerprint (SHA1): 14:51:20:95:77:86:E1:0E:CB:46:CE:97:26:E5:5E:7C:DA:28:43:3E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221156 (0x13162fe4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:14:47 2023 Not After : Mon Mar 20 22:14:47 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:90:69:2e:52:a3:93:3a:f7:b9:72:4b:b1:00:76:7a: 8a:27:5a:fd:22:33:6f:b8:89:29:b8:90:05:b5:d3:36: fe:45:de:c3:b5:aa:30:93:ba:ed:48:b5:05:0e:88:12: 7f:4f:10:7c:9e:e3:20:0b:4c:b9:82:d5:85:f1:f7:3c: 61:5c:9a:d8:12:a5:94:5e:4c:d5:67:c6:b6:77:dd:d3: f2:69:13:15:37:b9:f6:6f:cd:a3:90:29:34:a2:72:6e: 84:ee:fc:7b:39:b8:82:a7:1b:3b:13:16:41:af:07:16: 77:b8:65:75:c0:96:e1:1e:47:ee:83:29:65:a3:6f:89: 53:2d:2c:c8:8b:58:7f:80:f8:8f:11:48:9b:eb:0e:bf: 17:16:a3:20:58:6d:93:04:7b:62:e1:88:f8:e7:62:f3: 30:49:29:96:72:a6:22:01:d6:32:f4:a0:0f:59:e9:6b: 9f:ef:28:99:bc:1e:39:bc:5e:91:a4:3c:20:a3:87:b6: 5a:72:a1:59:41:eb:4b:80:32:19:57:13:ec:62:84:6d: 86:9c:fa:00:8a:cb:77:89:87:e6:a9:1b:c4:d4:eb:33: c3:73:23:dd:0f:00:43:a0:31:4b:62:0b:ad:f6:4d:b0: 77:c2:92:87:71:a4:0e:e6:8b:6d:47:d2:55:f3:41:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:42:81:b8:64:c7:ef:a5:48:e1:d7:b9:10:cb:90:56: a6:77:cd:d6:54:89:25:8d:2c:d1:21:a9:a6:c3:9a:0e: 38:33:ba:ed:dc:6d:e7:aa:40:3e:aa:5a:73:46:e6:0d: 1a:40:c3:2c:8c:ea:10:fb:e9:ea:5a:26:cb:1c:0a:7a: 5c:90:25:63:e7:66:29:bf:0d:0b:ca:76:42:2d:49:dd: af:0b:df:c1:9c:d7:c6:6a:01:d5:39:ba:2a:1b:4d:4e: 57:9c:71:27:9f:4d:f3:83:10:32:95:fa:c5:60:f2:95: 29:52:cf:85:3a:b3:3d:b4:cb:45:ba:ca:49:5b:07:a2: fa:db:d5:7b:72:aa:6a:9c:88:da:f2:f6:10:03:be:e2: 1c:29:17:ad:99:c1:20:20:3b:47:db:cd:0e:8b:0b:32: 80:bb:0c:79:97:20:07:25:31:d5:60:44:72:3c:fa:26: c0:e1:1c:80:44:bf:a6:96:58:89:47:a2:87:11:6e:9d: 2d:05:49:70:ee:58:10:df:7c:de:b2:5f:08:76:7a:2b: f1:5a:89:c1:af:d9:77:3f:94:37:ca:92:95:ce:6f:a3: 7b:6a:8a:d2:b1:47:91:4c:ff:25:8a:d4:3b:b6:3d:8e: df:01:63:23:f6:f2:8d:1d:32:ba:c9:c6:82:06:2d:3a Fingerprint (SHA-256): F9:4E:9C:2C:04:32:B1:B9:BE:04:DE:FF:22:B0:59:AE:3E:41:17:69:6E:CC:12:41:1C:F5:01:13:0C:DD:6A:B5 Fingerprint (SHA1): 30:71:D9:F2:83:44:3D:D1:D4:00:3E:C9:E5:AE:F8:63:3C:43:2D:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221157 (0x13162fe5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:14:49 2023 Not After : Mon Mar 20 22:14:49 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:a0:85:b0:8c:df:9f:05:e1:56:66:f1:7d:ea:11:58: 21:1c:d9:3e:c0:ac:8d:3d:d9:da:e1:04:6f:42:36:1d: 59:44:41:1a:7f:7a:db:04:71:90:c7:d8:49:84:f9:b3: 11:7f:91:18:0d:f1:91:d5:53:23:bb:60:56:83:88:53: 2e:a8:a0:b1:61:b2:13:e0:67:5c:e0:a9:53:24:1b:b3: 21:bb:28:de:be:45:45:fe:b9:53:a2:b0:d4:2f:6d:6c: 87:97:b9:bb:0a:41:17:8b:53:3e:57:44:6d:ea:0d:cf: 76:87:6e:9c:49:7f:f5:0a:74:65:36:84:6d:92:eb:7d: a3:83:e0:72:ed:fe:16:1b:db:84:af:ec:ef:69:12:05: 9a:48:08:07:c4:c2:88:35:d7:35:db:74:a0:24:f0:0d: ad:1f:85:24:5a:72:32:dc:a6:c4:d4:81:57:4b:da:a7: 77:1d:90:bd:c6:ee:78:30:cf:64:4e:f6:cb:03:ed:86: bf:21:c4:f5:a9:a6:e7:2d:34:c3:25:bd:72:0e:bc:68: 7e:85:07:d0:2c:00:72:b6:d8:a7:1b:d3:3e:f2:0b:3a: 99:2a:ac:ad:66:8c:de:3c:38:7f:84:a6:2f:ff:71:94: 70:26:fb:08:82:77:d7:66:ad:85:6a:8c:33:96:0e:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:55:fd:0c:2b:f0:1a:b6:88:b1:0b:fd:85:cc:84:1b: 70:ff:85:00:a5:b6:97:7a:a9:71:9e:1f:39:3c:70:01: 75:5d:44:c1:0e:c9:d5:41:67:3a:ee:92:9e:11:25:f8: 01:48:ff:6a:b4:9d:10:5a:8c:7d:c9:ef:9f:67:3c:21: 86:be:32:34:7b:b2:83:7c:ec:0b:0c:7d:59:95:5f:dc: 50:15:8a:27:3d:14:27:77:be:b8:f7:eb:c0:8b:66:43: e2:08:04:ee:f0:34:c0:5d:8d:1a:38:9f:a7:cf:4b:ed: 8a:49:b2:d8:cf:38:ef:ea:da:8b:4c:e9:13:5b:72:0d: 36:b8:9c:7a:c5:66:37:81:5e:12:91:f7:59:e9:57:94: ca:2c:17:f8:11:1b:89:fa:0b:d8:45:27:78:b3:19:f3: 44:45:e5:ea:5b:25:f5:92:4b:4f:f1:5c:0e:33:d4:51: 29:f7:fe:4b:47:9f:a9:1c:90:c2:ae:7c:59:96:c3:f0: 94:e9:54:50:58:be:7d:dc:72:b7:24:e1:93:87:09:20: 6f:f7:d1:68:f7:0b:f6:6a:f8:18:bd:85:9f:e2:67:7b: f0:12:c2:47:22:d4:8d:40:1d:0b:d0:73:af:3a:99:98: 52:ab:e7:a5:fe:db:56:f0:9f:8a:70:20:ce:70:8d:81 Fingerprint (SHA-256): 63:42:DF:8B:09:31:74:94:C7:E6:92:99:35:D5:81:24:56:2A:6C:7A:D4:A4:57:1A:16:3F:A8:B8:69:EF:CD:FF Fingerprint (SHA1): 0F:92:19:A3:05:D7:30:F5:46:07:AA:E2:9B:FB:48:7D:50:B2:DB:E7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221159 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221160 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221161 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 320221162 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 320221163 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221159 (0x13162fe7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:14:53 2023 Not After : Mon Mar 20 22:14:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:69:b2:24:6e:95:36:79:24:16:d9:c1:dd:44:be:73: 27:c4:1b:0c:79:31:c6:95:e5:d0:62:91:25:27:b9:21: 60:e0:1a:92:68:97:cf:45:ef:05:9b:6e:e0:29:18:6f: 47:bd:51:b3:b8:a9:1d:79:ba:5a:1a:92:b4:5a:65:00: da:03:7c:7e:6e:33:8a:7a:31:0f:d8:79:74:b2:c4:2e: 92:9a:eb:5d:28:bc:f9:a6:3b:f6:ad:c2:58:55:53:c7: 61:02:2c:0b:88:47:57:51:a2:6d:69:b8:c0:30:d5:48: f5:32:2f:81:e6:47:50:c2:ef:b2:c5:7e:58:98:b5:3f: 77:3f:15:43:04:e7:1c:33:7d:39:df:43:77:18:2b:cb: 5f:ae:a1:6f:ca:a6:a3:c5:ad:83:81:52:7e:b2:b1:cd: 00:8c:2a:2f:a6:9a:ca:ca:71:4b:1d:67:18:03:23:4a: bd:e1:69:29:8d:5b:5d:6c:1a:fb:31:65:a2:39:78:6b: e6:b5:15:00:81:f8:8f:3f:28:00:29:e0:4d:51:c4:c3: 2f:33:e0:b9:c3:8f:8c:b4:5f:fd:ed:cc:ff:4f:73:36: a9:5e:5e:0c:74:43:54:e7:37:cc:80:33:89:a5:d4:f4: 3d:f7:73:c2:a1:da:69:67:5f:f6:67:2b:2a:b7:2c:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:47:11:4b:98:b4:79:24:d3:e1:98:84:19:74:cc:32: d3:d1:d1:07:98:fc:ab:05:20:3e:bf:54:e6:77:05:09: 2e:63:63:cc:38:be:9f:28:65:ea:6f:25:98:aa:84:87: 39:4e:3a:f1:96:5d:ae:ab:df:c2:9d:95:ea:04:96:12: 72:1a:e1:54:6e:d6:9c:03:42:c5:c8:a8:12:61:1c:07: 0e:50:5c:54:4b:67:9e:bd:a0:0e:13:44:61:45:2e:f7: 15:23:97:7f:09:f7:d7:78:c3:49:17:04:d0:11:52:d0: ef:e4:eb:cb:c3:94:52:a5:57:22:54:7f:a2:9f:4d:a4: 21:ae:34:3a:57:95:4f:eb:15:e7:5d:32:91:7b:be:74: 36:76:56:9b:9a:b9:0b:bb:f0:53:c8:61:22:91:c7:1a: 1f:e9:9e:94:23:7c:96:f5:72:f2:36:46:24:b6:cb:99: 12:4e:71:86:12:10:c2:47:ca:a4:98:fe:9e:08:e6:5e: d8:e9:c7:09:e0:5c:e9:9d:53:4a:4a:9d:00:ec:59:17: 08:a1:95:26:79:f6:5a:1f:2c:6a:28:1a:e5:4a:80:60: 3f:5f:8b:bf:b0:07:2e:af:66:8f:90:c8:0a:83:42:0d: 0e:b2:48:2b:0a:2c:9d:25:41:c6:b0:b0:90:0c:03:ce Fingerprint (SHA-256): 36:59:75:DC:25:99:1B:24:F5:5B:7F:85:7A:AC:CC:8D:78:AB:80:C4:D9:E1:6C:A8:C2:F8:40:72:DD:9A:AD:EA Fingerprint (SHA1): 15:50:45:09:C1:E1:C1:2E:24:F6:5F:2F:77:E7:FA:6D:9D:2D:1D:CD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221160 (0x13162fe8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:14:54 2023 Not After : Mon Mar 20 22:14:54 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:c2:3f:80:ce:49:9e:07:3c:c8:fe:6b:a6:db:29:b9: 7f:30:2a:87:97:f9:70:06:65:2b:53:4b:a2:1b:a7:64: cf:d9:ce:7e:ee:35:44:0a:bc:a0:83:86:b7:a4:b1:ca: e6:c0:d9:d9:dd:c8:03:82:fb:d8:c9:90:86:b6:df:30: 4d:bd:63:e9:dc:09:23:73:56:3a:b0:d5:9f:1f:78:8c: d9:1b:6c:cb:2a:95:85:cb:4a:94:44:d4:d2:99:7e:6b: b7:6a:e8:24:e2:ea:c5:36:d0:cf:da:0b:dd:df:2c:94: 52:7b:6f:0f:b9:1b:7f:b9:71:e9:7b:a2:2d:b8:cf:0d: 8f:85:fb:53:6e:f5:7d:b2:02:80:a1:6c:ec:fe:4a:7b: 52:33:2f:f2:24:c4:a3:99:b6:0c:02:37:55:82:1e:b4: c9:68:45:dc:37:b7:5f:27:23:64:9a:91:fc:ca:3e:88: 5e:11:65:c3:52:14:50:d8:0a:33:ba:01:f3:bc:63:61: 0d:ba:92:c2:4b:4c:b7:b9:8e:a9:13:d0:50:68:05:22: 09:13:1c:98:ca:43:67:35:42:a0:8d:b6:ee:5f:5c:a7: 95:21:f9:b8:ad:f1:a1:b5:63:98:0f:00:4f:cb:af:20: fa:5a:f7:43:c3:43:be:fd:75:65:cf:d3:15:7a:14:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:2c:4d:00:ab:34:cd:a3:a2:ad:d1:2e:e4:b1:6c:09: 80:c9:a2:78:be:37:9c:07:d7:4f:f0:1d:f9:12:0f:6f: 5f:50:bc:33:72:5d:cb:e4:59:bb:e1:70:b4:9d:e3:cd: dd:77:50:fa:4a:fd:b5:64:c1:c2:f6:25:23:66:85:80: f3:ec:95:93:27:b9:a3:67:ea:10:d7:fb:d1:b2:bc:02: 76:a2:cd:f7:c8:a1:3e:e6:74:2f:1f:6b:38:a5:a7:b1: 69:f4:42:4e:c9:da:8a:d9:f8:53:55:8d:ae:a9:6c:81: 49:11:d5:15:c9:1f:9d:10:ea:0e:3d:06:18:be:cb:6e: 94:38:e5:4e:43:bc:76:7d:d9:92:75:59:8f:96:ac:87: b8:80:92:b8:0a:34:ac:e1:b7:c6:c1:b9:d2:7a:36:ef: 7d:06:77:72:89:60:67:3e:18:32:93:01:f7:2c:70:51: c0:5e:c7:b3:a9:11:b1:d0:b9:5a:ae:f0:e1:55:87:7c: 9a:2b:7e:1e:37:96:c7:95:66:1e:65:88:66:bf:15:b4: 61:2a:9b:fa:6d:30:e5:0f:a0:77:c3:89:8b:cb:d0:69: 78:21:6b:3e:1d:e5:56:fd:1c:a2:de:7b:88:b6:79:87: 42:cf:6e:6b:12:9b:fa:22:69:67:83:0d:17:bd:83:de Fingerprint (SHA-256): 01:30:4C:C4:C9:92:21:A2:D3:B0:C0:C6:8F:47:52:D8:95:A9:88:E5:C1:CC:96:D9:91:7C:47:85:B2:05:F0:AA Fingerprint (SHA1): 43:E4:84:89:61:9C:89:1B:0B:0E:96:24:B5:5F:6C:9B:B8:A8:A9:4A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221161 (0x13162fe9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:14:56 2023 Not After : Mon Mar 20 22:14:56 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:e1:fc:1a:0f:68:e2:29:21:ac:63:ba:12:6a:85:e9: f9:61:e5:9a:f2:ec:4b:3e:17:37:df:4b:e5:98:bf:71: 06:d3:ec:67:48:26:67:48:c6:58:ad:aa:dd:7a:60:5b: c2:3b:1f:16:d7:73:e8:06:da:83:d3:a8:c5:32:8c:07: 05:ab:ae:21:04:2e:5d:e6:26:df:d2:50:f5:7f:c5:4d: 45:2d:ed:c8:da:e2:f3:4e:f8:d7:60:bf:6b:e4:43:e4: b0:11:14:35:7b:6f:34:e1:cf:24:f1:a0:c6:17:d6:43: c8:89:85:8f:07:ed:56:04:95:23:b0:ee:74:ab:0d:3b: 4b:25:f5:41:48:58:35:e0:cb:5a:ca:6a:50:34:ce:bb: ee:79:18:3c:a5:c3:8d:44:5f:0e:eb:09:2f:09:e8:49: ac:26:67:0b:ab:c8:f3:d0:a9:e8:c6:a6:9a:24:36:1f: f2:8c:0f:bc:72:54:90:ca:4e:85:0e:36:77:d2:03:ba: 3a:ff:02:d1:a7:f6:23:7d:ab:fd:d3:fd:6f:6a:67:35: 51:0c:5c:ed:26:bc:c6:b8:e2:44:8d:47:92:bd:13:61: 14:0e:7e:eb:1b:b1:d0:20:2a:4d:3a:d3:db:5f:81:64: 08:8e:5e:f7:56:00:26:fc:ed:b3:ba:8f:2d:f8:6b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:f2:ad:a2:ad:42:61:57:f2:36:39:2e:68:32:46:88: 3e:b0:40:01:ef:46:1a:9e:d3:f4:6c:9d:dc:76:85:e1: 57:ba:e2:c5:00:19:93:04:20:08:43:d9:7a:b8:aa:0b: f4:48:b9:db:ff:78:c8:a5:d2:78:ac:69:ff:84:5a:e9: 58:07:6a:3b:41:a6:57:bf:37:c9:45:36:95:9c:4d:f9: 98:39:2d:59:ff:c3:39:9d:d8:11:67:af:3b:8c:22:a9: 57:af:9a:cd:6d:a5:65:d2:3a:1d:99:bf:a0:af:45:32: 30:af:82:ac:4a:56:b4:4e:ae:97:7b:2c:3f:c4:91:19: db:ff:a4:db:c9:d6:4a:b6:8d:66:b5:e0:42:52:4a:c7: 3f:38:db:b9:38:3d:b6:96:aa:9b:ab:5d:f4:f3:5e:41: de:e4:10:94:13:3b:e1:88:91:5b:96:e8:50:b2:d1:0d: 9b:69:3d:14:2f:de:2e:c4:b2:2e:b5:66:79:7e:7d:ed: 32:c5:95:2a:12:5c:65:d6:22:b2:3e:35:26:49:61:9b: 7d:73:33:90:dc:9e:88:eb:be:3e:99:09:59:74:7a:11: b8:7c:ab:bf:6c:13:a8:97:85:ec:47:f2:2c:15:52:35: 4a:7e:ba:99:cf:dc:25:f6:97:59:6a:d9:a8:81:d2:5c Fingerprint (SHA-256): E9:1B:7A:C2:60:8C:5A:E5:91:DC:AC:28:46:96:80:05:8B:24:C9:A8:E4:21:58:0F:E4:B0:CE:D3:36:1A:2D:97 Fingerprint (SHA1): 63:27:43:0A:31:46:BC:63:24:E9:77:77:FD:C8:5E:C3:FC:24:13:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221164 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221165 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221166 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA1Root-320221057.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320221167 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221164 (0x13162fec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:15:02 2023 Not After : Mon Mar 20 22:15:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:1d:59:d5:29:dd:e5:c4:1f:aa:2f:e2:10:bc:d7:fb: d3:17:86:23:db:93:8d:5e:33:5a:ac:01:33:72:9c:4f: 51:54:19:10:35:1a:fc:3d:8b:01:27:a5:be:7b:31:e7: 07:b2:d3:35:1c:de:63:49:da:0e:c0:85:10:48:1a:eb: 85:1b:d8:76:da:2f:ca:3f:51:cd:4f:81:40:cb:e7:bc: 93:5d:ff:cb:1d:b3:ac:e7:ab:eb:23:e6:38:2c:99:d9: c3:1c:37:bc:31:5d:73:90:ad:32:65:32:4a:85:41:a6: b6:c3:98:2f:a6:9a:41:ed:f6:a4:f7:3e:39:06:be:9b: 0d:f1:69:a6:f6:ef:a2:3c:49:32:14:eb:99:6c:83:a2: 03:c6:61:e5:ec:6f:45:de:7a:15:f0:66:d8:bb:fc:b3: 89:5e:7d:29:4b:0a:86:b4:f1:c3:54:d2:a4:40:ed:a6: 44:3e:3f:2d:83:e9:ec:b9:a3:60:25:b6:04:01:ef:d3: 87:08:82:bf:ef:48:bb:93:9c:42:a4:4b:d2:12:99:87: d4:a0:3d:40:e8:8f:12:9b:d5:43:99:9d:32:24:55:03: 7b:12:5b:58:a9:df:91:f0:1c:7a:28:09:1b:2f:9f:24: 19:b6:c4:3b:99:ef:f7:a8:18:d2:af:de:80:bf:b1:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:ab:55:ba:8c:64:74:ac:89:9a:f2:2f:0d:f1:dc:33: 79:c4:17:73:2e:cd:dc:a6:60:7a:8d:d0:b9:a5:3d:ab: ca:ba:41:6e:64:c8:de:d4:9c:d8:73:15:08:1e:db:b7: 6b:49:6c:7a:cc:45:55:fb:42:17:a0:37:6d:a5:79:ce: d6:28:3f:a0:17:5a:26:ec:34:bd:27:67:f3:d6:f5:16: 46:f9:76:14:de:51:fc:d2:65:ac:91:3e:60:76:d9:5d: 1c:23:30:fc:2b:3e:23:59:9e:b8:ca:2f:c5:fa:89:e2: 6f:df:d4:e8:ca:e4:cf:02:18:be:13:c8:ee:09:20:14: d9:61:83:c3:bd:6a:3a:bb:25:fb:9a:39:01:95:3b:44: 58:75:e3:38:92:69:84:47:60:43:81:6b:4b:47:5f:bc: cb:6f:b2:3d:f8:de:58:69:f0:1c:78:d8:b3:13:65:1d: c3:e2:78:67:80:fa:d8:d7:57:e1:e5:5c:b1:56:79:1f: 30:dd:35:d0:c4:ef:b6:6e:98:f3:24:27:62:d3:00:c3: ed:ed:8a:13:c8:7b:d9:c1:d6:7a:ab:fb:67:8b:a0:80: 50:d1:7e:40:be:20:c2:73:7d:5c:70:dc:04:aa:e8:e2: f5:90:d6:3c:d8:3d:9a:57:ab:d9:99:19:6f:0f:75:cb Fingerprint (SHA-256): 8A:3C:25:E4:9A:C8:5F:C2:17:8E:8C:AD:21:F1:8B:20:A9:90:87:4E:1E:45:7D:A2:7C:ED:47:52:18:7E:E7:27 Fingerprint (SHA1): 62:4D:23:43:7D:3C:4A:42:E0:FA:1C:B3:96:4E:9C:73:CF:35:61:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221168 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221169 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320221170 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320221171 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320221172 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320221058.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221173 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221168 (0x13162ff0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:15:09 2023 Not After : Mon Mar 20 22:15:09 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:92:4e:e6:d8:50:1a:47:b8:f8:6c:0a:43:27:24:0a: 4f:6e:c7:ab:7f:64:3a:08:e0:5a:4f:7f:1e:fb:9e:20: ce:16:6a:9c:57:af:cf:b7:d9:02:69:f0:a2:c8:0f:00: eb:b9:59:30:4f:0d:7e:b3:28:38:3e:06:e7:e3:b5:34: 92:75:8b:00:65:e1:bc:cc:fb:9d:e5:25:95:54:62:99: 0e:ea:ed:3a:0e:5b:51:ed:51:6f:76:5c:aa:48:7a:0b: 11:6e:d1:4b:3e:ac:25:63:40:3a:26:63:45:9a:c9:ec: c1:ac:ee:fc:01:86:08:e9:e7:fb:6f:ec:4f:65:ac:22: 13:d6:e0:65:d2:ab:0d:33:c9:76:5a:30:26:28:24:40: e7:39:b7:99:a1:bd:ff:57:c8:81:f0:95:d4:fe:9c:09: cd:b7:a0:7d:02:f7:b1:63:c4:df:c3:d6:c3:22:01:08: d8:29:f1:10:3c:85:9f:b6:14:cf:e2:00:3d:4e:9e:53: f2:42:70:3c:8a:c6:e5:0a:39:be:3f:97:d6:75:85:cb: 64:39:49:12:7f:d1:f2:a7:12:93:84:dd:66:a7:b8:47: 18:f6:26:99:1e:c7:2b:74:0c:ea:7a:ef:b6:75:df:2b: 27:0d:db:51:83:1a:8e:e9:b0:07:eb:80:00:0e:8b:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:04:97:eb:34:7e:e5:50:b6:32:8b:c4:43:e3:c1:96: 7e:e1:83:ee:87:15:7a:9b:a7:e3:27:8c:5c:66:4d:67: 5d:a4:4c:03:b0:c4:ef:5d:f6:a1:93:d5:f1:ba:fd:3c: bb:ce:8e:2a:e2:14:60:27:dd:b8:1d:6b:a8:73:89:ad: 52:fb:ee:c5:e4:a8:75:5a:a9:1a:53:83:df:68:e4:4a: ee:31:cd:1e:82:04:ba:2b:f4:d0:99:0b:08:48:8b:e6: ac:79:e0:dd:d5:88:a4:39:56:97:38:f7:55:c9:87:5c: 11:3b:22:60:7d:cb:0e:5f:63:9b:1a:3c:d7:5a:b9:e2: 17:5a:87:cd:b6:24:3e:bc:93:b8:5d:97:df:df:b4:9d: 28:4e:14:e3:69:dc:f8:4c:e5:bb:b9:0d:85:a5:fe:99: f6:45:91:b8:ac:4a:84:51:23:16:32:a5:65:4f:58:f1: cf:23:17:ba:5b:e4:36:ed:87:fd:2e:f8:81:0f:18:66: 38:16:f8:b5:be:4d:55:19:3a:14:0a:e3:71:60:8d:d6: 25:0b:11:28:b3:15:4c:9d:37:01:7e:90:aa:82:6c:7e: a2:3c:7f:f0:4f:94:4a:4a:47:54:5f:c9:8a:ff:dc:13: a8:cf:c7:12:f1:3f:54:7c:97:3a:19:72:19:fd:9f:fc Fingerprint (SHA-256): 73:78:A5:3B:C5:D5:80:64:11:7D:08:82:66:5F:50:0D:B0:0F:1C:CC:89:10:51:BB:8C:48:B0:58:0D:C6:73:46 Fingerprint (SHA1): F7:E6:D2:58:F2:C4:E1:33:A1:EC:D3:B3:F4:33:CE:3D:23:35:8C:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221169 (0x13162ff1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:11 2023 Not After : Mon Mar 20 22:15:11 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:a5:03:95:38:67:3f:bf:08:59:66:f2:5c:b5:a8:42: c7:30:1b:9d:ef:2c:11:0a:8c:96:16:41:db:e3:a6:4a: a0:54:16:80:76:5a:47:65:57:87:9b:46:1c:9f:41:c2: bc:60:0d:15:63:bc:fb:9f:ce:2c:24:d5:26:42:62:b9: e5:42:47:32:d5:19:da:8b:e4:d8:66:09:b1:30:aa:95: c3:a1:af:3e:fc:18:15:f2:d7:36:f4:d7:a9:07:69:54: 9a:f0:03:9c:86:fb:fa:17:23:08:27:4d:0b:13:de:ee: fb:9b:55:19:74:09:cd:1a:46:8f:50:fb:8b:8f:d8:f4: 63:a9:48:da:97:2b:ca:4e:42:a6:93:14:e6:ed:df:d3: d0:c1:1d:45:8a:7f:b5:f6:37:3b:ee:6e:f9:3d:15:81: 5a:7f:01:52:f8:32:f5:8f:36:69:7c:38:f6:2f:29:f9: 5c:45:74:eb:e3:c2:1c:8e:c6:7a:46:d0:d9:2a:0a:52: 7e:5e:a4:65:2c:63:01:eb:a4:57:4a:cc:3d:a6:ff:e2: f1:83:e5:1c:a0:f6:7d:de:22:cb:80:ed:bb:69:3a:85: a8:f1:bf:02:7c:db:3f:66:8b:e9:86:62:50:82:f0:6e: 36:51:0f:b5:24:9e:41:b2:24:ba:18:59:c0:a0:06:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:b2:60:89:85:3d:8a:cd:ce:f5:df:0c:3e:8c:ed:c1: 19:5f:71:39:79:34:69:84:73:58:6e:a6:3e:62:6b:c4: e7:93:b1:ca:67:01:7e:15:06:cf:e6:84:fc:62:fe:84: 21:04:ab:88:5a:b9:20:e6:f3:41:ea:e7:4b:c4:b6:12: b8:80:ab:7e:cb:88:f8:ed:c7:a5:ee:57:31:7f:9f:ef: 0d:c1:30:93:b5:62:8f:5c:0d:1a:29:6d:60:95:e6:61: b9:cd:22:bf:7d:86:96:bf:99:6b:b4:72:45:a5:02:3e: 87:62:0f:1c:e0:da:df:bf:7c:44:5e:f8:2c:4f:aa:e8: 9e:e0:cb:74:66:40:82:9f:e6:25:6b:22:80:28:ce:84: 15:1a:8e:b8:ce:53:5f:79:9c:5c:5b:fa:ea:df:dc:22: f8:f6:3c:0a:2e:2d:39:03:4e:34:02:04:9f:87:9e:19: 69:fc:0e:33:42:24:75:75:01:c9:77:7f:e5:60:1b:eb: 96:f8:23:b7:3c:78:09:79:7e:9e:64:e6:cf:95:68:77: 55:34:6a:55:cd:6f:ff:e0:cb:e2:d7:35:1e:04:55:8e: 87:3b:95:82:63:97:c1:fa:8a:4d:8a:e0:d9:86:a6:f9: 5e:50:99:6e:01:19:53:1f:43:5c:cd:fe:33:f0:c6:56 Fingerprint (SHA-256): E0:96:59:07:78:3E:0B:14:8C:F6:0E:EF:32:CB:38:BA:32:DA:60:E2:36:87:60:D8:8C:AA:5D:76:48:8F:4E:94 Fingerprint (SHA1): 92:2E:A0:C4:80:DA:E7:FA:81:F9:56:15:F4:0E:29:CF:3C:33:7C:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221169 (0x13162ff1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:11 2023 Not After : Mon Mar 20 22:15:11 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:a5:03:95:38:67:3f:bf:08:59:66:f2:5c:b5:a8:42: c7:30:1b:9d:ef:2c:11:0a:8c:96:16:41:db:e3:a6:4a: a0:54:16:80:76:5a:47:65:57:87:9b:46:1c:9f:41:c2: bc:60:0d:15:63:bc:fb:9f:ce:2c:24:d5:26:42:62:b9: e5:42:47:32:d5:19:da:8b:e4:d8:66:09:b1:30:aa:95: c3:a1:af:3e:fc:18:15:f2:d7:36:f4:d7:a9:07:69:54: 9a:f0:03:9c:86:fb:fa:17:23:08:27:4d:0b:13:de:ee: fb:9b:55:19:74:09:cd:1a:46:8f:50:fb:8b:8f:d8:f4: 63:a9:48:da:97:2b:ca:4e:42:a6:93:14:e6:ed:df:d3: d0:c1:1d:45:8a:7f:b5:f6:37:3b:ee:6e:f9:3d:15:81: 5a:7f:01:52:f8:32:f5:8f:36:69:7c:38:f6:2f:29:f9: 5c:45:74:eb:e3:c2:1c:8e:c6:7a:46:d0:d9:2a:0a:52: 7e:5e:a4:65:2c:63:01:eb:a4:57:4a:cc:3d:a6:ff:e2: f1:83:e5:1c:a0:f6:7d:de:22:cb:80:ed:bb:69:3a:85: a8:f1:bf:02:7c:db:3f:66:8b:e9:86:62:50:82:f0:6e: 36:51:0f:b5:24:9e:41:b2:24:ba:18:59:c0:a0:06:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:b2:60:89:85:3d:8a:cd:ce:f5:df:0c:3e:8c:ed:c1: 19:5f:71:39:79:34:69:84:73:58:6e:a6:3e:62:6b:c4: e7:93:b1:ca:67:01:7e:15:06:cf:e6:84:fc:62:fe:84: 21:04:ab:88:5a:b9:20:e6:f3:41:ea:e7:4b:c4:b6:12: b8:80:ab:7e:cb:88:f8:ed:c7:a5:ee:57:31:7f:9f:ef: 0d:c1:30:93:b5:62:8f:5c:0d:1a:29:6d:60:95:e6:61: b9:cd:22:bf:7d:86:96:bf:99:6b:b4:72:45:a5:02:3e: 87:62:0f:1c:e0:da:df:bf:7c:44:5e:f8:2c:4f:aa:e8: 9e:e0:cb:74:66:40:82:9f:e6:25:6b:22:80:28:ce:84: 15:1a:8e:b8:ce:53:5f:79:9c:5c:5b:fa:ea:df:dc:22: f8:f6:3c:0a:2e:2d:39:03:4e:34:02:04:9f:87:9e:19: 69:fc:0e:33:42:24:75:75:01:c9:77:7f:e5:60:1b:eb: 96:f8:23:b7:3c:78:09:79:7e:9e:64:e6:cf:95:68:77: 55:34:6a:55:cd:6f:ff:e0:cb:e2:d7:35:1e:04:55:8e: 87:3b:95:82:63:97:c1:fa:8a:4d:8a:e0:d9:86:a6:f9: 5e:50:99:6e:01:19:53:1f:43:5c:cd:fe:33:f0:c6:56 Fingerprint (SHA-256): E0:96:59:07:78:3E:0B:14:8C:F6:0E:EF:32:CB:38:BA:32:DA:60:E2:36:87:60:D8:8C:AA:5D:76:48:8F:4E:94 Fingerprint (SHA1): 92:2E:A0:C4:80:DA:E7:FA:81:F9:56:15:F4:0E:29:CF:3C:33:7C:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221174 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221175 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320221176 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320221177 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320221178 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320221059.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221179 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320221180 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-BridgeNavy-320221060.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320221181 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221174 (0x13162ff6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:15:18 2023 Not After : Mon Mar 20 22:15:18 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:38:0d:bc:e4:87:e3:e6:84:0f:bb:50:dc:aa:0b: 76:c7:93:64:1a:5e:6f:6d:9f:e7:72:02:8c:7d:32:18: e7:5b:7c:6e:75:33:62:d7:e5:eb:c4:fc:1c:b7:89:0d: 2e:ba:1b:ca:26:5e:d7:1f:9d:1c:22:0b:a8:99:8e:d6: 34:6e:26:9a:65:72:9e:11:d4:83:06:9c:09:7d:13:00: 12:76:fc:f1:83:7b:d2:9e:b8:0d:85:19:e7:b4:66:29: a8:48:50:1f:b4:3b:3a:11:ba:74:9a:70:b5:d1:ae:42: 10:9d:d2:bc:12:35:12:42:27:e9:70:06:a4:72:84:76: cf:fb:ae:ab:6a:88:e8:8a:70:a1:bf:54:e1:fc:c1:c7: 5d:86:21:5c:bd:6e:d5:71:9a:0e:58:36:60:9d:ec:cb: fe:05:95:43:e4:af:35:70:9d:42:86:34:f5:1c:39:dd: b5:ca:87:b1:ff:b1:1f:83:12:e0:a3:c3:f7:86:11:86: 39:46:3b:2b:cb:3c:41:8e:d4:18:8b:88:ca:8d:16:05: d8:0f:cc:c7:53:04:95:f3:22:c1:5e:64:75:e0:ec:32: 70:a3:fc:96:98:67:03:20:e1:bd:77:92:c5:e1:a3:c4: e2:74:8d:cc:59:7e:f2:89:41:b2:69:f7:a4:77:63:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:d4:8c:61:39:ea:ad:a8:6b:d3:ea:2b:c1:11:49:bd: e6:76:37:66:ab:7e:1f:de:ae:c1:05:19:1f:b2:23:2e: ab:aa:63:5a:87:cf:ef:9b:3d:21:dd:af:2a:81:af:08: 62:fd:ac:0a:54:31:fe:ce:ba:68:24:fa:d5:60:ad:ae: 49:9d:23:36:ec:67:07:6f:82:1d:d2:98:43:75:69:4e: e2:c2:5e:db:3f:fc:b8:4f:c8:1d:d2:ec:a3:b5:b5:0f: 3a:ac:d2:e0:07:2c:57:98:8a:8c:63:87:7b:70:6d:ea: bb:db:8f:84:53:f9:8d:4b:97:a9:98:a3:43:8a:1c:44: d1:fb:a4:79:f7:e1:8c:70:6b:c0:be:47:90:ae:c3:fa: 7d:19:d4:fa:ff:0a:1a:c0:57:99:5c:96:f5:63:7e:9c: 39:d9:c7:e0:a3:72:44:20:55:7f:da:65:8a:be:52:9d: 4a:13:bd:d0:f1:57:12:f6:65:f0:da:a1:47:2a:fb:aa: 30:e3:57:46:dc:c9:7f:93:a3:07:8b:d8:1d:02:af:4c: da:cb:9b:4f:f8:b1:1d:72:59:d6:ca:fb:dd:ee:4f:be: a5:4e:0c:f6:47:8f:7e:63:77:38:0d:b8:92:34:26:4f: 51:dc:14:af:73:14:e8:73:10:a9:f8:0d:1c:cd:c2:fc Fingerprint (SHA-256): 6F:25:13:56:90:F5:F6:10:7C:66:C0:CF:A0:42:B8:C9:14:F6:90:4A:E2:16:DA:0A:CB:6C:3A:CE:B7:9C:C1:D8 Fingerprint (SHA1): FE:40:A3:3A:5E:75:7B:48:74:A8:25:E4:E8:AB:ED:EF:FB:11:76:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221175 (0x13162ff7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:19 2023 Not After : Mon Mar 20 22:15:19 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:8b:1d:2d:ca:54:e3:9c:3b:9b:51:30:19:80:e5:69: 87:33:a2:f4:94:88:a6:c5:36:e7:10:6f:c5:40:1f:cb: a8:a8:13:ce:4c:db:03:9b:60:41:39:ff:e2:d3:dc:67: d3:d0:0b:fb:a7:4d:10:5e:39:4f:be:ad:39:59:97:53: 82:8f:23:ed:02:7d:85:c0:05:b1:e0:19:a8:54:82:24: 3b:1c:d3:55:f4:9b:b5:ec:c2:30:ef:cf:22:fc:7b:fd: 79:31:37:8c:2b:9f:22:ac:22:76:e6:01:ee:51:f2:4c: 90:df:ab:55:c7:26:b3:ad:b0:bf:33:c3:0c:f8:cd:be: 56:5f:45:a7:a6:40:e2:6c:84:b7:05:54:d9:be:1f:c2: 5f:18:1b:89:5e:b4:3c:22:b7:49:52:4b:38:2d:d5:0d: b0:05:a9:7e:18:be:d6:e0:c1:ca:74:5e:4f:ce:9e:86: 11:fd:ac:2e:43:e0:c6:11:77:1f:ca:0f:19:c5:5e:12: d0:80:ab:2d:b8:04:df:d8:23:39:72:33:37:72:c6:08: 44:f0:f3:2e:93:0e:39:dd:74:18:66:4c:97:64:e5:d5: e8:69:54:23:9f:fc:aa:b8:77:b4:11:36:1b:ea:3d:30: 3d:d7:d3:97:29:81:76:9d:df:21:85:0c:17:7e:66:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:6d:fe:a9:42:3b:12:b6:51:9d:5c:73:f0:e1:dc:f9: 35:ff:2d:5f:8c:1b:e7:14:c3:45:5e:b5:c1:30:4a:7a: 45:c6:9a:1e:4f:88:f3:0c:b5:07:5c:c8:9b:d4:2e:f7: a5:c7:3a:9b:f4:39:dd:05:5b:4f:5e:de:ce:41:cf:eb: 8f:2d:35:71:85:38:0d:47:18:c6:fe:b4:41:3a:da:91: cf:23:0a:bf:d3:f7:f9:6d:00:1b:9b:10:95:ff:59:af: 68:1e:93:a0:ba:82:7b:17:78:35:a2:aa:1d:40:d6:1c: cb:99:45:0b:c5:e8:4b:34:45:52:ef:48:96:27:e9:c0: b8:28:75:00:fc:96:d6:61:3b:52:8a:69:0a:c2:51:55: ed:ba:47:a1:fa:6f:68:ce:47:79:dd:f9:24:a2:cf:e4: a0:f9:ea:95:e2:a7:27:7e:fd:2d:c0:0b:b6:61:4e:ae: d0:c6:5a:fd:58:e9:0d:c2:82:14:6f:f3:bc:e7:c2:de: 14:d4:cb:71:19:f5:e5:fb:9f:f5:5d:49:a9:0f:e5:c6: 9d:e9:12:53:5f:7f:08:7d:e5:f7:5e:e4:46:43:f0:c1: 06:d5:45:93:a7:bf:fa:d4:4e:89:29:74:54:fc:c3:31: 74:b1:14:79:2d:3d:d8:35:cf:b1:c1:f8:08:ea:53:70 Fingerprint (SHA-256): 06:BB:BA:75:E1:E0:F1:26:CB:70:B6:1D:E6:DD:0F:2D:E2:B4:0C:DC:84:A1:93:2A:BD:6E:28:B7:9D:9B:4C:3A Fingerprint (SHA1): 58:F0:4B:B8:6B:BB:0E:A5:19:85:8C:C2:61:EF:74:37:A2:79:41:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221175 (0x13162ff7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:19 2023 Not After : Mon Mar 20 22:15:19 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:8b:1d:2d:ca:54:e3:9c:3b:9b:51:30:19:80:e5:69: 87:33:a2:f4:94:88:a6:c5:36:e7:10:6f:c5:40:1f:cb: a8:a8:13:ce:4c:db:03:9b:60:41:39:ff:e2:d3:dc:67: d3:d0:0b:fb:a7:4d:10:5e:39:4f:be:ad:39:59:97:53: 82:8f:23:ed:02:7d:85:c0:05:b1:e0:19:a8:54:82:24: 3b:1c:d3:55:f4:9b:b5:ec:c2:30:ef:cf:22:fc:7b:fd: 79:31:37:8c:2b:9f:22:ac:22:76:e6:01:ee:51:f2:4c: 90:df:ab:55:c7:26:b3:ad:b0:bf:33:c3:0c:f8:cd:be: 56:5f:45:a7:a6:40:e2:6c:84:b7:05:54:d9:be:1f:c2: 5f:18:1b:89:5e:b4:3c:22:b7:49:52:4b:38:2d:d5:0d: b0:05:a9:7e:18:be:d6:e0:c1:ca:74:5e:4f:ce:9e:86: 11:fd:ac:2e:43:e0:c6:11:77:1f:ca:0f:19:c5:5e:12: d0:80:ab:2d:b8:04:df:d8:23:39:72:33:37:72:c6:08: 44:f0:f3:2e:93:0e:39:dd:74:18:66:4c:97:64:e5:d5: e8:69:54:23:9f:fc:aa:b8:77:b4:11:36:1b:ea:3d:30: 3d:d7:d3:97:29:81:76:9d:df:21:85:0c:17:7e:66:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:6d:fe:a9:42:3b:12:b6:51:9d:5c:73:f0:e1:dc:f9: 35:ff:2d:5f:8c:1b:e7:14:c3:45:5e:b5:c1:30:4a:7a: 45:c6:9a:1e:4f:88:f3:0c:b5:07:5c:c8:9b:d4:2e:f7: a5:c7:3a:9b:f4:39:dd:05:5b:4f:5e:de:ce:41:cf:eb: 8f:2d:35:71:85:38:0d:47:18:c6:fe:b4:41:3a:da:91: cf:23:0a:bf:d3:f7:f9:6d:00:1b:9b:10:95:ff:59:af: 68:1e:93:a0:ba:82:7b:17:78:35:a2:aa:1d:40:d6:1c: cb:99:45:0b:c5:e8:4b:34:45:52:ef:48:96:27:e9:c0: b8:28:75:00:fc:96:d6:61:3b:52:8a:69:0a:c2:51:55: ed:ba:47:a1:fa:6f:68:ce:47:79:dd:f9:24:a2:cf:e4: a0:f9:ea:95:e2:a7:27:7e:fd:2d:c0:0b:b6:61:4e:ae: d0:c6:5a:fd:58:e9:0d:c2:82:14:6f:f3:bc:e7:c2:de: 14:d4:cb:71:19:f5:e5:fb:9f:f5:5d:49:a9:0f:e5:c6: 9d:e9:12:53:5f:7f:08:7d:e5:f7:5e:e4:46:43:f0:c1: 06:d5:45:93:a7:bf:fa:d4:4e:89:29:74:54:fc:c3:31: 74:b1:14:79:2d:3d:d8:35:cf:b1:c1:f8:08:ea:53:70 Fingerprint (SHA-256): 06:BB:BA:75:E1:E0:F1:26:CB:70:B6:1D:E6:DD:0F:2D:E2:B4:0C:DC:84:A1:93:2A:BD:6E:28:B7:9D:9B:4C:3A Fingerprint (SHA1): 58:F0:4B:B8:6B:BB:0E:A5:19:85:8C:C2:61:EF:74:37:A2:79:41:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221174 (0x13162ff6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:15:18 2023 Not After : Mon Mar 20 22:15:18 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:38:0d:bc:e4:87:e3:e6:84:0f:bb:50:dc:aa:0b: 76:c7:93:64:1a:5e:6f:6d:9f:e7:72:02:8c:7d:32:18: e7:5b:7c:6e:75:33:62:d7:e5:eb:c4:fc:1c:b7:89:0d: 2e:ba:1b:ca:26:5e:d7:1f:9d:1c:22:0b:a8:99:8e:d6: 34:6e:26:9a:65:72:9e:11:d4:83:06:9c:09:7d:13:00: 12:76:fc:f1:83:7b:d2:9e:b8:0d:85:19:e7:b4:66:29: a8:48:50:1f:b4:3b:3a:11:ba:74:9a:70:b5:d1:ae:42: 10:9d:d2:bc:12:35:12:42:27:e9:70:06:a4:72:84:76: cf:fb:ae:ab:6a:88:e8:8a:70:a1:bf:54:e1:fc:c1:c7: 5d:86:21:5c:bd:6e:d5:71:9a:0e:58:36:60:9d:ec:cb: fe:05:95:43:e4:af:35:70:9d:42:86:34:f5:1c:39:dd: b5:ca:87:b1:ff:b1:1f:83:12:e0:a3:c3:f7:86:11:86: 39:46:3b:2b:cb:3c:41:8e:d4:18:8b:88:ca:8d:16:05: d8:0f:cc:c7:53:04:95:f3:22:c1:5e:64:75:e0:ec:32: 70:a3:fc:96:98:67:03:20:e1:bd:77:92:c5:e1:a3:c4: e2:74:8d:cc:59:7e:f2:89:41:b2:69:f7:a4:77:63:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:d4:8c:61:39:ea:ad:a8:6b:d3:ea:2b:c1:11:49:bd: e6:76:37:66:ab:7e:1f:de:ae:c1:05:19:1f:b2:23:2e: ab:aa:63:5a:87:cf:ef:9b:3d:21:dd:af:2a:81:af:08: 62:fd:ac:0a:54:31:fe:ce:ba:68:24:fa:d5:60:ad:ae: 49:9d:23:36:ec:67:07:6f:82:1d:d2:98:43:75:69:4e: e2:c2:5e:db:3f:fc:b8:4f:c8:1d:d2:ec:a3:b5:b5:0f: 3a:ac:d2:e0:07:2c:57:98:8a:8c:63:87:7b:70:6d:ea: bb:db:8f:84:53:f9:8d:4b:97:a9:98:a3:43:8a:1c:44: d1:fb:a4:79:f7:e1:8c:70:6b:c0:be:47:90:ae:c3:fa: 7d:19:d4:fa:ff:0a:1a:c0:57:99:5c:96:f5:63:7e:9c: 39:d9:c7:e0:a3:72:44:20:55:7f:da:65:8a:be:52:9d: 4a:13:bd:d0:f1:57:12:f6:65:f0:da:a1:47:2a:fb:aa: 30:e3:57:46:dc:c9:7f:93:a3:07:8b:d8:1d:02:af:4c: da:cb:9b:4f:f8:b1:1d:72:59:d6:ca:fb:dd:ee:4f:be: a5:4e:0c:f6:47:8f:7e:63:77:38:0d:b8:92:34:26:4f: 51:dc:14:af:73:14:e8:73:10:a9:f8:0d:1c:cd:c2:fc Fingerprint (SHA-256): 6F:25:13:56:90:F5:F6:10:7C:66:C0:CF:A0:42:B8:C9:14:F6:90:4A:E2:16:DA:0A:CB:6C:3A:CE:B7:9C:C1:D8 Fingerprint (SHA1): FE:40:A3:3A:5E:75:7B:48:74:A8:25:E4:E8:AB:ED:EF:FB:11:76:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221175 (0x13162ff7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:19 2023 Not After : Mon Mar 20 22:15:19 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:8b:1d:2d:ca:54:e3:9c:3b:9b:51:30:19:80:e5:69: 87:33:a2:f4:94:88:a6:c5:36:e7:10:6f:c5:40:1f:cb: a8:a8:13:ce:4c:db:03:9b:60:41:39:ff:e2:d3:dc:67: d3:d0:0b:fb:a7:4d:10:5e:39:4f:be:ad:39:59:97:53: 82:8f:23:ed:02:7d:85:c0:05:b1:e0:19:a8:54:82:24: 3b:1c:d3:55:f4:9b:b5:ec:c2:30:ef:cf:22:fc:7b:fd: 79:31:37:8c:2b:9f:22:ac:22:76:e6:01:ee:51:f2:4c: 90:df:ab:55:c7:26:b3:ad:b0:bf:33:c3:0c:f8:cd:be: 56:5f:45:a7:a6:40:e2:6c:84:b7:05:54:d9:be:1f:c2: 5f:18:1b:89:5e:b4:3c:22:b7:49:52:4b:38:2d:d5:0d: b0:05:a9:7e:18:be:d6:e0:c1:ca:74:5e:4f:ce:9e:86: 11:fd:ac:2e:43:e0:c6:11:77:1f:ca:0f:19:c5:5e:12: d0:80:ab:2d:b8:04:df:d8:23:39:72:33:37:72:c6:08: 44:f0:f3:2e:93:0e:39:dd:74:18:66:4c:97:64:e5:d5: e8:69:54:23:9f:fc:aa:b8:77:b4:11:36:1b:ea:3d:30: 3d:d7:d3:97:29:81:76:9d:df:21:85:0c:17:7e:66:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:6d:fe:a9:42:3b:12:b6:51:9d:5c:73:f0:e1:dc:f9: 35:ff:2d:5f:8c:1b:e7:14:c3:45:5e:b5:c1:30:4a:7a: 45:c6:9a:1e:4f:88:f3:0c:b5:07:5c:c8:9b:d4:2e:f7: a5:c7:3a:9b:f4:39:dd:05:5b:4f:5e:de:ce:41:cf:eb: 8f:2d:35:71:85:38:0d:47:18:c6:fe:b4:41:3a:da:91: cf:23:0a:bf:d3:f7:f9:6d:00:1b:9b:10:95:ff:59:af: 68:1e:93:a0:ba:82:7b:17:78:35:a2:aa:1d:40:d6:1c: cb:99:45:0b:c5:e8:4b:34:45:52:ef:48:96:27:e9:c0: b8:28:75:00:fc:96:d6:61:3b:52:8a:69:0a:c2:51:55: ed:ba:47:a1:fa:6f:68:ce:47:79:dd:f9:24:a2:cf:e4: a0:f9:ea:95:e2:a7:27:7e:fd:2d:c0:0b:b6:61:4e:ae: d0:c6:5a:fd:58:e9:0d:c2:82:14:6f:f3:bc:e7:c2:de: 14:d4:cb:71:19:f5:e5:fb:9f:f5:5d:49:a9:0f:e5:c6: 9d:e9:12:53:5f:7f:08:7d:e5:f7:5e:e4:46:43:f0:c1: 06:d5:45:93:a7:bf:fa:d4:4e:89:29:74:54:fc:c3:31: 74:b1:14:79:2d:3d:d8:35:cf:b1:c1:f8:08:ea:53:70 Fingerprint (SHA-256): 06:BB:BA:75:E1:E0:F1:26:CB:70:B6:1D:E6:DD:0F:2D:E2:B4:0C:DC:84:A1:93:2A:BD:6E:28:B7:9D:9B:4C:3A Fingerprint (SHA1): 58:F0:4B:B8:6B:BB:0E:A5:19:85:8C:C2:61:EF:74:37:A2:79:41:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221175 (0x13162ff7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:19 2023 Not After : Mon Mar 20 22:15:19 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:8b:1d:2d:ca:54:e3:9c:3b:9b:51:30:19:80:e5:69: 87:33:a2:f4:94:88:a6:c5:36:e7:10:6f:c5:40:1f:cb: a8:a8:13:ce:4c:db:03:9b:60:41:39:ff:e2:d3:dc:67: d3:d0:0b:fb:a7:4d:10:5e:39:4f:be:ad:39:59:97:53: 82:8f:23:ed:02:7d:85:c0:05:b1:e0:19:a8:54:82:24: 3b:1c:d3:55:f4:9b:b5:ec:c2:30:ef:cf:22:fc:7b:fd: 79:31:37:8c:2b:9f:22:ac:22:76:e6:01:ee:51:f2:4c: 90:df:ab:55:c7:26:b3:ad:b0:bf:33:c3:0c:f8:cd:be: 56:5f:45:a7:a6:40:e2:6c:84:b7:05:54:d9:be:1f:c2: 5f:18:1b:89:5e:b4:3c:22:b7:49:52:4b:38:2d:d5:0d: b0:05:a9:7e:18:be:d6:e0:c1:ca:74:5e:4f:ce:9e:86: 11:fd:ac:2e:43:e0:c6:11:77:1f:ca:0f:19:c5:5e:12: d0:80:ab:2d:b8:04:df:d8:23:39:72:33:37:72:c6:08: 44:f0:f3:2e:93:0e:39:dd:74:18:66:4c:97:64:e5:d5: e8:69:54:23:9f:fc:aa:b8:77:b4:11:36:1b:ea:3d:30: 3d:d7:d3:97:29:81:76:9d:df:21:85:0c:17:7e:66:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:6d:fe:a9:42:3b:12:b6:51:9d:5c:73:f0:e1:dc:f9: 35:ff:2d:5f:8c:1b:e7:14:c3:45:5e:b5:c1:30:4a:7a: 45:c6:9a:1e:4f:88:f3:0c:b5:07:5c:c8:9b:d4:2e:f7: a5:c7:3a:9b:f4:39:dd:05:5b:4f:5e:de:ce:41:cf:eb: 8f:2d:35:71:85:38:0d:47:18:c6:fe:b4:41:3a:da:91: cf:23:0a:bf:d3:f7:f9:6d:00:1b:9b:10:95:ff:59:af: 68:1e:93:a0:ba:82:7b:17:78:35:a2:aa:1d:40:d6:1c: cb:99:45:0b:c5:e8:4b:34:45:52:ef:48:96:27:e9:c0: b8:28:75:00:fc:96:d6:61:3b:52:8a:69:0a:c2:51:55: ed:ba:47:a1:fa:6f:68:ce:47:79:dd:f9:24:a2:cf:e4: a0:f9:ea:95:e2:a7:27:7e:fd:2d:c0:0b:b6:61:4e:ae: d0:c6:5a:fd:58:e9:0d:c2:82:14:6f:f3:bc:e7:c2:de: 14:d4:cb:71:19:f5:e5:fb:9f:f5:5d:49:a9:0f:e5:c6: 9d:e9:12:53:5f:7f:08:7d:e5:f7:5e:e4:46:43:f0:c1: 06:d5:45:93:a7:bf:fa:d4:4e:89:29:74:54:fc:c3:31: 74:b1:14:79:2d:3d:d8:35:cf:b1:c1:f8:08:ea:53:70 Fingerprint (SHA-256): 06:BB:BA:75:E1:E0:F1:26:CB:70:B6:1D:E6:DD:0F:2D:E2:B4:0C:DC:84:A1:93:2A:BD:6E:28:B7:9D:9B:4C:3A Fingerprint (SHA1): 58:F0:4B:B8:6B:BB:0E:A5:19:85:8C:C2:61:EF:74:37:A2:79:41:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221182 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221183 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 320221184 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 320221185 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 320221186 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 320221187 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320221188 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320221189 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221190 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320221191 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221182 (0x13162ffe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:15:31 2023 Not After : Mon Mar 20 22:15:31 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b2:65:b4:39:c3:01:b7:14:56:9d:ca:93:93:7c:ed: 3d:5b:04:ba:1b:a1:da:ad:56:63:18:dc:63:36:fe:bd: 73:0b:47:05:92:cf:cc:71:af:a3:f9:58:8f:c7:7b:d4: e4:22:25:bc:3a:9d:b0:d2:3f:9f:9a:05:c7:95:9f:44: 30:e9:11:be:f3:1b:28:72:4b:75:1d:5f:3c:98:a8:7c: 60:e2:19:31:d9:da:dc:e9:5b:26:45:9a:85:41:41:1a: 16:33:39:67:41:ef:f0:3f:7a:f2:98:26:e9:88:d0:4c: 4a:2d:f9:b6:cc:fc:fe:67:d3:8e:0c:41:16:82:ee:89: 96:2d:a2:57:8e:fa:ae:fa:a7:25:56:d1:de:79:e0:5d: d8:88:ab:92:14:d3:b8:7a:95:9d:95:f4:7e:00:4e:61: db:6e:b4:f2:69:66:46:f2:d3:d9:a5:b9:20:d8:a6:3f: db:f5:08:bd:46:e0:34:94:87:78:59:fb:88:86:7f:c9: 75:e9:19:e4:ff:79:b6:2c:ac:6c:69:2a:75:17:25:c1: 92:01:79:7f:f6:0b:c0:6b:4a:2b:53:d4:97:43:39:d7: 17:0c:dc:f5:5d:6f:77:37:f9:ec:00:44:59:e1:cf:ad: 2c:91:85:f5:e9:9d:95:85:ee:ba:27:ed:ec:a3:47:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:1f:de:94:e4:c1:ba:db:9f:61:01:b2:23:45:81:57: 02:f1:18:ea:fd:6d:df:4b:f4:8c:12:35:4a:75:64:4c: 3e:3e:df:36:9c:09:e5:89:b8:05:4d:9f:1f:de:61:6b: ac:1b:bf:06:c0:78:8f:f2:4b:e6:7a:ca:b5:4b:74:96: 8c:44:95:03:b4:cd:9d:0b:25:ce:34:9f:e8:de:6e:17: fa:10:76:f0:bf:40:ba:cf:a8:6e:1d:e1:9c:03:5a:cf: 6b:01:fa:ef:2e:da:e3:6c:d2:a6:26:4a:d9:74:56:b2: 41:d7:6b:2a:c8:bf:d7:90:b2:d2:b8:e2:14:d8:79:1e: ae:27:d9:fe:6d:1c:a8:01:a8:0f:ce:10:7c:34:c2:aa: 9f:30:7d:b2:21:a9:36:b9:12:60:83:00:6c:21:af:70: 9f:4e:f4:37:f5:4f:4f:16:e5:5b:4f:0b:66:3c:9e:4f: 66:38:67:a3:e1:af:27:7c:bc:4f:25:a9:02:68:20:aa: 6e:15:0f:c8:5a:f8:7d:78:c4:d2:6e:c7:72:66:88:3f: 4f:d5:ca:95:52:68:ba:df:46:9a:76:f3:c7:2d:2c:bd: 79:ba:77:a2:e9:5b:83:f1:67:3b:95:60:59:75:dc:5f: df:a1:8a:14:8f:76:49:a7:2c:c3:17:ca:3d:43:d4:2e Fingerprint (SHA-256): F6:1F:29:71:74:9D:76:7A:4C:D9:E5:D1:94:F0:2C:70:AB:AC:01:7D:2B:C0:5A:16:EF:5E:80:B8:57:B8:D2:4E Fingerprint (SHA1): 1E:71:42:18:4E:89:37:AD:D0:BA:1F:AC:74:83:BA:36:B7:36:5D:61 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221183 (0x13162fff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:15:32 2023 Not After : Mon Mar 20 22:15:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:82:6c:c5:80:c1:12:02:9f:1d:b7:bb:86:c5:b2:f0: a4:51:8d:78:b1:a9:42:e5:f2:ff:be:d7:0f:4a:28:60: 82:c6:c8:d6:9b:62:d1:67:32:38:f7:4e:f7:a6:46:dc: e5:31:55:da:9b:48:13:a4:8b:3a:5f:70:27:ff:a5:c0: 46:62:5e:a6:92:6a:d1:b9:61:92:9a:59:d1:2b:3b:42: e6:b1:a7:58:4b:d2:4e:0a:15:58:0f:cc:fc:a1:0d:f0: 1a:28:d5:e5:12:4d:07:1f:36:8e:6d:9c:a4:d3:51:87: 2a:2f:0c:d4:24:a5:79:24:29:3e:82:f9:d4:99:0e:ab: 12:f6:b5:65:1a:fa:0e:48:90:9d:44:f9:3e:10:15:4c: 46:3d:5b:1a:40:70:73:73:2f:de:aa:e4:e5:a8:0d:58: 48:7b:ed:7f:7f:9d:b6:d1:c4:41:cb:e1:c7:a8:32:6e: 51:75:42:35:39:54:4c:39:ba:96:58:5d:b4:99:68:5c: 6a:5b:ef:98:70:45:40:01:07:a4:44:12:1d:ee:44:dd: 97:c6:e2:ba:c1:be:cc:af:79:cf:10:9b:74:ce:90:98: 81:18:8b:d8:db:b1:b0:da:68:91:71:0e:09:95:c9:1c: d5:44:06:62:53:1e:a5:54:7d:a5:5b:fd:ce:56:bc:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:b9:0f:d0:c2:88:35:51:7a:0d:a4:2b:4e:f7:86:1b: 59:24:79:22:ef:1b:58:51:66:91:c5:c9:ad:e3:22:c6: b3:c1:4b:ec:7b:02:6c:9b:d7:0a:0b:0f:dd:0a:a7:57: 99:3f:80:49:50:78:8d:32:17:07:60:af:ca:32:41:51: 03:f1:88:27:47:88:7e:f9:8b:32:7c:b3:60:76:c7:32: 4e:d2:79:8d:ff:32:d4:cf:1e:47:d4:d8:f8:ef:c2:01: a7:91:ef:07:7d:ad:b1:94:e6:85:66:6c:21:54:03:f6: be:82:3b:33:eb:ff:2f:f6:d7:75:3c:e6:0a:69:ed:b5: 1f:d8:66:c8:e3:97:8d:53:39:24:ca:8e:c6:ed:1f:3b: 21:bb:fc:8e:0d:f8:5a:f4:df:6e:84:53:ea:6c:95:89: 4c:98:26:1f:3c:14:00:32:51:45:bd:87:84:71:be:d1: 2b:3f:70:e7:6e:9f:bc:99:72:ba:1d:32:54:03:09:4a: 1b:3a:18:a4:78:4d:cd:c7:bf:5e:83:0b:9e:83:cd:4b: 5d:40:78:31:64:e6:42:5e:d0:a0:48:18:f4:b4:77:b4: 22:19:8d:68:58:be:c2:ce:fc:ae:8e:94:65:f3:1d:aa: 1c:0a:ab:fb:c5:fb:db:98:2e:5b:62:97:1a:aa:d1:97 Fingerprint (SHA-256): DA:A0:06:53:B7:78:27:7B:57:EE:16:02:B1:27:6B:B5:E1:B3:E7:B6:BB:E6:52:6F:41:C7:83:B7:08:7D:A6:7B Fingerprint (SHA1): 68:55:54:F9:49:3F:46:FB:AC:19:31:31:8E:E0:F4:C6:85:65:8D:C3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221192 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221193 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221194 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 320221195 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320221196 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 320221197 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 320221198 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 320221199 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 320221200 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221192 (0x13163008) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:15:49 2023 Not After : Mon Mar 20 22:15:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 17:fe:66:fc:42:1e:28:b8:d7:30:97:84:55:81:14:7f: ee:a8:2f:88:0a:33:5d:6d:7a:ba:bd:c9:7f:61:a2:96: 8c:8e:c7:f5:df:12:14:93:4b:9e:a7:46:6f:d4:18:2c: d1:3f:f9:ed:28:14:82:51:3b:48:5a:7b:d9:63:37:f9: 14:67:2e:d9:d5:56:92:d9:44:4b:83:b3:d7:d4:76:1f: 2e:3a:b7:c0:fb:e4:7a:d0:f2:84:23:77:d2:40:d6:86: cf:dd:76:29:04:73:27:b5:74:78:71:ce:07:47:a7:86: 42:63:63:81:4d:ab:a9:62:18:d1:d0:ec:8f:07:b6:0a: 90:1e:4e:85:93:2f:83:00:c6:76:39:ea:1e:c7:f0:8c: 54:13:05:29:5d:29:1b:f1:20:97:29:eb:5a:43:f5:f2: ab:fc:13:47:79:5d:c0:29:05:bf:3b:ad:10:0f:9a:a6: d8:ab:5a:ba:65:c1:a1:2e:4a:9a:9d:8b:6d:a9:0e:72: f3:52:59:4a:56:e5:74:0d:4d:5e:d0:af:a8:ff:f1:df: 21:08:b9:0c:2b:66:0f:04:28:24:e8:75:1d:61:34:87: 25:df:b9:63:71:e6:28:0f:e0:32:52:d6:86:8d:8c:88: 28:35:f3:e9:a6:dc:6d:77:88:69:41:dc:d5:ef:6a:7b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:d7:1b:b8:0f:a6:32:c2:d5:14:b1:8f: 14:f1:3f:50:ce:8a:94:50:b7:cd:14:92:8b:ef:56:9b: 86:02:1d:00:e4:bd:ca:e2:72:90:47:29:31:d7:4f:b0: 89:06:4f:4c:82:26:bc:d4:bd:2b:f0:71:5a:74:5b:cb Fingerprint (SHA-256): 1B:F8:2E:94:29:FE:07:35:D3:DC:61:7A:54:66:4A:9C:BA:7E:09:CC:0A:E2:B8:03:F8:B8:A8:81:C4:C9:9C:B4 Fingerprint (SHA1): 72:D8:62:FE:D4:F7:B1:BD:1E:5A:94:9F:88:FB:CC:DD:D9:9B:56:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221192 (0x13163008) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:15:49 2023 Not After : Mon Mar 20 22:15:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 17:fe:66:fc:42:1e:28:b8:d7:30:97:84:55:81:14:7f: ee:a8:2f:88:0a:33:5d:6d:7a:ba:bd:c9:7f:61:a2:96: 8c:8e:c7:f5:df:12:14:93:4b:9e:a7:46:6f:d4:18:2c: d1:3f:f9:ed:28:14:82:51:3b:48:5a:7b:d9:63:37:f9: 14:67:2e:d9:d5:56:92:d9:44:4b:83:b3:d7:d4:76:1f: 2e:3a:b7:c0:fb:e4:7a:d0:f2:84:23:77:d2:40:d6:86: cf:dd:76:29:04:73:27:b5:74:78:71:ce:07:47:a7:86: 42:63:63:81:4d:ab:a9:62:18:d1:d0:ec:8f:07:b6:0a: 90:1e:4e:85:93:2f:83:00:c6:76:39:ea:1e:c7:f0:8c: 54:13:05:29:5d:29:1b:f1:20:97:29:eb:5a:43:f5:f2: ab:fc:13:47:79:5d:c0:29:05:bf:3b:ad:10:0f:9a:a6: d8:ab:5a:ba:65:c1:a1:2e:4a:9a:9d:8b:6d:a9:0e:72: f3:52:59:4a:56:e5:74:0d:4d:5e:d0:af:a8:ff:f1:df: 21:08:b9:0c:2b:66:0f:04:28:24:e8:75:1d:61:34:87: 25:df:b9:63:71:e6:28:0f:e0:32:52:d6:86:8d:8c:88: 28:35:f3:e9:a6:dc:6d:77:88:69:41:dc:d5:ef:6a:7b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:d7:1b:b8:0f:a6:32:c2:d5:14:b1:8f: 14:f1:3f:50:ce:8a:94:50:b7:cd:14:92:8b:ef:56:9b: 86:02:1d:00:e4:bd:ca:e2:72:90:47:29:31:d7:4f:b0: 89:06:4f:4c:82:26:bc:d4:bd:2b:f0:71:5a:74:5b:cb Fingerprint (SHA-256): 1B:F8:2E:94:29:FE:07:35:D3:DC:61:7A:54:66:4A:9C:BA:7E:09:CC:0A:E2:B8:03:F8:B8:A8:81:C4:C9:9C:B4 Fingerprint (SHA1): 72:D8:62:FE:D4:F7:B1:BD:1E:5A:94:9F:88:FB:CC:DD:D9:9B:56:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221192 (0x13163008) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:15:49 2023 Not After : Mon Mar 20 22:15:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 17:fe:66:fc:42:1e:28:b8:d7:30:97:84:55:81:14:7f: ee:a8:2f:88:0a:33:5d:6d:7a:ba:bd:c9:7f:61:a2:96: 8c:8e:c7:f5:df:12:14:93:4b:9e:a7:46:6f:d4:18:2c: d1:3f:f9:ed:28:14:82:51:3b:48:5a:7b:d9:63:37:f9: 14:67:2e:d9:d5:56:92:d9:44:4b:83:b3:d7:d4:76:1f: 2e:3a:b7:c0:fb:e4:7a:d0:f2:84:23:77:d2:40:d6:86: cf:dd:76:29:04:73:27:b5:74:78:71:ce:07:47:a7:86: 42:63:63:81:4d:ab:a9:62:18:d1:d0:ec:8f:07:b6:0a: 90:1e:4e:85:93:2f:83:00:c6:76:39:ea:1e:c7:f0:8c: 54:13:05:29:5d:29:1b:f1:20:97:29:eb:5a:43:f5:f2: ab:fc:13:47:79:5d:c0:29:05:bf:3b:ad:10:0f:9a:a6: d8:ab:5a:ba:65:c1:a1:2e:4a:9a:9d:8b:6d:a9:0e:72: f3:52:59:4a:56:e5:74:0d:4d:5e:d0:af:a8:ff:f1:df: 21:08:b9:0c:2b:66:0f:04:28:24:e8:75:1d:61:34:87: 25:df:b9:63:71:e6:28:0f:e0:32:52:d6:86:8d:8c:88: 28:35:f3:e9:a6:dc:6d:77:88:69:41:dc:d5:ef:6a:7b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:d7:1b:b8:0f:a6:32:c2:d5:14:b1:8f: 14:f1:3f:50:ce:8a:94:50:b7:cd:14:92:8b:ef:56:9b: 86:02:1d:00:e4:bd:ca:e2:72:90:47:29:31:d7:4f:b0: 89:06:4f:4c:82:26:bc:d4:bd:2b:f0:71:5a:74:5b:cb Fingerprint (SHA-256): 1B:F8:2E:94:29:FE:07:35:D3:DC:61:7A:54:66:4A:9C:BA:7E:09:CC:0A:E2:B8:03:F8:B8:A8:81:C4:C9:9C:B4 Fingerprint (SHA1): 72:D8:62:FE:D4:F7:B1:BD:1E:5A:94:9F:88:FB:CC:DD:D9:9B:56:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221192 (0x13163008) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:15:49 2023 Not After : Mon Mar 20 22:15:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 17:fe:66:fc:42:1e:28:b8:d7:30:97:84:55:81:14:7f: ee:a8:2f:88:0a:33:5d:6d:7a:ba:bd:c9:7f:61:a2:96: 8c:8e:c7:f5:df:12:14:93:4b:9e:a7:46:6f:d4:18:2c: d1:3f:f9:ed:28:14:82:51:3b:48:5a:7b:d9:63:37:f9: 14:67:2e:d9:d5:56:92:d9:44:4b:83:b3:d7:d4:76:1f: 2e:3a:b7:c0:fb:e4:7a:d0:f2:84:23:77:d2:40:d6:86: cf:dd:76:29:04:73:27:b5:74:78:71:ce:07:47:a7:86: 42:63:63:81:4d:ab:a9:62:18:d1:d0:ec:8f:07:b6:0a: 90:1e:4e:85:93:2f:83:00:c6:76:39:ea:1e:c7:f0:8c: 54:13:05:29:5d:29:1b:f1:20:97:29:eb:5a:43:f5:f2: ab:fc:13:47:79:5d:c0:29:05:bf:3b:ad:10:0f:9a:a6: d8:ab:5a:ba:65:c1:a1:2e:4a:9a:9d:8b:6d:a9:0e:72: f3:52:59:4a:56:e5:74:0d:4d:5e:d0:af:a8:ff:f1:df: 21:08:b9:0c:2b:66:0f:04:28:24:e8:75:1d:61:34:87: 25:df:b9:63:71:e6:28:0f:e0:32:52:d6:86:8d:8c:88: 28:35:f3:e9:a6:dc:6d:77:88:69:41:dc:d5:ef:6a:7b Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:d7:1b:b8:0f:a6:32:c2:d5:14:b1:8f: 14:f1:3f:50:ce:8a:94:50:b7:cd:14:92:8b:ef:56:9b: 86:02:1d:00:e4:bd:ca:e2:72:90:47:29:31:d7:4f:b0: 89:06:4f:4c:82:26:bc:d4:bd:2b:f0:71:5a:74:5b:cb Fingerprint (SHA-256): 1B:F8:2E:94:29:FE:07:35:D3:DC:61:7A:54:66:4A:9C:BA:7E:09:CC:0A:E2:B8:03:F8:B8:A8:81:C4:C9:9C:B4 Fingerprint (SHA1): 72:D8:62:FE:D4:F7:B1:BD:1E:5A:94:9F:88:FB:CC:DD:D9:9B:56:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320221610Z nextupdate=20240320221610Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 22:16:10 2023 Next Update: Wed Mar 20 22:16:10 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320221611Z nextupdate=20240320221611Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:16:11 2023 Next Update: Wed Mar 20 22:16:11 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320221611Z nextupdate=20240320221611Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 22:16:11 2023 Next Update: Wed Mar 20 22:16:11 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320221611Z nextupdate=20240320221611Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 22:16:11 2023 Next Update: Wed Mar 20 22:16:11 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320221612Z addcert 14 20230320221612Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 22:16:12 2023 Next Update: Wed Mar 20 22:16:11 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 20 22:16:12 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320221613Z addcert 15 20230320221613Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:16:13 2023 Next Update: Wed Mar 20 22:16:11 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 20 22:16:13 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:16:00 2023 Not After : Mon Mar 20 22:16:00 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:04:ee:64:72:c3:db:b4:f1:c3:3a:02:95:36:8b:28: cc:05:14:7e:ce:ad:dd:63:59:03:4b:e1:d1:a4:23:49: 21:ec:d0:f1:5b:19:af:23:e9:d4:84:2b:08:96:76:9a: 89:85:b7:0c:ef:dc:d6:55:98:11:ce:0b:70:d9:10:46: 92:a2:a1:52:da:83:a8:d7:06:1b:b3:cc:8d:bf:c5:d1: 23:96:0b:7d:c5:bd:e2:2b:1b:09:e9:a6:bd:6b:89:b3: 26:44:62:12:30:b3:95:c1:13:f5:a7:55:e2:ad:f6:1d: 5f:48:49:ab:26:c9:e7:97:bc:1a:df:a9:c1:87:98:df: f3:d6:00:75:ff:34:e8:5d:ed:d6:2f:b1:98:3f:ec:88: 95:87:95:da:a9:b7:13:2d:43:9f:4f:ad:01:39:4a:9d: 67:ce:eb:f9:54:2c:a6:4b:b7:a8:2f:05:0b:9a:b3:12: 69:b7:02:b5:b2:7e:30:99:6e:a0:24:99:31:0d:b4:47: ee:51:4f:cb:ee:41:9e:c4:42:11:7a:6b:f9:f4:34:75: d5:8d:5d:a0:ba:ad:0f:b1:80:f9:69:6a:df:19:a0:c6: 5d:59:2d:ac:5e:32:9d:1d:50:88:69:50:d8:8e:4b:3e: ef:48:2d:4e:c9:10:55:b4:22:58:5b:c8:a6:a4:95:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:6a:3c:f4:6e:8c:13:b1:c7:72:17:5e:c5:c3:73:26: 0d:1b:e5:37:1f:3f:50:e7:c3:66:d7:1e:38:cf:2d:4f: 1c:06:60:82:8f:5e:0a:b6:db:ed:fa:12:4b:36:99:30: e8:23:88:c8:bd:60:57:c8:ad:e7:b3:f5:08:a2:75:8a: 45:9f:34:da:6c:cc:91:42:44:f6:01:db:37:09:2e:ad: cb:65:c1:a9:4f:51:61:47:ca:a2:ac:25:65:77:1b:a9: f7:c0:02:a9:02:fb:1f:66:b6:81:2e:60:aa:8f:29:aa: 4c:7c:21:25:9a:7a:b6:39:97:77:d8:76:7a:80:24:b6: b7:70:c5:c9:3c:9d:3e:fc:8c:8c:a6:1c:05:13:9e:44: 3c:47:b3:0c:68:17:cd:a1:e1:08:2a:eb:c4:a6:74:5d: a0:1a:69:f6:ea:ae:d9:30:d1:dd:73:4b:cf:fd:29:bd: 78:95:be:5e:0b:2c:de:29:15:4f:2d:a4:41:8c:02:e8: a5:00:ef:06:3b:c5:7e:85:5d:71:80:6d:4e:10:11:86: 18:10:59:56:52:bd:37:bd:46:c3:41:99:0f:58:3a:d0: 63:9f:b3:c1:f1:95:44:64:64:63:85:a9:71:d1:13:da: 89:6a:da:71:63:bb:88:bd:f9:c0:4f:e0:9d:1c:13:1d Fingerprint (SHA-256): DB:53:74:69:8B:B2:67:19:2F:2F:90:04:34:AD:F0:72:15:55:F8:63:38:B5:83:BD:BF:FD:52:BA:E6:29:3B:B1 Fingerprint (SHA1): B9:A9:25:99:00:81:85:0B:3C:DD:39:03:27:E1:85:2C:08:FE:D6:34 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:16:00 2023 Not After : Mon Mar 20 22:16:00 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:04:ee:64:72:c3:db:b4:f1:c3:3a:02:95:36:8b:28: cc:05:14:7e:ce:ad:dd:63:59:03:4b:e1:d1:a4:23:49: 21:ec:d0:f1:5b:19:af:23:e9:d4:84:2b:08:96:76:9a: 89:85:b7:0c:ef:dc:d6:55:98:11:ce:0b:70:d9:10:46: 92:a2:a1:52:da:83:a8:d7:06:1b:b3:cc:8d:bf:c5:d1: 23:96:0b:7d:c5:bd:e2:2b:1b:09:e9:a6:bd:6b:89:b3: 26:44:62:12:30:b3:95:c1:13:f5:a7:55:e2:ad:f6:1d: 5f:48:49:ab:26:c9:e7:97:bc:1a:df:a9:c1:87:98:df: f3:d6:00:75:ff:34:e8:5d:ed:d6:2f:b1:98:3f:ec:88: 95:87:95:da:a9:b7:13:2d:43:9f:4f:ad:01:39:4a:9d: 67:ce:eb:f9:54:2c:a6:4b:b7:a8:2f:05:0b:9a:b3:12: 69:b7:02:b5:b2:7e:30:99:6e:a0:24:99:31:0d:b4:47: ee:51:4f:cb:ee:41:9e:c4:42:11:7a:6b:f9:f4:34:75: d5:8d:5d:a0:ba:ad:0f:b1:80:f9:69:6a:df:19:a0:c6: 5d:59:2d:ac:5e:32:9d:1d:50:88:69:50:d8:8e:4b:3e: ef:48:2d:4e:c9:10:55:b4:22:58:5b:c8:a6:a4:95:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:6a:3c:f4:6e:8c:13:b1:c7:72:17:5e:c5:c3:73:26: 0d:1b:e5:37:1f:3f:50:e7:c3:66:d7:1e:38:cf:2d:4f: 1c:06:60:82:8f:5e:0a:b6:db:ed:fa:12:4b:36:99:30: e8:23:88:c8:bd:60:57:c8:ad:e7:b3:f5:08:a2:75:8a: 45:9f:34:da:6c:cc:91:42:44:f6:01:db:37:09:2e:ad: cb:65:c1:a9:4f:51:61:47:ca:a2:ac:25:65:77:1b:a9: f7:c0:02:a9:02:fb:1f:66:b6:81:2e:60:aa:8f:29:aa: 4c:7c:21:25:9a:7a:b6:39:97:77:d8:76:7a:80:24:b6: b7:70:c5:c9:3c:9d:3e:fc:8c:8c:a6:1c:05:13:9e:44: 3c:47:b3:0c:68:17:cd:a1:e1:08:2a:eb:c4:a6:74:5d: a0:1a:69:f6:ea:ae:d9:30:d1:dd:73:4b:cf:fd:29:bd: 78:95:be:5e:0b:2c:de:29:15:4f:2d:a4:41:8c:02:e8: a5:00:ef:06:3b:c5:7e:85:5d:71:80:6d:4e:10:11:86: 18:10:59:56:52:bd:37:bd:46:c3:41:99:0f:58:3a:d0: 63:9f:b3:c1:f1:95:44:64:64:63:85:a9:71:d1:13:da: 89:6a:da:71:63:bb:88:bd:f9:c0:4f:e0:9d:1c:13:1d Fingerprint (SHA-256): DB:53:74:69:8B:B2:67:19:2F:2F:90:04:34:AD:F0:72:15:55:F8:63:38:B5:83:BD:BF:FD:52:BA:E6:29:3B:B1 Fingerprint (SHA1): B9:A9:25:99:00:81:85:0B:3C:DD:39:03:27:E1:85:2C:08:FE:D6:34 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221201 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 320221202 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221077.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221061.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221077.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 320221203 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221077.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221062.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 320221204 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221077.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221063.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221077.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221064.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320221628Z nextupdate=20240320221628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 22:16:28 2023 Next Update: Wed Mar 20 22:16:28 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320221629Z nextupdate=20240320221629Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:16:29 2023 Next Update: Wed Mar 20 22:16:29 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320221629Z nextupdate=20240320221629Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 22:16:29 2023 Next Update: Wed Mar 20 22:16:29 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320221629Z nextupdate=20240320221629Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 22:16:29 2023 Next Update: Wed Mar 20 22:16:29 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320221630Z addcert 20 20230320221630Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:16:30 2023 Next Update: Wed Mar 20 22:16:29 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 22:16:30 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320221631Z addcert 40 20230320221631Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:16:31 2023 Next Update: Wed Mar 20 22:16:29 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 22:16:30 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 22:16:31 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221201 (0x13163011) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:16:17 2023 Not After : Mon Mar 20 22:16:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:dc:9d:b0:f6:a6:94:c5:f2:fa:99:9a:17:0e:b8:7c: a4:e0:dc:67:9a:ca:05:69:f8:fa:c0:b0:6a:8d:07:0e: 0f:01:4f:af:0b:e7:da:4c:bc:de:58:f1:5a:d6:d7:fb: fe:80:c8:54:41:9f:1b:b3:bf:01:0c:a1:2b:f3:39:02: fe:a9:a6:1f:76:33:da:7b:14:c9:d7:88:b3:61:60:06: ab:88:0c:6e:a6:fa:a2:36:b0:53:bb:30:06:5f:56:68: b6:63:f8:db:7e:25:5a:82:75:5c:a0:f3:6a:37:38:5c: b5:83:43:b3:3d:1f:96:41:24:dc:76:c4:a5:92:68:07: 91:66:bc:f1:ec:fe:6c:dd:27:e1:fd:f3:af:2b:58:e9: 9b:28:9b:59:ba:8a:46:19:dc:44:5e:88:58:df:24:ae: 21:47:22:9c:0b:39:10:13:80:40:28:27:91:26:dc:bf: 2a:54:be:38:da:60:91:01:be:a1:15:98:27:e6:80:be: 55:74:62:35:ea:4a:5c:fa:e5:68:86:7f:3f:68:98:5a: 8b:9a:1a:48:6c:89:50:9f:83:a6:48:5f:7d:40:37:15: bb:a4:87:32:c5:36:eb:70:06:12:9e:f4:58:91:ee:a3: 00:14:61:7c:de:a6:c6:60:64:f7:a1:2d:2b:a9:10:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:cb:5a:9d:f4:61:0d:c4:d2:9e:27:12:26:62:65:4d: 6b:76:c0:f5:cf:8b:22:5b:a6:19:a7:bc:ff:76:93:0c: 6d:1e:b2:cd:36:f3:43:43:63:45:8d:44:af:96:84:3a: f5:93:39:db:a1:3e:60:8b:87:0d:d7:70:82:92:99:4e: f9:49:7a:f5:59:9c:78:3c:bd:79:cd:16:24:26:86:79: 2d:42:f0:f2:27:df:88:23:cb:a2:c5:9a:c9:b4:7f:cc: 96:b3:9d:78:cb:fc:47:bd:e9:67:e2:7c:27:3c:cb:c9: 66:12:c2:3d:55:fa:f3:43:e0:dc:c1:49:00:2e:4e:f6: b3:6d:34:03:10:57:7a:e0:ca:bd:4b:da:a5:ee:b1:9b: b7:bc:a8:13:4c:e1:ba:a5:be:ab:85:96:a2:ba:f8:c4: ba:3c:50:61:ce:46:64:95:48:51:f6:ca:b2:7a:e8:7a: 8d:74:f7:aa:bf:e2:ff:32:b6:47:2a:5a:99:fb:fd:19: 7c:c0:17:ff:ce:87:c8:ed:73:50:68:fb:5f:c6:b0:5a: 6d:38:f9:eb:3e:95:00:a3:be:33:f7:ae:9a:6e:75:1e: d2:e7:a6:7b:f7:6f:30:26:d9:4c:86:27:e2:f3:0a:d9: a9:cc:c4:f8:07:b9:9c:75:c8:a6:ca:56:73:bd:6d:59 Fingerprint (SHA-256): 5B:EF:E1:0B:49:F3:07:75:D0:2B:CA:A7:E6:73:21:F2:4D:C0:DD:34:CF:9F:4D:9E:16:3E:72:41:7E:50:88:FA Fingerprint (SHA1): 27:F9:E6:F0:50:EE:E9:12:54:28:2F:52:30:73:3E:43:C6:40:72:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221201 (0x13163011) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:16:17 2023 Not After : Mon Mar 20 22:16:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:dc:9d:b0:f6:a6:94:c5:f2:fa:99:9a:17:0e:b8:7c: a4:e0:dc:67:9a:ca:05:69:f8:fa:c0:b0:6a:8d:07:0e: 0f:01:4f:af:0b:e7:da:4c:bc:de:58:f1:5a:d6:d7:fb: fe:80:c8:54:41:9f:1b:b3:bf:01:0c:a1:2b:f3:39:02: fe:a9:a6:1f:76:33:da:7b:14:c9:d7:88:b3:61:60:06: ab:88:0c:6e:a6:fa:a2:36:b0:53:bb:30:06:5f:56:68: b6:63:f8:db:7e:25:5a:82:75:5c:a0:f3:6a:37:38:5c: b5:83:43:b3:3d:1f:96:41:24:dc:76:c4:a5:92:68:07: 91:66:bc:f1:ec:fe:6c:dd:27:e1:fd:f3:af:2b:58:e9: 9b:28:9b:59:ba:8a:46:19:dc:44:5e:88:58:df:24:ae: 21:47:22:9c:0b:39:10:13:80:40:28:27:91:26:dc:bf: 2a:54:be:38:da:60:91:01:be:a1:15:98:27:e6:80:be: 55:74:62:35:ea:4a:5c:fa:e5:68:86:7f:3f:68:98:5a: 8b:9a:1a:48:6c:89:50:9f:83:a6:48:5f:7d:40:37:15: bb:a4:87:32:c5:36:eb:70:06:12:9e:f4:58:91:ee:a3: 00:14:61:7c:de:a6:c6:60:64:f7:a1:2d:2b:a9:10:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:cb:5a:9d:f4:61:0d:c4:d2:9e:27:12:26:62:65:4d: 6b:76:c0:f5:cf:8b:22:5b:a6:19:a7:bc:ff:76:93:0c: 6d:1e:b2:cd:36:f3:43:43:63:45:8d:44:af:96:84:3a: f5:93:39:db:a1:3e:60:8b:87:0d:d7:70:82:92:99:4e: f9:49:7a:f5:59:9c:78:3c:bd:79:cd:16:24:26:86:79: 2d:42:f0:f2:27:df:88:23:cb:a2:c5:9a:c9:b4:7f:cc: 96:b3:9d:78:cb:fc:47:bd:e9:67:e2:7c:27:3c:cb:c9: 66:12:c2:3d:55:fa:f3:43:e0:dc:c1:49:00:2e:4e:f6: b3:6d:34:03:10:57:7a:e0:ca:bd:4b:da:a5:ee:b1:9b: b7:bc:a8:13:4c:e1:ba:a5:be:ab:85:96:a2:ba:f8:c4: ba:3c:50:61:ce:46:64:95:48:51:f6:ca:b2:7a:e8:7a: 8d:74:f7:aa:bf:e2:ff:32:b6:47:2a:5a:99:fb:fd:19: 7c:c0:17:ff:ce:87:c8:ed:73:50:68:fb:5f:c6:b0:5a: 6d:38:f9:eb:3e:95:00:a3:be:33:f7:ae:9a:6e:75:1e: d2:e7:a6:7b:f7:6f:30:26:d9:4c:86:27:e2:f3:0a:d9: a9:cc:c4:f8:07:b9:9c:75:c8:a6:ca:56:73:bd:6d:59 Fingerprint (SHA-256): 5B:EF:E1:0B:49:F3:07:75:D0:2B:CA:A7:E6:73:21:F2:4D:C0:DD:34:CF:9F:4D:9E:16:3E:72:41:7E:50:88:FA Fingerprint (SHA1): 27:F9:E6:F0:50:EE:E9:12:54:28:2F:52:30:73:3E:43:C6:40:72:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221205 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320221206 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221207 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 320221208 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221209 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 320221210 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 320221211 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221205 (0x13163015) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:16:34 2023 Not After : Mon Mar 20 22:16:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:3d:cf:28:67:c0:20:5b:bf:8f:87:61:42:09:c2:db: a4:4e:02:cc:fd:fc:b3:75:f5:86:0d:20:d0:69:83:f3: d8:2e:01:a2:73:66:26:79:18:10:5c:44:06:af:7d:d8: 0c:cc:30:b1:79:16:dc:38:13:c4:4b:67:db:67:1e:d0: e9:d4:20:9e:44:fb:0f:c3:7f:b7:86:1c:66:45:7b:07: d8:30:2f:0e:fc:99:c8:f0:7e:31:b3:f9:04:95:b3:5b: d3:1f:1b:f8:76:46:60:26:ee:79:5c:7c:62:c7:75:a1: 5b:ce:29:11:97:66:2d:75:d7:b5:b3:69:55:ee:58:c7: 35:6a:8c:d9:45:88:a9:ff:99:aa:9f:f7:c2:f8:be:ee: 8e:53:da:11:73:b9:d3:45:86:31:84:79:29:95:62:2c: 87:13:ce:f5:43:94:11:78:56:be:19:c8:27:5f:f6:9b: 75:4f:05:b6:26:96:a6:32:26:04:af:04:20:c5:35:66: 60:ec:68:45:70:f6:b1:68:39:2f:0c:99:76:e1:62:02: a2:86:07:2b:82:5c:e4:68:25:47:8c:80:12:3c:3a:d2: 1b:28:9c:d2:6d:da:46:80:a1:c4:8f:d3:7b:06:ad:a7: 1e:02:40:e7:db:93:58:12:6a:5c:33:d7:5d:4e:18:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:8e:06:5c:90:31:fb:d5:62:22:a5:16:fb:97:0a:ab: 7a:56:01:9d:80:04:60:db:5c:ee:1a:9f:74:09:eb:d6: e0:42:af:10:1e:e4:ed:44:83:96:83:04:ed:19:66:91: 67:47:e6:7b:c7:5d:f2:fb:6b:03:dc:37:a0:4f:c5:e2: 8a:29:f7:7a:f7:42:c7:e1:9c:a3:9a:31:d3:50:c0:83: f9:4b:e7:42:0a:77:7b:87:4d:a6:9e:32:b5:1c:82:89: ec:20:1a:a8:b9:82:12:0b:d9:eb:5f:4d:f5:0e:7c:b9: 3f:d4:17:9b:a7:5a:5c:4d:95:ba:3a:de:4c:25:85:0c: 76:8e:79:68:af:e4:0f:1a:31:f4:76:d1:78:9c:a1:18: 6c:3a:90:11:bf:11:21:44:9c:4b:4d:04:b4:d3:6b:6c: 43:f8:c9:6e:8b:47:4e:f7:2f:f5:88:1b:d3:35:b0:40: 97:77:f8:d5:82:39:5c:bc:94:d0:57:fc:a2:9b:49:5c: 07:51:6a:7b:f5:b5:f7:93:3d:08:2b:fc:12:eb:23:1a: 94:57:06:fd:5e:80:2a:2e:87:05:36:4f:8a:e6:6f:9f: c7:23:27:e7:8b:f1:d2:40:39:19:08:01:41:2d:29:8e: 3b:92:14:e2:8a:e8:b5:00:5d:d5:e5:e8:79:cc:d6:b5 Fingerprint (SHA-256): 93:FE:60:60:37:57:DC:97:04:8A:78:4B:6C:A6:A3:33:0F:2A:0E:58:3E:CB:C4:5D:1E:01:B5:12:A6:02:1C:D2 Fingerprint (SHA1): 6E:14:61:D4:7F:67:9D:93:C0:AF:B2:2B:71:45:1F:E3:8D:6C:88:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221207 (0x13163017) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:16:37 2023 Not After : Mon Mar 20 22:16:37 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ae:dd:84:1a:cc:ea:2a:08:ae:6e:7c:a1:4d:bb:80: bc:33:1b:45:9d:70:09:8f:8c:00:ef:47:21:0a:a8:2d: 44:eb:eb:f2:be:2f:07:4d:47:4b:d1:ff:46:44:78:b9: 51:22:32:45:81:5c:16:77:38:5a:da:cf:6b:17:46:f3: ca:24:73:62:64:ed:00:77:9f:0e:05:13:0a:d2:55:82: b7:1a:7c:17:8d:d3:a1:e3:93:b3:9a:91:c6:e6:a9:d2: 05:0c:8d:59:36:4d:53:e0:f3:51:df:6f:3e:1e:8f:6c: fd:2f:61:54:8c:da:61:92:62:00:a2:8b:b1:2f:d6:80: 91:ce:48:61:dc:16:07:1b:82:0e:68:c5:63:1b:2a:cc: 93:fc:99:11:a6:9c:2c:da:8f:8a:69:19:1c:71:e2:e8: 8c:2c:8a:9c:17:25:3d:4f:8b:98:08:b2:6b:60:65:bf: 94:22:8d:db:06:c0:dc:75:a3:ad:73:c6:7e:b1:80:34: 9c:c6:68:56:2c:9e:a9:e7:ef:99:d1:6f:e9:79:5b:2b: d1:57:00:80:c3:f7:6f:c1:bb:f1:e6:6d:79:1f:f8:89: ed:e7:6b:cd:7a:7e:4f:ab:30:d1:13:2c:3e:11:60:15: 88:1d:ca:1d:10:3c:a1:d2:2a:9f:94:9e:43:82:fa:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:40:c1:8c:43:cb:ab:55:a4:1d:2c:e1:98:27:21:93: 99:15:01:f5:63:ed:89:24:f0:f5:1e:9d:3e:f7:cb:b8: 05:40:42:4d:1b:30:aa:50:01:8a:5d:bc:78:1e:28:de: 3c:e1:c3:6c:f4:f1:7c:bb:d9:49:a3:12:cf:55:fd:a3: be:cd:a9:84:da:f3:d3:27:83:2a:9e:d0:72:a6:49:4d: be:cf:09:c0:48:3e:50:40:dc:51:c1:93:a9:10:3a:dd: d7:9b:d3:90:62:5c:d6:35:c1:38:72:b8:9e:8f:74:ae: 90:1e:b7:31:9e:f8:d2:67:9b:23:1c:7e:43:aa:43:2a: 19:b1:77:56:b9:40:70:e6:ec:2f:4f:25:d4:82:6b:1c: bd:fb:7f:9c:d2:cb:ae:aa:36:f1:a9:1e:0b:9a:c1:21: eb:52:8e:a8:04:3d:d8:a6:76:92:a3:9e:e0:64:61:24: ea:88:ee:ae:ed:7e:72:e3:bb:df:fc:5b:ab:c0:d4:c2: a5:db:41:16:41:3b:e6:a1:4d:6c:1d:ff:c0:84:16:dd: 0d:d7:4d:f3:72:7d:4d:be:87:40:e4:b2:9d:04:e7:34: 1d:b2:83:34:59:dd:1d:a1:29:d4:b7:b5:e4:a0:5a:db: 65:ee:d7:f1:e8:91:a7:3b:b6:38:92:ef:af:d8:41:c9 Fingerprint (SHA-256): 52:66:45:72:47:94:A4:73:77:7A:B5:2E:B0:39:D5:27:C3:E7:7D:26:75:75:41:02:42:C2:CB:27:12:C7:72:CB Fingerprint (SHA1): 7A:C3:B0:D0:6D:61:B9:49:AD:0A:86:E1:1D:3F:BC:EE:76:02:0F:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221205 (0x13163015) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:16:34 2023 Not After : Mon Mar 20 22:16:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:3d:cf:28:67:c0:20:5b:bf:8f:87:61:42:09:c2:db: a4:4e:02:cc:fd:fc:b3:75:f5:86:0d:20:d0:69:83:f3: d8:2e:01:a2:73:66:26:79:18:10:5c:44:06:af:7d:d8: 0c:cc:30:b1:79:16:dc:38:13:c4:4b:67:db:67:1e:d0: e9:d4:20:9e:44:fb:0f:c3:7f:b7:86:1c:66:45:7b:07: d8:30:2f:0e:fc:99:c8:f0:7e:31:b3:f9:04:95:b3:5b: d3:1f:1b:f8:76:46:60:26:ee:79:5c:7c:62:c7:75:a1: 5b:ce:29:11:97:66:2d:75:d7:b5:b3:69:55:ee:58:c7: 35:6a:8c:d9:45:88:a9:ff:99:aa:9f:f7:c2:f8:be:ee: 8e:53:da:11:73:b9:d3:45:86:31:84:79:29:95:62:2c: 87:13:ce:f5:43:94:11:78:56:be:19:c8:27:5f:f6:9b: 75:4f:05:b6:26:96:a6:32:26:04:af:04:20:c5:35:66: 60:ec:68:45:70:f6:b1:68:39:2f:0c:99:76:e1:62:02: a2:86:07:2b:82:5c:e4:68:25:47:8c:80:12:3c:3a:d2: 1b:28:9c:d2:6d:da:46:80:a1:c4:8f:d3:7b:06:ad:a7: 1e:02:40:e7:db:93:58:12:6a:5c:33:d7:5d:4e:18:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:8e:06:5c:90:31:fb:d5:62:22:a5:16:fb:97:0a:ab: 7a:56:01:9d:80:04:60:db:5c:ee:1a:9f:74:09:eb:d6: e0:42:af:10:1e:e4:ed:44:83:96:83:04:ed:19:66:91: 67:47:e6:7b:c7:5d:f2:fb:6b:03:dc:37:a0:4f:c5:e2: 8a:29:f7:7a:f7:42:c7:e1:9c:a3:9a:31:d3:50:c0:83: f9:4b:e7:42:0a:77:7b:87:4d:a6:9e:32:b5:1c:82:89: ec:20:1a:a8:b9:82:12:0b:d9:eb:5f:4d:f5:0e:7c:b9: 3f:d4:17:9b:a7:5a:5c:4d:95:ba:3a:de:4c:25:85:0c: 76:8e:79:68:af:e4:0f:1a:31:f4:76:d1:78:9c:a1:18: 6c:3a:90:11:bf:11:21:44:9c:4b:4d:04:b4:d3:6b:6c: 43:f8:c9:6e:8b:47:4e:f7:2f:f5:88:1b:d3:35:b0:40: 97:77:f8:d5:82:39:5c:bc:94:d0:57:fc:a2:9b:49:5c: 07:51:6a:7b:f5:b5:f7:93:3d:08:2b:fc:12:eb:23:1a: 94:57:06:fd:5e:80:2a:2e:87:05:36:4f:8a:e6:6f:9f: c7:23:27:e7:8b:f1:d2:40:39:19:08:01:41:2d:29:8e: 3b:92:14:e2:8a:e8:b5:00:5d:d5:e5:e8:79:cc:d6:b5 Fingerprint (SHA-256): 93:FE:60:60:37:57:DC:97:04:8A:78:4B:6C:A6:A3:33:0F:2A:0E:58:3E:CB:C4:5D:1E:01:B5:12:A6:02:1C:D2 Fingerprint (SHA1): 6E:14:61:D4:7F:67:9D:93:C0:AF:B2:2B:71:45:1F:E3:8D:6C:88:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221205 (0x13163015) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:16:34 2023 Not After : Mon Mar 20 22:16:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:3d:cf:28:67:c0:20:5b:bf:8f:87:61:42:09:c2:db: a4:4e:02:cc:fd:fc:b3:75:f5:86:0d:20:d0:69:83:f3: d8:2e:01:a2:73:66:26:79:18:10:5c:44:06:af:7d:d8: 0c:cc:30:b1:79:16:dc:38:13:c4:4b:67:db:67:1e:d0: e9:d4:20:9e:44:fb:0f:c3:7f:b7:86:1c:66:45:7b:07: d8:30:2f:0e:fc:99:c8:f0:7e:31:b3:f9:04:95:b3:5b: d3:1f:1b:f8:76:46:60:26:ee:79:5c:7c:62:c7:75:a1: 5b:ce:29:11:97:66:2d:75:d7:b5:b3:69:55:ee:58:c7: 35:6a:8c:d9:45:88:a9:ff:99:aa:9f:f7:c2:f8:be:ee: 8e:53:da:11:73:b9:d3:45:86:31:84:79:29:95:62:2c: 87:13:ce:f5:43:94:11:78:56:be:19:c8:27:5f:f6:9b: 75:4f:05:b6:26:96:a6:32:26:04:af:04:20:c5:35:66: 60:ec:68:45:70:f6:b1:68:39:2f:0c:99:76:e1:62:02: a2:86:07:2b:82:5c:e4:68:25:47:8c:80:12:3c:3a:d2: 1b:28:9c:d2:6d:da:46:80:a1:c4:8f:d3:7b:06:ad:a7: 1e:02:40:e7:db:93:58:12:6a:5c:33:d7:5d:4e:18:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:8e:06:5c:90:31:fb:d5:62:22:a5:16:fb:97:0a:ab: 7a:56:01:9d:80:04:60:db:5c:ee:1a:9f:74:09:eb:d6: e0:42:af:10:1e:e4:ed:44:83:96:83:04:ed:19:66:91: 67:47:e6:7b:c7:5d:f2:fb:6b:03:dc:37:a0:4f:c5:e2: 8a:29:f7:7a:f7:42:c7:e1:9c:a3:9a:31:d3:50:c0:83: f9:4b:e7:42:0a:77:7b:87:4d:a6:9e:32:b5:1c:82:89: ec:20:1a:a8:b9:82:12:0b:d9:eb:5f:4d:f5:0e:7c:b9: 3f:d4:17:9b:a7:5a:5c:4d:95:ba:3a:de:4c:25:85:0c: 76:8e:79:68:af:e4:0f:1a:31:f4:76:d1:78:9c:a1:18: 6c:3a:90:11:bf:11:21:44:9c:4b:4d:04:b4:d3:6b:6c: 43:f8:c9:6e:8b:47:4e:f7:2f:f5:88:1b:d3:35:b0:40: 97:77:f8:d5:82:39:5c:bc:94:d0:57:fc:a2:9b:49:5c: 07:51:6a:7b:f5:b5:f7:93:3d:08:2b:fc:12:eb:23:1a: 94:57:06:fd:5e:80:2a:2e:87:05:36:4f:8a:e6:6f:9f: c7:23:27:e7:8b:f1:d2:40:39:19:08:01:41:2d:29:8e: 3b:92:14:e2:8a:e8:b5:00:5d:d5:e5:e8:79:cc:d6:b5 Fingerprint (SHA-256): 93:FE:60:60:37:57:DC:97:04:8A:78:4B:6C:A6:A3:33:0F:2A:0E:58:3E:CB:C4:5D:1E:01:B5:12:A6:02:1C:D2 Fingerprint (SHA1): 6E:14:61:D4:7F:67:9D:93:C0:AF:B2:2B:71:45:1F:E3:8D:6C:88:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221207 (0x13163017) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:16:37 2023 Not After : Mon Mar 20 22:16:37 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ae:dd:84:1a:cc:ea:2a:08:ae:6e:7c:a1:4d:bb:80: bc:33:1b:45:9d:70:09:8f:8c:00:ef:47:21:0a:a8:2d: 44:eb:eb:f2:be:2f:07:4d:47:4b:d1:ff:46:44:78:b9: 51:22:32:45:81:5c:16:77:38:5a:da:cf:6b:17:46:f3: ca:24:73:62:64:ed:00:77:9f:0e:05:13:0a:d2:55:82: b7:1a:7c:17:8d:d3:a1:e3:93:b3:9a:91:c6:e6:a9:d2: 05:0c:8d:59:36:4d:53:e0:f3:51:df:6f:3e:1e:8f:6c: fd:2f:61:54:8c:da:61:92:62:00:a2:8b:b1:2f:d6:80: 91:ce:48:61:dc:16:07:1b:82:0e:68:c5:63:1b:2a:cc: 93:fc:99:11:a6:9c:2c:da:8f:8a:69:19:1c:71:e2:e8: 8c:2c:8a:9c:17:25:3d:4f:8b:98:08:b2:6b:60:65:bf: 94:22:8d:db:06:c0:dc:75:a3:ad:73:c6:7e:b1:80:34: 9c:c6:68:56:2c:9e:a9:e7:ef:99:d1:6f:e9:79:5b:2b: d1:57:00:80:c3:f7:6f:c1:bb:f1:e6:6d:79:1f:f8:89: ed:e7:6b:cd:7a:7e:4f:ab:30:d1:13:2c:3e:11:60:15: 88:1d:ca:1d:10:3c:a1:d2:2a:9f:94:9e:43:82:fa:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:40:c1:8c:43:cb:ab:55:a4:1d:2c:e1:98:27:21:93: 99:15:01:f5:63:ed:89:24:f0:f5:1e:9d:3e:f7:cb:b8: 05:40:42:4d:1b:30:aa:50:01:8a:5d:bc:78:1e:28:de: 3c:e1:c3:6c:f4:f1:7c:bb:d9:49:a3:12:cf:55:fd:a3: be:cd:a9:84:da:f3:d3:27:83:2a:9e:d0:72:a6:49:4d: be:cf:09:c0:48:3e:50:40:dc:51:c1:93:a9:10:3a:dd: d7:9b:d3:90:62:5c:d6:35:c1:38:72:b8:9e:8f:74:ae: 90:1e:b7:31:9e:f8:d2:67:9b:23:1c:7e:43:aa:43:2a: 19:b1:77:56:b9:40:70:e6:ec:2f:4f:25:d4:82:6b:1c: bd:fb:7f:9c:d2:cb:ae:aa:36:f1:a9:1e:0b:9a:c1:21: eb:52:8e:a8:04:3d:d8:a6:76:92:a3:9e:e0:64:61:24: ea:88:ee:ae:ed:7e:72:e3:bb:df:fc:5b:ab:c0:d4:c2: a5:db:41:16:41:3b:e6:a1:4d:6c:1d:ff:c0:84:16:dd: 0d:d7:4d:f3:72:7d:4d:be:87:40:e4:b2:9d:04:e7:34: 1d:b2:83:34:59:dd:1d:a1:29:d4:b7:b5:e4:a0:5a:db: 65:ee:d7:f1:e8:91:a7:3b:b6:38:92:ef:af:d8:41:c9 Fingerprint (SHA-256): 52:66:45:72:47:94:A4:73:77:7A:B5:2E:B0:39:D5:27:C3:E7:7D:26:75:75:41:02:42:C2:CB:27:12:C7:72:CB Fingerprint (SHA1): 7A:C3:B0:D0:6D:61:B9:49:AD:0A:86:E1:1D:3F:BC:EE:76:02:0F:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221205 (0x13163015) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:16:34 2023 Not After : Mon Mar 20 22:16:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:3d:cf:28:67:c0:20:5b:bf:8f:87:61:42:09:c2:db: a4:4e:02:cc:fd:fc:b3:75:f5:86:0d:20:d0:69:83:f3: d8:2e:01:a2:73:66:26:79:18:10:5c:44:06:af:7d:d8: 0c:cc:30:b1:79:16:dc:38:13:c4:4b:67:db:67:1e:d0: e9:d4:20:9e:44:fb:0f:c3:7f:b7:86:1c:66:45:7b:07: d8:30:2f:0e:fc:99:c8:f0:7e:31:b3:f9:04:95:b3:5b: d3:1f:1b:f8:76:46:60:26:ee:79:5c:7c:62:c7:75:a1: 5b:ce:29:11:97:66:2d:75:d7:b5:b3:69:55:ee:58:c7: 35:6a:8c:d9:45:88:a9:ff:99:aa:9f:f7:c2:f8:be:ee: 8e:53:da:11:73:b9:d3:45:86:31:84:79:29:95:62:2c: 87:13:ce:f5:43:94:11:78:56:be:19:c8:27:5f:f6:9b: 75:4f:05:b6:26:96:a6:32:26:04:af:04:20:c5:35:66: 60:ec:68:45:70:f6:b1:68:39:2f:0c:99:76:e1:62:02: a2:86:07:2b:82:5c:e4:68:25:47:8c:80:12:3c:3a:d2: 1b:28:9c:d2:6d:da:46:80:a1:c4:8f:d3:7b:06:ad:a7: 1e:02:40:e7:db:93:58:12:6a:5c:33:d7:5d:4e:18:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:8e:06:5c:90:31:fb:d5:62:22:a5:16:fb:97:0a:ab: 7a:56:01:9d:80:04:60:db:5c:ee:1a:9f:74:09:eb:d6: e0:42:af:10:1e:e4:ed:44:83:96:83:04:ed:19:66:91: 67:47:e6:7b:c7:5d:f2:fb:6b:03:dc:37:a0:4f:c5:e2: 8a:29:f7:7a:f7:42:c7:e1:9c:a3:9a:31:d3:50:c0:83: f9:4b:e7:42:0a:77:7b:87:4d:a6:9e:32:b5:1c:82:89: ec:20:1a:a8:b9:82:12:0b:d9:eb:5f:4d:f5:0e:7c:b9: 3f:d4:17:9b:a7:5a:5c:4d:95:ba:3a:de:4c:25:85:0c: 76:8e:79:68:af:e4:0f:1a:31:f4:76:d1:78:9c:a1:18: 6c:3a:90:11:bf:11:21:44:9c:4b:4d:04:b4:d3:6b:6c: 43:f8:c9:6e:8b:47:4e:f7:2f:f5:88:1b:d3:35:b0:40: 97:77:f8:d5:82:39:5c:bc:94:d0:57:fc:a2:9b:49:5c: 07:51:6a:7b:f5:b5:f7:93:3d:08:2b:fc:12:eb:23:1a: 94:57:06:fd:5e:80:2a:2e:87:05:36:4f:8a:e6:6f:9f: c7:23:27:e7:8b:f1:d2:40:39:19:08:01:41:2d:29:8e: 3b:92:14:e2:8a:e8:b5:00:5d:d5:e5:e8:79:cc:d6:b5 Fingerprint (SHA-256): 93:FE:60:60:37:57:DC:97:04:8A:78:4B:6C:A6:A3:33:0F:2A:0E:58:3E:CB:C4:5D:1E:01:B5:12:A6:02:1C:D2 Fingerprint (SHA1): 6E:14:61:D4:7F:67:9D:93:C0:AF:B2:2B:71:45:1F:E3:8D:6C:88:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221209 (0x13163019) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 22:16:40 2023 Not After : Mon Mar 20 22:16:40 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:31:e2:ae:5f:01:09:ce:10:a2:4f:39:ae:a9:f8:ea: bc:28:b5:fa:78:07:31:56:af:f6:8d:36:f1:72:01:81: 9f:2b:c1:82:e8:c8:2c:98:0d:ca:37:7a:3e:27:f3:37: 35:e7:42:c1:68:4c:7b:6d:9d:b7:ef:b2:b2:59:ac:de: e8:d9:f1:ad:88:a5:a5:23:5e:19:f8:5f:8b:e4:11:33: 66:a8:24:09:ac:4f:10:90:ae:a3:d8:24:02:3a:84:c3: 19:61:57:7a:24:c0:92:04:cb:51:67:f1:ee:1a:b8:b5: b4:d3:e2:92:f1:01:67:70:f5:be:08:3e:14:b6:9b:76: 5c:26:78:ad:04:03:8e:d5:33:b5:f4:91:1d:41:a6:c1: 80:53:f7:3e:b0:08:de:4b:42:cc:33:ed:d1:6a:e2:1d: df:e0:5d:0a:c8:69:7e:30:af:49:06:04:d9:74:82:1c: a9:69:a0:f5:7a:6a:e0:8f:04:3d:11:fe:39:7d:ad:f3: 34:27:a3:4e:ae:e0:68:4f:17:a9:a8:82:2b:dd:c6:f4: 14:8d:92:b5:01:71:59:e5:b9:51:30:81:54:ef:ab:da: bf:af:07:6f:f2:46:51:ed:b3:6e:a3:4e:af:f6:67:21: 53:5d:d0:3e:a1:79:33:44:3d:5e:d0:48:78:79:65:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:0d:e0:9d:a8:eb:fe:52:e9:d5:0c:7f:59:42:14:83: 86:f8:fb:82:9e:8f:33:94:35:86:ba:e6:11:57:25:c2: e1:95:d9:88:c7:fd:a6:d9:81:05:02:44:d8:28:7e:9f: 7b:2c:ba:e5:f1:50:04:a3:0b:c8:08:e8:cb:cf:c5:c6: 32:76:b1:c1:b4:38:76:f2:ad:9d:42:4d:6e:d6:e9:b5: 17:f3:3c:c9:18:10:64:04:81:0f:08:8a:52:ae:4c:06: b2:75:e1:af:74:8c:65:28:da:a9:69:d5:3e:29:83:a1: 03:8b:e6:46:bb:0c:d7:f7:8d:0e:fb:ff:e3:b3:b8:c2: e1:af:37:8c:05:b0:10:4b:0e:c1:21:e1:59:ed:9e:46: b6:50:31:d8:a7:e6:a8:00:e9:63:43:bc:e6:cc:cc:2f: 4b:4a:49:b6:cf:47:0f:78:4c:f1:82:0c:da:81:99:9d: de:56:32:16:99:7b:40:f0:d1:29:f5:aa:6a:b8:29:5a: 96:e7:10:64:3f:27:d7:72:3e:7d:46:50:3c:39:7f:ff: 7d:fb:fe:ad:44:31:7f:88:13:4c:da:60:a8:b5:40:1c: 22:ad:c4:f3:5a:a4:6d:7f:3b:69:7c:3d:76:bc:b4:13: 84:86:06:87:3f:e8:7e:6c:a7:2e:0d:e3:e9:cf:8d:62 Fingerprint (SHA-256): 8B:1B:9A:52:F7:66:3A:42:B7:5B:6F:30:52:4A:0B:15:A8:5F:F6:A2:D1:5E:7A:C0:EA:6A:63:C2:80:EE:D3:22 Fingerprint (SHA1): 9D:BF:48:B3:27:50:AD:72:E9:64:81:6F:3F:14:CD:FA:E9:4F:4F:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221205 (0x13163015) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:16:34 2023 Not After : Mon Mar 20 22:16:34 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:3d:cf:28:67:c0:20:5b:bf:8f:87:61:42:09:c2:db: a4:4e:02:cc:fd:fc:b3:75:f5:86:0d:20:d0:69:83:f3: d8:2e:01:a2:73:66:26:79:18:10:5c:44:06:af:7d:d8: 0c:cc:30:b1:79:16:dc:38:13:c4:4b:67:db:67:1e:d0: e9:d4:20:9e:44:fb:0f:c3:7f:b7:86:1c:66:45:7b:07: d8:30:2f:0e:fc:99:c8:f0:7e:31:b3:f9:04:95:b3:5b: d3:1f:1b:f8:76:46:60:26:ee:79:5c:7c:62:c7:75:a1: 5b:ce:29:11:97:66:2d:75:d7:b5:b3:69:55:ee:58:c7: 35:6a:8c:d9:45:88:a9:ff:99:aa:9f:f7:c2:f8:be:ee: 8e:53:da:11:73:b9:d3:45:86:31:84:79:29:95:62:2c: 87:13:ce:f5:43:94:11:78:56:be:19:c8:27:5f:f6:9b: 75:4f:05:b6:26:96:a6:32:26:04:af:04:20:c5:35:66: 60:ec:68:45:70:f6:b1:68:39:2f:0c:99:76:e1:62:02: a2:86:07:2b:82:5c:e4:68:25:47:8c:80:12:3c:3a:d2: 1b:28:9c:d2:6d:da:46:80:a1:c4:8f:d3:7b:06:ad:a7: 1e:02:40:e7:db:93:58:12:6a:5c:33:d7:5d:4e:18:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:8e:06:5c:90:31:fb:d5:62:22:a5:16:fb:97:0a:ab: 7a:56:01:9d:80:04:60:db:5c:ee:1a:9f:74:09:eb:d6: e0:42:af:10:1e:e4:ed:44:83:96:83:04:ed:19:66:91: 67:47:e6:7b:c7:5d:f2:fb:6b:03:dc:37:a0:4f:c5:e2: 8a:29:f7:7a:f7:42:c7:e1:9c:a3:9a:31:d3:50:c0:83: f9:4b:e7:42:0a:77:7b:87:4d:a6:9e:32:b5:1c:82:89: ec:20:1a:a8:b9:82:12:0b:d9:eb:5f:4d:f5:0e:7c:b9: 3f:d4:17:9b:a7:5a:5c:4d:95:ba:3a:de:4c:25:85:0c: 76:8e:79:68:af:e4:0f:1a:31:f4:76:d1:78:9c:a1:18: 6c:3a:90:11:bf:11:21:44:9c:4b:4d:04:b4:d3:6b:6c: 43:f8:c9:6e:8b:47:4e:f7:2f:f5:88:1b:d3:35:b0:40: 97:77:f8:d5:82:39:5c:bc:94:d0:57:fc:a2:9b:49:5c: 07:51:6a:7b:f5:b5:f7:93:3d:08:2b:fc:12:eb:23:1a: 94:57:06:fd:5e:80:2a:2e:87:05:36:4f:8a:e6:6f:9f: c7:23:27:e7:8b:f1:d2:40:39:19:08:01:41:2d:29:8e: 3b:92:14:e2:8a:e8:b5:00:5d:d5:e5:e8:79:cc:d6:b5 Fingerprint (SHA-256): 93:FE:60:60:37:57:DC:97:04:8A:78:4B:6C:A6:A3:33:0F:2A:0E:58:3E:CB:C4:5D:1E:01:B5:12:A6:02:1C:D2 Fingerprint (SHA1): 6E:14:61:D4:7F:67:9D:93:C0:AF:B2:2B:71:45:1F:E3:8D:6C:88:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221210 (0x1316301a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 22:16:42 2023 Not After : Mon Mar 20 22:16:42 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:53:8c:27:ed:0b:a9:08:a1:a0:c2:35:7e:8a:9f:12: 3a:a0:df:a8:67:8a:31:cd:ef:5d:4a:13:ca:38:2e:31: d7:4c:02:26:f1:ab:05:47:f2:94:14:73:aa:65:4b:93: c4:2d:43:1d:7a:74:3d:1c:80:3e:76:8e:a9:f1:b2:b4: a8:f1:22:29:71:a1:63:c8:5f:2b:1f:03:5b:3c:1e:c1: be:03:5c:48:d3:bb:de:27:61:64:40:bd:b2:f7:41:05: d6:45:5a:a8:c0:df:77:9c:89:97:61:45:dc:ac:2d:9c: 5c:06:42:2a:0f:ac:de:df:cd:13:c6:95:40:39:22:36: 6c:c7:4d:bc:5d:49:00:41:c4:4c:fc:0a:4d:21:6f:21: e2:eb:d4:6e:fb:16:71:f1:83:a6:1d:f4:24:5f:c5:06: 53:b6:15:b9:00:19:8d:6c:f6:97:3c:61:df:32:ff:29: 63:8f:d0:c6:57:a5:08:9a:f1:bd:94:02:fd:b1:6d:82: 81:69:81:9a:9a:d0:93:bb:64:57:ee:25:01:da:d5:9e: 58:b0:16:e4:74:50:90:01:d1:6f:52:b8:a7:b5:8d:35: 5a:7d:98:9a:2d:6b:f4:37:72:e2:10:5e:57:ae:8f:88: ff:81:f6:92:09:7e:e7:72:fe:b5:3b:ea:34:41:0f:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:f7:64:3c:d7:3f:94:d6:8e:85:18:24:c1:ad:2e:78: 9b:9a:5a:b5:ae:bb:11:62:5a:40:7d:f6:18:6c:53:6c: d7:e8:e1:12:e4:bd:b2:dd:ca:20:70:c4:e7:4c:91:a3: 1f:31:12:ba:29:bb:6d:51:09:12:3d:7f:d6:22:94:f4: 24:50:60:2b:22:82:90:2c:8c:f2:06:ef:2a:f5:75:8a: 33:73:af:4c:b9:41:b8:06:0f:18:53:0c:3b:c0:fd:77: 50:10:d3:6b:c8:56:51:1a:aa:89:ec:57:50:24:2a:12: f1:df:18:10:29:0d:76:a8:62:e6:39:34:03:0c:33:2c: 98:6f:fb:92:35:aa:b2:2e:2b:4d:f9:e8:4a:fa:7f:2a: 14:76:56:a7:58:02:e6:70:0e:b6:a2:9a:b7:6c:0a:8a: f0:eb:f4:27:d7:30:a1:62:0b:8c:b6:e2:ba:5f:ad:2d: 83:ba:f3:79:83:2a:0b:64:af:bc:dc:5c:af:45:5d:96: 11:6c:22:86:97:95:37:e3:1b:09:d9:71:56:0b:23:d3: 59:92:64:05:0e:1c:ab:0b:03:38:02:1a:ab:2b:78:24: ea:70:b0:87:d5:02:c9:7b:78:31:b4:41:d5:63:44:e9: 13:a0:cb:f3:67:70:22:7a:8d:f5:3a:96:7b:44:6e:3d Fingerprint (SHA-256): F2:E5:1B:1A:1D:AF:E0:69:63:44:8A:8D:B4:81:3A:B5:A2:80:EA:FB:B0:B9:DB:3D:B0:19:9B:B6:91:D4:53:EA Fingerprint (SHA1): 4D:DA:74:E1:05:47:ED:4A:F5:11:F7:9B:B7:D6:70:B9:0A:46:28:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 15504 at Mon Mar 20 22:16:53 UTC 2023 kill -USR1 15504 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 15504 killed at Mon Mar 20 22:16:53 UTC 2023 httpserv starting at Mon Mar 20 22:16:53 UTC 2023 httpserv -D -p 9897 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.30514 & trying to connect to httpserv at Mon Mar 20 22:16:53 UTC 2023 tstclnt -4 -p 9897 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9897 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 27976 >/dev/null 2>/dev/null httpserv with PID 27976 found at Mon Mar 20 22:16:53 UTC 2023 httpserv with PID 27976 started at Mon Mar 20 22:16:53 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221212 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221213 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320221214 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320221215 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 320221216 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221213 (0x1316301d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:16:56 2023 Not After : Mon Mar 20 22:16:56 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:15:ab:ea:64:4a:c5:c1:da:b2:c9:44:90:6e:63:22: e1:37:62:5d:8d:66:90:84:9b:eb:7c:e1:15:f4:0f:07: d6:c0:b8:4b:39:49:4c:24:3d:21:b8:b2:70:25:82:06: d4:67:bd:a7:48:f5:14:85:4e:2b:43:e6:9a:a4:34:57: 99:ab:30:af:66:8f:75:b3:95:0c:0a:e5:d1:aa:41:d2: d6:97:c2:5b:d7:97:ef:ba:d5:45:0d:f3:19:b0:c6:3b: 74:16:7c:06:42:32:56:2d:36:4c:8b:c2:db:47:f0:6d: de:3b:b6:94:18:25:d0:19:38:b3:fd:47:b4:8b:f6:8f: 77:d6:65:1e:cb:7e:59:5c:05:db:60:73:64:98:89:e8: 02:d0:71:c8:70:f5:06:ab:c5:7d:ae:a9:1d:11:25:7f: 71:e7:90:35:96:65:e6:01:33:84:98:0f:9e:eb:92:7b: 33:b4:18:7f:1c:cd:00:ba:07:d4:2b:3d:01:ef:b3:6d: 4c:b1:59:ac:07:b4:fb:6d:8c:64:29:54:27:70:a2:3b: b9:72:e7:9b:a7:88:48:f2:23:2f:a7:94:71:88:c7:68: 62:12:2f:31:26:bb:a3:a9:15:f7:76:02:de:06:1d:92: 00:eb:25:b0:91:b5:e7:4e:55:74:cd:6f:dd:c5:c6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e3:61:99:9f:62:a5:86:ca:87:2f:fd:37:9f:f3:de: aa:e3:cc:bc:f0:94:90:15:01:f3:6d:df:2e:3e:b9:78: f3:c8:b4:02:48:f6:ec:e4:73:37:89:cb:08:a4:1e:ae: a9:ce:f1:fe:b3:c1:e1:d9:cb:8c:c2:15:c9:50:71:93: 2b:6c:47:74:f0:3f:5a:38:3d:53:86:a8:f8:08:44:ec: 38:f5:93:b6:90:41:70:04:de:82:40:e8:40:06:7d:5f: c8:9e:11:c7:ea:b2:c2:90:9a:82:52:6a:80:e2:07:e8: 50:2c:09:38:24:39:29:b8:35:50:49:92:cb:a4:c9:4f: d2:1b:24:a1:9f:9e:5c:ed:df:3b:66:c7:ee:d3:af:6f: 7b:d6:d5:00:37:e3:25:c1:65:2a:c9:56:df:11:8a:23: e4:7c:d4:e3:6f:f4:d5:7b:17:9b:c6:fe:d3:a1:d1:a8: e0:15:63:74:35:c3:8a:17:54:db:2a:cd:d4:8c:7f:89: 7f:47:c0:fc:2b:65:3f:3d:6d:10:08:4b:1b:50:50:68: a3:af:c3:c7:f5:de:b0:68:db:cb:fb:55:78:ac:7f:d3: 4c:3a:13:2f:61:ca:02:c3:f6:73:ea:c2:60:32:96:80: 09:15:1a:00:c4:49:38:52:21:be:d5:28:f4:c8:4d:39 Fingerprint (SHA-256): 12:68:F2:DC:A2:9C:97:91:2D:BC:CC:CC:53:D5:C4:A3:DD:75:25:FB:81:07:11:02:61:EE:32:BB:27:8D:07:0F Fingerprint (SHA1): F6:E8:18:10:C6:50:29:13:E0:AF:A7:DC:4F:17:6E:F8:54:62:A0:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221212 (0x1316301c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:16:55 2023 Not After : Mon Mar 20 22:16:55 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:23:fd:7a:30:e5:42:13:6d:e7:95:ca:f5:6e:27:f8: d7:4f:20:6d:14:7f:93:ee:fa:7c:61:d8:ed:22:2f:d8: 39:36:7b:55:d7:c3:fe:2c:53:85:7c:fb:c3:57:5d:79: 69:0d:bc:d6:a5:12:f2:36:15:d8:b4:3c:46:a6:35:60: 02:dc:4b:87:8e:52:45:87:c8:63:2f:fe:42:47:72:95: 82:e2:98:11:ea:19:cc:92:2d:62:82:40:24:ff:23:33: 7d:8e:4c:fa:c7:2e:c6:a0:f2:b5:dc:c0:61:53:5a:c2: e9:db:09:77:cd:a8:e4:bd:0b:5c:66:a8:b6:1f:c3:ce: 42:b7:02:ca:94:0a:51:26:c7:9d:f2:43:e3:66:db:d8: 73:83:25:89:e2:4c:c6:11:38:67:0a:dd:fb:c7:45:32: 03:59:64:03:5a:d5:1e:dc:e5:c6:3b:5a:79:e8:59:b6: 15:bb:be:8d:0c:21:26:b2:fe:51:4b:3a:fb:89:a0:58: 93:ae:89:74:4f:fa:7c:49:e0:f4:a9:5f:7f:97:f7:87: 90:63:36:9c:58:54:56:6a:06:ec:be:1f:47:73:c0:98: d4:e8:d0:15:0d:f6:91:65:92:aa:d1:89:7b:f3:3f:19: 74:90:83:86:b0:45:98:fc:11:c8:8a:34:43:31:ef:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:8f:95:36:ff:ac:a2:89:b3:85:55:01:d9:d4:e9:57: d9:84:b1:59:9b:b3:06:f3:27:10:d0:41:6f:b1:b9:ae: 22:cb:a5:9f:dc:0e:1e:81:a8:93:30:6a:93:f0:2a:dd: b7:4d:6d:a4:47:79:c6:03:4d:76:71:46:90:26:fc:2f: 75:8b:6c:4f:13:21:19:23:c4:ac:30:9d:92:b1:8c:bb: 1d:bf:3f:4f:38:d7:d2:26:02:dd:18:39:6a:5b:0f:87: e9:a7:14:0a:3c:d1:ac:87:93:b2:4f:2e:62:14:a7:a1: 89:40:33:31:6f:6b:c7:63:68:d2:7d:66:e0:79:7d:24: 75:26:0b:72:32:94:ca:c5:30:04:98:45:09:9a:60:3f: 45:e4:d0:e9:c6:6e:bb:65:77:be:08:34:6a:eb:4e:58: c0:2d:ca:56:b3:c9:74:3e:2f:88:38:3f:9d:25:fa:5a: 83:a9:bb:13:e2:21:d0:b1:71:9e:ba:0d:6f:3c:a2:34: 0d:a2:07:63:dd:66:b9:47:fc:26:bb:56:c7:15:a3:81: 4f:8c:a8:0b:6d:11:9b:6c:cc:b1:8f:16:2c:71:ab:be: fc:34:0f:1e:ca:2b:15:0b:aa:08:f4:3a:d1:e9:f4:cb: a8:bd:5d:26:2f:71:9a:78:4e:d4:e7:0a:80:f7:44:1d Fingerprint (SHA-256): 53:2C:BA:0D:A9:1A:A3:E1:9A:58:60:25:BF:A2:7C:FC:A5:48:40:D7:AB:59:6D:A5:48:AC:C8:65:9A:04:2C:74 Fingerprint (SHA1): 21:D4:B3:9C:8E:3B:66:9D:0B:8C:4E:FA:45:B6:D8:C2:A5:01:F8:F8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221212 (0x1316301c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:16:55 2023 Not After : Mon Mar 20 22:16:55 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:23:fd:7a:30:e5:42:13:6d:e7:95:ca:f5:6e:27:f8: d7:4f:20:6d:14:7f:93:ee:fa:7c:61:d8:ed:22:2f:d8: 39:36:7b:55:d7:c3:fe:2c:53:85:7c:fb:c3:57:5d:79: 69:0d:bc:d6:a5:12:f2:36:15:d8:b4:3c:46:a6:35:60: 02:dc:4b:87:8e:52:45:87:c8:63:2f:fe:42:47:72:95: 82:e2:98:11:ea:19:cc:92:2d:62:82:40:24:ff:23:33: 7d:8e:4c:fa:c7:2e:c6:a0:f2:b5:dc:c0:61:53:5a:c2: e9:db:09:77:cd:a8:e4:bd:0b:5c:66:a8:b6:1f:c3:ce: 42:b7:02:ca:94:0a:51:26:c7:9d:f2:43:e3:66:db:d8: 73:83:25:89:e2:4c:c6:11:38:67:0a:dd:fb:c7:45:32: 03:59:64:03:5a:d5:1e:dc:e5:c6:3b:5a:79:e8:59:b6: 15:bb:be:8d:0c:21:26:b2:fe:51:4b:3a:fb:89:a0:58: 93:ae:89:74:4f:fa:7c:49:e0:f4:a9:5f:7f:97:f7:87: 90:63:36:9c:58:54:56:6a:06:ec:be:1f:47:73:c0:98: d4:e8:d0:15:0d:f6:91:65:92:aa:d1:89:7b:f3:3f:19: 74:90:83:86:b0:45:98:fc:11:c8:8a:34:43:31:ef:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:8f:95:36:ff:ac:a2:89:b3:85:55:01:d9:d4:e9:57: d9:84:b1:59:9b:b3:06:f3:27:10:d0:41:6f:b1:b9:ae: 22:cb:a5:9f:dc:0e:1e:81:a8:93:30:6a:93:f0:2a:dd: b7:4d:6d:a4:47:79:c6:03:4d:76:71:46:90:26:fc:2f: 75:8b:6c:4f:13:21:19:23:c4:ac:30:9d:92:b1:8c:bb: 1d:bf:3f:4f:38:d7:d2:26:02:dd:18:39:6a:5b:0f:87: e9:a7:14:0a:3c:d1:ac:87:93:b2:4f:2e:62:14:a7:a1: 89:40:33:31:6f:6b:c7:63:68:d2:7d:66:e0:79:7d:24: 75:26:0b:72:32:94:ca:c5:30:04:98:45:09:9a:60:3f: 45:e4:d0:e9:c6:6e:bb:65:77:be:08:34:6a:eb:4e:58: c0:2d:ca:56:b3:c9:74:3e:2f:88:38:3f:9d:25:fa:5a: 83:a9:bb:13:e2:21:d0:b1:71:9e:ba:0d:6f:3c:a2:34: 0d:a2:07:63:dd:66:b9:47:fc:26:bb:56:c7:15:a3:81: 4f:8c:a8:0b:6d:11:9b:6c:cc:b1:8f:16:2c:71:ab:be: fc:34:0f:1e:ca:2b:15:0b:aa:08:f4:3a:d1:e9:f4:cb: a8:bd:5d:26:2f:71:9a:78:4e:d4:e7:0a:80:f7:44:1d Fingerprint (SHA-256): 53:2C:BA:0D:A9:1A:A3:E1:9A:58:60:25:BF:A2:7C:FC:A5:48:40:D7:AB:59:6D:A5:48:AC:C8:65:9A:04:2C:74 Fingerprint (SHA1): 21:D4:B3:9C:8E:3B:66:9D:0B:8C:4E:FA:45:B6:D8:C2:A5:01:F8:F8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221213 (0x1316301d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:16:56 2023 Not After : Mon Mar 20 22:16:56 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:15:ab:ea:64:4a:c5:c1:da:b2:c9:44:90:6e:63:22: e1:37:62:5d:8d:66:90:84:9b:eb:7c:e1:15:f4:0f:07: d6:c0:b8:4b:39:49:4c:24:3d:21:b8:b2:70:25:82:06: d4:67:bd:a7:48:f5:14:85:4e:2b:43:e6:9a:a4:34:57: 99:ab:30:af:66:8f:75:b3:95:0c:0a:e5:d1:aa:41:d2: d6:97:c2:5b:d7:97:ef:ba:d5:45:0d:f3:19:b0:c6:3b: 74:16:7c:06:42:32:56:2d:36:4c:8b:c2:db:47:f0:6d: de:3b:b6:94:18:25:d0:19:38:b3:fd:47:b4:8b:f6:8f: 77:d6:65:1e:cb:7e:59:5c:05:db:60:73:64:98:89:e8: 02:d0:71:c8:70:f5:06:ab:c5:7d:ae:a9:1d:11:25:7f: 71:e7:90:35:96:65:e6:01:33:84:98:0f:9e:eb:92:7b: 33:b4:18:7f:1c:cd:00:ba:07:d4:2b:3d:01:ef:b3:6d: 4c:b1:59:ac:07:b4:fb:6d:8c:64:29:54:27:70:a2:3b: b9:72:e7:9b:a7:88:48:f2:23:2f:a7:94:71:88:c7:68: 62:12:2f:31:26:bb:a3:a9:15:f7:76:02:de:06:1d:92: 00:eb:25:b0:91:b5:e7:4e:55:74:cd:6f:dd:c5:c6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e3:61:99:9f:62:a5:86:ca:87:2f:fd:37:9f:f3:de: aa:e3:cc:bc:f0:94:90:15:01:f3:6d:df:2e:3e:b9:78: f3:c8:b4:02:48:f6:ec:e4:73:37:89:cb:08:a4:1e:ae: a9:ce:f1:fe:b3:c1:e1:d9:cb:8c:c2:15:c9:50:71:93: 2b:6c:47:74:f0:3f:5a:38:3d:53:86:a8:f8:08:44:ec: 38:f5:93:b6:90:41:70:04:de:82:40:e8:40:06:7d:5f: c8:9e:11:c7:ea:b2:c2:90:9a:82:52:6a:80:e2:07:e8: 50:2c:09:38:24:39:29:b8:35:50:49:92:cb:a4:c9:4f: d2:1b:24:a1:9f:9e:5c:ed:df:3b:66:c7:ee:d3:af:6f: 7b:d6:d5:00:37:e3:25:c1:65:2a:c9:56:df:11:8a:23: e4:7c:d4:e3:6f:f4:d5:7b:17:9b:c6:fe:d3:a1:d1:a8: e0:15:63:74:35:c3:8a:17:54:db:2a:cd:d4:8c:7f:89: 7f:47:c0:fc:2b:65:3f:3d:6d:10:08:4b:1b:50:50:68: a3:af:c3:c7:f5:de:b0:68:db:cb:fb:55:78:ac:7f:d3: 4c:3a:13:2f:61:ca:02:c3:f6:73:ea:c2:60:32:96:80: 09:15:1a:00:c4:49:38:52:21:be:d5:28:f4:c8:4d:39 Fingerprint (SHA-256): 12:68:F2:DC:A2:9C:97:91:2D:BC:CC:CC:53:D5:C4:A3:DD:75:25:FB:81:07:11:02:61:EE:32:BB:27:8D:07:0F Fingerprint (SHA1): F6:E8:18:10:C6:50:29:13:E0:AF:A7:DC:4F:17:6E:F8:54:62:A0:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221213 (0x1316301d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:16:56 2023 Not After : Mon Mar 20 22:16:56 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:15:ab:ea:64:4a:c5:c1:da:b2:c9:44:90:6e:63:22: e1:37:62:5d:8d:66:90:84:9b:eb:7c:e1:15:f4:0f:07: d6:c0:b8:4b:39:49:4c:24:3d:21:b8:b2:70:25:82:06: d4:67:bd:a7:48:f5:14:85:4e:2b:43:e6:9a:a4:34:57: 99:ab:30:af:66:8f:75:b3:95:0c:0a:e5:d1:aa:41:d2: d6:97:c2:5b:d7:97:ef:ba:d5:45:0d:f3:19:b0:c6:3b: 74:16:7c:06:42:32:56:2d:36:4c:8b:c2:db:47:f0:6d: de:3b:b6:94:18:25:d0:19:38:b3:fd:47:b4:8b:f6:8f: 77:d6:65:1e:cb:7e:59:5c:05:db:60:73:64:98:89:e8: 02:d0:71:c8:70:f5:06:ab:c5:7d:ae:a9:1d:11:25:7f: 71:e7:90:35:96:65:e6:01:33:84:98:0f:9e:eb:92:7b: 33:b4:18:7f:1c:cd:00:ba:07:d4:2b:3d:01:ef:b3:6d: 4c:b1:59:ac:07:b4:fb:6d:8c:64:29:54:27:70:a2:3b: b9:72:e7:9b:a7:88:48:f2:23:2f:a7:94:71:88:c7:68: 62:12:2f:31:26:bb:a3:a9:15:f7:76:02:de:06:1d:92: 00:eb:25:b0:91:b5:e7:4e:55:74:cd:6f:dd:c5:c6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e3:61:99:9f:62:a5:86:ca:87:2f:fd:37:9f:f3:de: aa:e3:cc:bc:f0:94:90:15:01:f3:6d:df:2e:3e:b9:78: f3:c8:b4:02:48:f6:ec:e4:73:37:89:cb:08:a4:1e:ae: a9:ce:f1:fe:b3:c1:e1:d9:cb:8c:c2:15:c9:50:71:93: 2b:6c:47:74:f0:3f:5a:38:3d:53:86:a8:f8:08:44:ec: 38:f5:93:b6:90:41:70:04:de:82:40:e8:40:06:7d:5f: c8:9e:11:c7:ea:b2:c2:90:9a:82:52:6a:80:e2:07:e8: 50:2c:09:38:24:39:29:b8:35:50:49:92:cb:a4:c9:4f: d2:1b:24:a1:9f:9e:5c:ed:df:3b:66:c7:ee:d3:af:6f: 7b:d6:d5:00:37:e3:25:c1:65:2a:c9:56:df:11:8a:23: e4:7c:d4:e3:6f:f4:d5:7b:17:9b:c6:fe:d3:a1:d1:a8: e0:15:63:74:35:c3:8a:17:54:db:2a:cd:d4:8c:7f:89: 7f:47:c0:fc:2b:65:3f:3d:6d:10:08:4b:1b:50:50:68: a3:af:c3:c7:f5:de:b0:68:db:cb:fb:55:78:ac:7f:d3: 4c:3a:13:2f:61:ca:02:c3:f6:73:ea:c2:60:32:96:80: 09:15:1a:00:c4:49:38:52:21:be:d5:28:f4:c8:4d:39 Fingerprint (SHA-256): 12:68:F2:DC:A2:9C:97:91:2D:BC:CC:CC:53:D5:C4:A3:DD:75:25:FB:81:07:11:02:61:EE:32:BB:27:8D:07:0F Fingerprint (SHA1): F6:E8:18:10:C6:50:29:13:E0:AF:A7:DC:4F:17:6E:F8:54:62:A0:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221213 (0x1316301d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:16:56 2023 Not After : Mon Mar 20 22:16:56 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:15:ab:ea:64:4a:c5:c1:da:b2:c9:44:90:6e:63:22: e1:37:62:5d:8d:66:90:84:9b:eb:7c:e1:15:f4:0f:07: d6:c0:b8:4b:39:49:4c:24:3d:21:b8:b2:70:25:82:06: d4:67:bd:a7:48:f5:14:85:4e:2b:43:e6:9a:a4:34:57: 99:ab:30:af:66:8f:75:b3:95:0c:0a:e5:d1:aa:41:d2: d6:97:c2:5b:d7:97:ef:ba:d5:45:0d:f3:19:b0:c6:3b: 74:16:7c:06:42:32:56:2d:36:4c:8b:c2:db:47:f0:6d: de:3b:b6:94:18:25:d0:19:38:b3:fd:47:b4:8b:f6:8f: 77:d6:65:1e:cb:7e:59:5c:05:db:60:73:64:98:89:e8: 02:d0:71:c8:70:f5:06:ab:c5:7d:ae:a9:1d:11:25:7f: 71:e7:90:35:96:65:e6:01:33:84:98:0f:9e:eb:92:7b: 33:b4:18:7f:1c:cd:00:ba:07:d4:2b:3d:01:ef:b3:6d: 4c:b1:59:ac:07:b4:fb:6d:8c:64:29:54:27:70:a2:3b: b9:72:e7:9b:a7:88:48:f2:23:2f:a7:94:71:88:c7:68: 62:12:2f:31:26:bb:a3:a9:15:f7:76:02:de:06:1d:92: 00:eb:25:b0:91:b5:e7:4e:55:74:cd:6f:dd:c5:c6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e3:61:99:9f:62:a5:86:ca:87:2f:fd:37:9f:f3:de: aa:e3:cc:bc:f0:94:90:15:01:f3:6d:df:2e:3e:b9:78: f3:c8:b4:02:48:f6:ec:e4:73:37:89:cb:08:a4:1e:ae: a9:ce:f1:fe:b3:c1:e1:d9:cb:8c:c2:15:c9:50:71:93: 2b:6c:47:74:f0:3f:5a:38:3d:53:86:a8:f8:08:44:ec: 38:f5:93:b6:90:41:70:04:de:82:40:e8:40:06:7d:5f: c8:9e:11:c7:ea:b2:c2:90:9a:82:52:6a:80:e2:07:e8: 50:2c:09:38:24:39:29:b8:35:50:49:92:cb:a4:c9:4f: d2:1b:24:a1:9f:9e:5c:ed:df:3b:66:c7:ee:d3:af:6f: 7b:d6:d5:00:37:e3:25:c1:65:2a:c9:56:df:11:8a:23: e4:7c:d4:e3:6f:f4:d5:7b:17:9b:c6:fe:d3:a1:d1:a8: e0:15:63:74:35:c3:8a:17:54:db:2a:cd:d4:8c:7f:89: 7f:47:c0:fc:2b:65:3f:3d:6d:10:08:4b:1b:50:50:68: a3:af:c3:c7:f5:de:b0:68:db:cb:fb:55:78:ac:7f:d3: 4c:3a:13:2f:61:ca:02:c3:f6:73:ea:c2:60:32:96:80: 09:15:1a:00:c4:49:38:52:21:be:d5:28:f4:c8:4d:39 Fingerprint (SHA-256): 12:68:F2:DC:A2:9C:97:91:2D:BC:CC:CC:53:D5:C4:A3:DD:75:25:FB:81:07:11:02:61:EE:32:BB:27:8D:07:0F Fingerprint (SHA1): F6:E8:18:10:C6:50:29:13:E0:AF:A7:DC:4F:17:6E:F8:54:62:A0:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221212 (0x1316301c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:16:55 2023 Not After : Mon Mar 20 22:16:55 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:23:fd:7a:30:e5:42:13:6d:e7:95:ca:f5:6e:27:f8: d7:4f:20:6d:14:7f:93:ee:fa:7c:61:d8:ed:22:2f:d8: 39:36:7b:55:d7:c3:fe:2c:53:85:7c:fb:c3:57:5d:79: 69:0d:bc:d6:a5:12:f2:36:15:d8:b4:3c:46:a6:35:60: 02:dc:4b:87:8e:52:45:87:c8:63:2f:fe:42:47:72:95: 82:e2:98:11:ea:19:cc:92:2d:62:82:40:24:ff:23:33: 7d:8e:4c:fa:c7:2e:c6:a0:f2:b5:dc:c0:61:53:5a:c2: e9:db:09:77:cd:a8:e4:bd:0b:5c:66:a8:b6:1f:c3:ce: 42:b7:02:ca:94:0a:51:26:c7:9d:f2:43:e3:66:db:d8: 73:83:25:89:e2:4c:c6:11:38:67:0a:dd:fb:c7:45:32: 03:59:64:03:5a:d5:1e:dc:e5:c6:3b:5a:79:e8:59:b6: 15:bb:be:8d:0c:21:26:b2:fe:51:4b:3a:fb:89:a0:58: 93:ae:89:74:4f:fa:7c:49:e0:f4:a9:5f:7f:97:f7:87: 90:63:36:9c:58:54:56:6a:06:ec:be:1f:47:73:c0:98: d4:e8:d0:15:0d:f6:91:65:92:aa:d1:89:7b:f3:3f:19: 74:90:83:86:b0:45:98:fc:11:c8:8a:34:43:31:ef:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:8f:95:36:ff:ac:a2:89:b3:85:55:01:d9:d4:e9:57: d9:84:b1:59:9b:b3:06:f3:27:10:d0:41:6f:b1:b9:ae: 22:cb:a5:9f:dc:0e:1e:81:a8:93:30:6a:93:f0:2a:dd: b7:4d:6d:a4:47:79:c6:03:4d:76:71:46:90:26:fc:2f: 75:8b:6c:4f:13:21:19:23:c4:ac:30:9d:92:b1:8c:bb: 1d:bf:3f:4f:38:d7:d2:26:02:dd:18:39:6a:5b:0f:87: e9:a7:14:0a:3c:d1:ac:87:93:b2:4f:2e:62:14:a7:a1: 89:40:33:31:6f:6b:c7:63:68:d2:7d:66:e0:79:7d:24: 75:26:0b:72:32:94:ca:c5:30:04:98:45:09:9a:60:3f: 45:e4:d0:e9:c6:6e:bb:65:77:be:08:34:6a:eb:4e:58: c0:2d:ca:56:b3:c9:74:3e:2f:88:38:3f:9d:25:fa:5a: 83:a9:bb:13:e2:21:d0:b1:71:9e:ba:0d:6f:3c:a2:34: 0d:a2:07:63:dd:66:b9:47:fc:26:bb:56:c7:15:a3:81: 4f:8c:a8:0b:6d:11:9b:6c:cc:b1:8f:16:2c:71:ab:be: fc:34:0f:1e:ca:2b:15:0b:aa:08:f4:3a:d1:e9:f4:cb: a8:bd:5d:26:2f:71:9a:78:4e:d4:e7:0a:80:f7:44:1d Fingerprint (SHA-256): 53:2C:BA:0D:A9:1A:A3:E1:9A:58:60:25:BF:A2:7C:FC:A5:48:40:D7:AB:59:6D:A5:48:AC:C8:65:9A:04:2C:74 Fingerprint (SHA1): 21:D4:B3:9C:8E:3B:66:9D:0B:8C:4E:FA:45:B6:D8:C2:A5:01:F8:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221212 (0x1316301c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:16:55 2023 Not After : Mon Mar 20 22:16:55 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:23:fd:7a:30:e5:42:13:6d:e7:95:ca:f5:6e:27:f8: d7:4f:20:6d:14:7f:93:ee:fa:7c:61:d8:ed:22:2f:d8: 39:36:7b:55:d7:c3:fe:2c:53:85:7c:fb:c3:57:5d:79: 69:0d:bc:d6:a5:12:f2:36:15:d8:b4:3c:46:a6:35:60: 02:dc:4b:87:8e:52:45:87:c8:63:2f:fe:42:47:72:95: 82:e2:98:11:ea:19:cc:92:2d:62:82:40:24:ff:23:33: 7d:8e:4c:fa:c7:2e:c6:a0:f2:b5:dc:c0:61:53:5a:c2: e9:db:09:77:cd:a8:e4:bd:0b:5c:66:a8:b6:1f:c3:ce: 42:b7:02:ca:94:0a:51:26:c7:9d:f2:43:e3:66:db:d8: 73:83:25:89:e2:4c:c6:11:38:67:0a:dd:fb:c7:45:32: 03:59:64:03:5a:d5:1e:dc:e5:c6:3b:5a:79:e8:59:b6: 15:bb:be:8d:0c:21:26:b2:fe:51:4b:3a:fb:89:a0:58: 93:ae:89:74:4f:fa:7c:49:e0:f4:a9:5f:7f:97:f7:87: 90:63:36:9c:58:54:56:6a:06:ec:be:1f:47:73:c0:98: d4:e8:d0:15:0d:f6:91:65:92:aa:d1:89:7b:f3:3f:19: 74:90:83:86:b0:45:98:fc:11:c8:8a:34:43:31:ef:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:8f:95:36:ff:ac:a2:89:b3:85:55:01:d9:d4:e9:57: d9:84:b1:59:9b:b3:06:f3:27:10:d0:41:6f:b1:b9:ae: 22:cb:a5:9f:dc:0e:1e:81:a8:93:30:6a:93:f0:2a:dd: b7:4d:6d:a4:47:79:c6:03:4d:76:71:46:90:26:fc:2f: 75:8b:6c:4f:13:21:19:23:c4:ac:30:9d:92:b1:8c:bb: 1d:bf:3f:4f:38:d7:d2:26:02:dd:18:39:6a:5b:0f:87: e9:a7:14:0a:3c:d1:ac:87:93:b2:4f:2e:62:14:a7:a1: 89:40:33:31:6f:6b:c7:63:68:d2:7d:66:e0:79:7d:24: 75:26:0b:72:32:94:ca:c5:30:04:98:45:09:9a:60:3f: 45:e4:d0:e9:c6:6e:bb:65:77:be:08:34:6a:eb:4e:58: c0:2d:ca:56:b3:c9:74:3e:2f:88:38:3f:9d:25:fa:5a: 83:a9:bb:13:e2:21:d0:b1:71:9e:ba:0d:6f:3c:a2:34: 0d:a2:07:63:dd:66:b9:47:fc:26:bb:56:c7:15:a3:81: 4f:8c:a8:0b:6d:11:9b:6c:cc:b1:8f:16:2c:71:ab:be: fc:34:0f:1e:ca:2b:15:0b:aa:08:f4:3a:d1:e9:f4:cb: a8:bd:5d:26:2f:71:9a:78:4e:d4:e7:0a:80:f7:44:1d Fingerprint (SHA-256): 53:2C:BA:0D:A9:1A:A3:E1:9A:58:60:25:BF:A2:7C:FC:A5:48:40:D7:AB:59:6D:A5:48:AC:C8:65:9A:04:2C:74 Fingerprint (SHA1): 21:D4:B3:9C:8E:3B:66:9D:0B:8C:4E:FA:45:B6:D8:C2:A5:01:F8:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221217 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221218 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221219 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221220 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221221 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221222 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221223 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221224 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221225 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 320221226 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 320221227 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 320221228 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 320221229 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 320221230 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 320221231 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 320221232 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 320221233 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 320221234 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 320221235 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 320221236 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 320221237 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 320221238 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221239 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221217 (0x13163021) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 20 22:17:05 2023 Not After : Mon Mar 20 22:17:05 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:b4:bd:ba:de:19:74:59:9a:19:4c:6b:11:b2:f8:79: 13:10:d0:e2:14:03:ac:4c:8c:f2:90:f3:35:be:54:52: 13:68:37:e6:da:41:7f:e3:f6:b1:fc:ae:c0:1e:58:f3: 00:3e:81:de:4f:60:6b:0a:f2:96:63:7d:4e:aa:cb:61: a9:28:d7:b7:09:6c:00:4b:15:21:4a:6d:bc:25:3d:91: 7a:21:b6:69:03:28:48:d0:55:63:2e:8c:b1:3d:53:5e: ef:35:c0:64:a0:9b:d6:66:f2:96:6c:59:fe:73:a2:c0: 31:75:27:1c:da:af:8b:58:4b:97:45:33:69:cd:1c:2f: b5:63:7f:d5:f1:1a:15:ed:88:df:b0:64:7d:ed:37:c2: b3:52:42:4d:d1:e3:23:5b:9e:a0:a0:07:bb:08:90:21: 80:d2:43:f2:be:62:41:50:87:a5:16:c4:e6:bd:cb:7b: 28:4d:4c:4b:64:3d:53:da:08:5f:73:f8:14:53:95:39: 45:35:da:f1:38:1b:6e:77:59:1a:e2:24:97:36:a4:88: dc:39:a0:f7:89:fb:b9:ef:a7:bc:95:ff:87:5c:4a:5f: 97:3e:25:ad:1c:24:a2:0f:8d:3a:df:2d:c9:3a:29:78: 29:61:33:4d:19:26:65:df:30:22:4e:1d:58:f5:5c:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:5a:48:aa:8e:b0:7e:ff:31:9a:46:aa:64:dd:6f:5a: 7e:dc:0e:67:33:dc:8c:c8:a1:ce:9c:0e:29:35:12:36: f2:5e:61:22:53:ce:62:f0:17:f2:da:a7:63:d2:ad:ff: 69:36:6e:5b:e6:c3:55:e6:cd:ab:35:b1:26:6f:ea:b5: 96:d5:1f:f5:8e:d7:ee:8e:a6:3d:0c:bc:ba:27:f2:f1: bb:56:b2:34:e9:24:a9:b7:e3:a5:32:de:8b:2d:1d:9e: 21:c3:26:aa:27:24:77:f9:f1:b3:ab:2e:a5:cf:18:35: 6a:0e:ea:e7:64:ad:fa:fd:fc:42:03:df:2b:e3:21:f1: b9:5e:18:52:eb:77:6e:57:ad:7f:58:a2:7a:a9:cb:a2: 86:75:f2:1c:25:82:b1:65:e5:0e:9f:8d:65:36:c3:c6: a4:b0:9e:30:be:b4:3a:db:1b:cf:77:68:e7:56:7a:66: 41:28:48:95:85:a6:a7:8c:36:9e:c6:0b:88:80:ac:19: 8d:0a:57:7e:6f:df:16:94:2f:6c:43:a8:4e:2a:4c:79: 97:45:73:f1:f2:34:64:37:d2:a7:42:30:43:7b:12:fe: ff:b4:24:cf:21:c4:8a:64:fc:a7:63:eb:8d:2e:aa:a9: 75:8e:aa:fc:fc:3c:12:ce:ce:6f:f3:1a:ac:03:04:7b Fingerprint (SHA-256): AA:A8:43:71:09:AC:87:55:CA:F5:01:85:BC:35:29:8D:20:04:08:0A:F0:CE:92:42:5D:C8:B0:D1:BF:CB:2C:BE Fingerprint (SHA1): F2:90:C6:BC:4D:D0:EF:C5:F5:2B:EE:09:A5:F6:ED:D9:D1:DB:C4:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221218 (0x13163022) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 20 22:17:07 2023 Not After : Mon Mar 20 22:17:07 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:c3:15:13:31:26:62:69:82:66:09:07:b9:61:11:5c: 6c:32:48:2c:23:84:40:f6:39:d0:d0:8d:96:9d:99:38: 53:4b:e6:9b:c1:83:fd:e3:28:8a:a0:61:82:b4:f9:0d: fe:63:66:5a:f5:16:9d:7b:05:99:6e:a9:97:e7:ae:a3: 03:11:4e:8f:36:17:a3:8b:5a:0e:e3:d8:e8:58:67:27: d5:ab:4d:53:6e:aa:c7:cf:d1:f5:56:f6:5e:83:3f:53: b0:20:ab:79:5f:25:db:a5:af:3e:f7:09:44:07:00:3f: 87:15:d7:e1:48:84:c4:fb:1d:2f:86:b8:bf:39:c5:85: a3:1d:5b:ab:50:cd:8a:dc:02:3b:93:83:e8:26:8b:df: ac:88:7d:97:14:8b:32:40:e2:57:20:99:17:17:45:4d: 83:3a:35:ef:1b:ce:3d:4f:41:36:42:61:bf:73:ce:c0: f9:89:2b:e5:ef:91:21:2a:ab:ff:15:96:14:ff:5f:4f: 66:d0:c6:ec:c4:2d:ba:f1:88:30:47:e0:9e:6a:63:28: 9d:bc:eb:52:f4:64:0f:82:af:ac:1a:a9:eb:16:7e:96: 2b:69:c4:97:8a:1d:51:88:f0:b5:69:f7:99:31:6b:33: fa:52:ab:95:23:2a:57:e0:6e:b5:ab:11:4c:09:22:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:36:d3:b7:0e:4f:53:51:8f:d6:cd:db:fc:f1:49:6e: 78:f1:5d:73:ef:83:7e:99:9d:ae:d0:d1:bc:68:31:d7: b7:1c:de:bd:a4:e4:45:47:8f:90:9f:d6:3d:fa:55:aa: d2:92:15:03:43:db:07:77:14:78:70:3e:3d:7c:10:b3: 96:a5:29:9a:49:dc:04:9d:68:89:93:64:59:6c:ff:c3: 2c:a2:6d:8c:e0:8b:da:86:b3:a2:2a:8c:2a:2f:62:0d: f4:39:29:3d:4d:0b:fa:67:95:33:33:a7:07:3a:2f:1b: af:42:f5:e2:ba:ad:d4:95:ec:26:ca:a3:86:52:75:02: 2a:d8:80:d4:ae:01:8a:53:ed:f9:89:fd:8d:89:57:81: be:19:c2:67:cd:54:62:7d:45:de:e3:45:1d:03:21:e9: 60:60:26:7a:59:eb:5a:7c:ca:e3:3d:86:da:2f:5b:aa: 37:22:89:06:72:42:3c:d4:7a:b0:44:03:9e:f5:92:a1: 65:99:a8:fa:44:5c:41:64:16:8a:7d:9b:10:3f:05:ab: dc:6f:11:d2:70:6f:26:ea:04:f9:c3:4e:04:d9:f3:6b: d1:c1:28:e9:96:09:28:32:3f:9f:47:a0:2d:99:5c:95: 87:53:c2:d2:9f:5a:92:66:4a:47:e8:6d:aa:27:ca:65 Fingerprint (SHA-256): 28:EB:05:78:6F:E9:29:EA:FB:3D:C3:59:EE:70:E8:F8:AD:C3:B9:41:4B:D6:80:14:10:09:7F:DC:C2:04:CD:E9 Fingerprint (SHA1): 0D:92:7A:D1:8A:F7:E5:AB:9F:76:51:ED:29:E0:18:1B:71:7E:E2:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221219 (0x13163023) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 20 22:17:08 2023 Not After : Mon Mar 20 22:17:08 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:3c:62:b6:93:6d:cf:9d:3f:78:15:11:bb:34:84:a8: 36:a0:d1:5c:6f:7d:a3:13:24:68:f3:1f:39:50:dd:fc: 7c:9e:25:15:df:23:ab:32:ba:a4:b1:f3:dd:06:e5:72: 9f:8d:93:a2:86:bd:5a:12:d9:57:ab:ee:9b:89:7c:d9: e2:fa:c0:7f:8e:30:cf:02:70:c0:26:6d:fe:8b:49:02: cf:82:3f:c3:55:80:82:97:19:21:cc:1f:4e:7a:7a:b0: 2b:2f:d7:e7:4a:55:3a:a7:e3:ab:16:0a:83:f7:2f:fb: b1:a8:01:0e:c0:b1:13:3a:45:1e:64:95:1e:3c:fa:71: 9e:5d:27:2b:e4:45:e4:c0:12:3c:b0:bc:a9:e6:4d:2b: fe:a2:33:6a:a6:2b:b5:46:cb:6c:70:f2:5b:ba:64:96: 77:9b:13:e0:1e:23:2a:ea:1d:61:51:b7:7e:c2:69:aa: 73:18:d3:1f:6e:d4:71:02:8f:ce:dd:54:c3:e9:43:ce: 6e:bb:1e:b2:f5:79:3a:8d:5d:cf:fa:45:06:b1:17:fc: f2:0c:9c:16:cf:a1:00:f2:3d:c9:84:7a:d6:5d:f2:7d: 1b:fe:60:3b:07:53:3d:7f:26:d3:ec:b5:d2:bb:e4:ef: b5:fc:2b:cd:1e:60:cc:25:3b:6f:0e:69:64:bc:b5:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:39:24:3c:33:09:9d:a8:11:46:84:9c:1f:8f:03:e3: 74:d3:94:d7:18:b5:53:72:b3:12:a3:5a:56:08:c8:bb: 02:5b:7d:3e:a3:4d:33:77:37:fa:6d:8a:dd:11:57:31: 45:7e:39:eb:26:49:d1:cc:40:16:b4:8c:fe:87:a6:fc: ef:9e:04:4f:60:27:b9:52:a3:86:c6:7c:07:23:8e:c0: 23:71:7d:d9:66:5b:26:46:cb:ef:0b:08:a9:a9:2c:94: 2b:40:92:cd:0b:26:1b:91:fb:26:f6:7a:3e:97:1f:10: b0:d8:62:cf:9a:7b:14:54:97:23:6f:b1:3d:84:9a:fe: bd:78:7a:fa:e8:1f:ca:64:ad:70:b5:f3:29:28:9c:bd: f6:c5:2b:8d:85:db:26:eb:63:1a:f7:0b:27:89:90:47: 69:59:ae:5e:14:20:49:17:d9:44:0a:fb:59:66:d6:e9: f4:6c:6f:1e:c2:4a:68:bc:9b:83:97:b0:87:5d:fc:25: 1b:e1:c2:dd:2e:04:d7:b4:52:43:df:57:7c:ec:7a:c7: 0a:93:77:f0:cd:73:10:a1:09:ae:5e:d8:69:05:6b:63: 97:43:5e:44:f2:ed:d1:30:25:00:ff:1b:2e:8c:51:90: 7f:83:f3:19:85:94:94:7c:b8:79:2c:a6:38:27:97:be Fingerprint (SHA-256): 0C:44:D7:CC:14:75:0C:1F:0F:FA:4A:6F:E5:DF:3C:F5:A0:1C:A2:B2:05:60:72:C6:91:01:BB:4A:8A:39:4F:68 Fingerprint (SHA1): 05:88:90:82:28:CB:1C:4C:6D:65:87:09:08:B4:16:63:A3:30:78:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221220 (0x13163024) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 20 22:17:09 2023 Not After : Mon Mar 20 22:17:09 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:24:25:c2:50:f0:79:37:76:12:c3:9a:31:33:13:ad: f1:22:5b:d1:28:f2:57:34:bf:d0:1d:6d:36:f6:5d:60: 27:5e:6d:6c:b4:7c:a9:c3:66:53:5c:44:65:46:f6:f0: c8:83:22:6a:51:1c:09:01:d1:b3:33:36:4c:47:29:25: 63:8b:b6:08:44:e2:b3:5a:ce:ce:e5:23:a7:0c:b2:76: 9a:1b:72:70:05:19:18:b4:64:10:ad:3c:14:5c:5e:8d: e8:59:63:c4:7f:39:33:9e:e1:a3:6e:4a:d8:18:99:b2: 6b:ac:1c:61:09:61:29:e0:0f:49:7d:f3:29:ba:a5:be: 96:83:66:a3:ae:34:cd:6d:ad:c8:86:db:4f:bb:04:1b: 0a:5d:8f:55:76:1c:5b:85:82:51:8e:f5:4a:76:27:fc: 4e:73:b4:b4:06:48:0a:5b:86:4b:48:77:b7:68:4c:d4: 7c:8c:44:96:20:9a:35:c1:c6:cf:19:f9:e4:f0:b9:ec: 89:98:2d:99:77:d5:8a:cc:7f:3d:8c:ad:ef:d9:78:3c: ff:98:25:8f:e5:c7:bd:a5:b9:1a:2c:be:f2:7a:a0:1d: 46:48:30:a1:71:c9:1e:1e:ff:1b:28:fa:9b:41:82:3b: 30:31:c0:f9:29:a5:f5:f3:f5:c4:38:bc:b9:57:86:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:7b:c2:09:bd:d6:f1:f6:79:7e:33:25:f0:90:f8:09: 40:83:5e:83:fd:e2:cc:36:2e:46:fd:37:e6:2b:89:cd: e3:4e:10:14:66:d2:c2:a1:41:a2:d5:20:c6:69:7f:cc: 50:fa:f7:56:a9:d4:0d:1f:1c:0e:5e:9d:16:d0:0e:1b: 21:d2:b0:36:d8:8d:74:b7:67:b3:f9:58:d2:60:3e:15: 84:b2:d3:d4:e9:a3:25:23:b9:d3:06:cb:27:53:f3:42: 5e:92:05:6a:d2:9f:55:7a:67:07:87:02:c8:5a:8c:c9: 0d:9f:49:f8:c2:60:6f:82:bc:74:36:c0:76:dd:52:e4: 56:78:c8:b7:85:15:e3:52:8d:49:d3:86:ae:ed:6f:14: 97:3c:59:93:43:9e:9d:47:bb:57:dd:16:5b:62:96:81: 82:91:b4:e7:a2:38:9b:a6:3b:6b:0a:70:3d:34:21:57: e5:78:7e:f0:d0:d0:b7:9e:d3:80:d4:49:0c:9b:b2:c7: d3:a4:c7:ed:5c:73:8e:50:12:77:3c:82:0a:db:e2:c1: 93:76:5d:e6:02:c7:35:f2:17:df:84:5f:4d:3a:96:17: 1e:0a:ce:02:55:17:11:9b:6d:3f:a9:32:e8:d3:f3:72: 99:57:a3:b0:2a:19:0a:60:d3:eb:9a:f7:b1:80:f0:d0 Fingerprint (SHA-256): 51:E7:35:3A:EF:F2:85:01:B3:CF:8E:6D:B0:93:5A:0B:0B:A3:D5:14:77:4B:7D:AC:37:8F:02:C1:DF:A3:F2:33 Fingerprint (SHA1): EF:B0:8B:D1:59:5A:20:4C:B0:DE:CF:D2:FA:D4:97:FC:E8:C7:D9:5C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221221 (0x13163025) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 20 22:17:10 2023 Not After : Mon Mar 20 22:17:10 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:35:15:f8:e0:2e:9f:20:29:21:cb:8f:84:f3:3d:4e: a1:8d:f5:34:15:5b:c8:0c:30:a1:41:90:0d:7f:0c:1e: c2:3f:b4:4c:e0:81:3c:97:95:fd:89:8f:47:33:c0:22: 78:55:b5:c1:26:c2:5b:7d:c4:46:db:ca:35:e6:63:86: e0:79:f7:0b:22:89:0e:73:fe:96:ce:ff:58:43:0a:e0: 3d:a6:22:a6:b2:d2:b8:34:ba:2e:1b:ac:df:5b:a4:46: a0:dd:8b:48:f1:ff:ff:aa:3a:86:e1:0e:7e:47:71:15: d6:f9:d9:58:14:cc:1d:a1:d7:8b:a1:0c:cf:23:6b:61: 7d:a7:66:28:d2:60:4c:a8:10:d7:83:10:a9:cf:64:69: 83:a4:8f:60:11:2c:a8:49:67:7b:f7:31:88:bf:8a:0f: 8b:95:f2:69:2d:4f:ac:89:f4:ea:99:31:5a:9e:a5:8a: 5a:df:d4:16:33:c8:d1:56:45:c7:d0:17:ce:27:9f:0d: ef:f3:ae:0d:6f:b2:9d:a6:24:ac:1e:db:9e:30:75:c0: 48:e8:69:9f:d1:98:d0:ad:86:fd:f6:cd:54:87:af:31: 5e:13:a3:a0:3b:22:dc:ff:f0:62:02:47:55:40:00:9e: cd:7c:d0:d6:ce:a9:2b:b5:11:67:2a:e5:09:94:f1:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:e6:36:6f:c6:36:ff:ec:11:8e:6e:a4:74:0b:f9:84: ef:6e:8c:37:9c:90:1f:34:df:41:8b:3a:20:ec:e0:33: d5:c9:02:7d:d3:fb:53:b2:0c:68:c2:f8:df:0d:f9:e6: 33:20:2d:1b:fa:c2:a3:19:d5:e2:b3:be:b2:4c:3a:d8: 26:29:e8:3c:10:ee:97:1d:0b:4c:f2:33:d0:94:da:63: dc:d5:26:7f:b7:c3:89:bb:ef:2f:d4:5b:20:fd:bb:82: 16:ce:85:66:7e:c5:ea:76:5b:02:ab:27:ac:9e:92:12: 2a:78:82:fb:73:4a:a4:23:b6:69:75:b6:9a:a8:f1:c2: d7:3c:41:69:37:b5:cd:4e:be:91:f8:2b:bb:bf:f4:4e: f4:f7:ac:ce:a4:0f:70:9d:91:85:d1:99:b4:34:6a:91: 4b:4e:cf:b4:6e:08:f7:c7:9b:ef:bd:ca:c0:86:03:45: 39:3d:ff:e8:15:c3:32:89:7f:cc:13:e6:f0:bf:3a:f3: 54:95:b7:9c:0e:0e:7d:42:e4:04:dc:6e:74:df:ef:eb: da:e8:29:9f:f2:4e:32:19:59:b2:01:df:47:51:b5:b1: f9:5a:f6:bd:d5:3e:1b:7f:7b:9b:e7:a5:d5:be:04:64: 8d:b3:66:ee:9c:14:dc:8b:96:d6:ce:97:2e:68:4f:33 Fingerprint (SHA-256): F7:9E:6A:C8:BC:A3:31:B9:D9:FC:80:E8:00:4B:58:DB:31:B1:F0:9C:95:70:C3:5A:88:6E:16:5D:58:B9:0B:8B Fingerprint (SHA1): 10:73:E6:56:89:8A:71:61:29:A5:7D:05:86:32:74:C2:0F:55:FB:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221222 (0x13163026) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 20 22:17:11 2023 Not After : Mon Mar 20 22:17:11 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:f2:90:e2:08:41:38:80:d6:b3:3c:3c:fc:40:72:5c: ce:42:ff:07:5c:67:50:34:46:e3:97:5e:c9:08:40:7c: ff:cf:af:75:13:5a:35:e1:2f:15:44:47:78:8b:2f:79: 84:df:76:7b:e0:1d:a9:7a:80:5d:8d:77:d1:92:97:73: 88:e3:04:dc:38:ac:8f:5c:08:0f:53:3b:8b:81:7f:eb: aa:fd:77:2f:8e:55:bd:09:cd:c6:56:d5:17:6a:5d:fa: 63:4c:90:c4:62:e3:9f:48:6b:23:ee:15:01:fc:36:34: 15:44:2c:ff:42:5a:7b:c8:10:55:c2:3d:bd:3b:f2:74: e1:ea:bb:21:fb:b0:59:1e:e1:6e:33:3b:4a:35:87:a9: 80:db:36:98:fe:e0:78:a7:60:50:6a:0f:ad:6a:e5:39: cd:95:45:9d:4f:df:76:72:35:33:67:51:6e:ec:66:ee: 6a:7b:90:08:6d:d7:36:35:a6:96:94:55:bf:6f:fb:2e: 02:13:60:d7:a9:cb:5d:97:52:8b:bd:4c:ce:8f:56:0a: 07:a7:b0:53:6d:78:6f:18:b9:b3:62:86:a8:d8:c1:81: ba:0d:56:cb:a4:3b:f9:82:ce:c4:4b:d4:f1:43:b5:e6: 43:c4:a1:ba:e3:7e:e9:3d:7d:82:93:59:60:8f:3b:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:ba:19:b2:dd:57:68:b6:8e:17:59:22:ca:ec:ed:e0: a8:47:e6:60:5b:ea:32:95:c3:56:3b:a1:93:4b:b1:47: 33:ce:49:50:b1:0f:27:e7:33:95:ed:c5:92:3d:be:0b: 61:b2:57:eb:af:e2:7c:4a:9c:4a:46:05:e3:23:a6:6d: 61:61:fc:0d:c0:06:10:d2:24:21:27:b8:fe:d3:7b:82: c8:86:33:5c:a6:6f:76:7a:cc:28:77:86:8c:aa:6f:9d: 8c:14:38:91:c2:35:c1:31:9f:ea:47:3f:ab:75:12:1a: 2e:23:13:ee:78:49:b9:10:34:3a:ff:22:8c:cb:46:69: ef:ee:9b:f8:12:e3:e4:4e:4c:07:bb:40:e9:3e:32:2f: 52:ef:fc:b3:96:e1:91:66:16:b2:1a:04:4b:10:ad:a0: a2:4b:98:a7:c7:d3:3f:03:68:64:31:3a:19:c7:8d:5d: 40:fd:3e:f4:f7:8a:54:9f:15:62:84:56:a0:c8:d1:f4: 8f:83:03:2c:b6:1b:63:a2:16:fd:25:c0:4d:14:c1:47: 86:50:68:0b:2a:4a:93:32:b6:d8:ea:bd:da:f1:16:1d: 56:3b:8c:1d:42:a6:50:b1:fa:3e:0d:de:75:a4:d4:bb: 4f:78:4e:98:ba:0e:92:a7:c0:ea:e7:19:89:60:a0:83 Fingerprint (SHA-256): 60:61:D9:37:AC:DA:B0:28:34:B2:21:35:EB:EC:6E:AD:3F:79:1A:A0:5D:0C:02:17:51:C5:C2:AB:61:10:1E:1B Fingerprint (SHA1): B2:FD:6C:5E:C9:C8:A4:18:92:2E:9E:45:BD:09:C4:E4:48:34:79:14 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221223 (0x13163027) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 20 22:17:13 2023 Not After : Mon Mar 20 22:17:13 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4d:23:fa:f3:aa:c7:f9:ce:6a:0f:80:17:21:b7:40: e8:27:14:45:3f:95:9c:1f:2c:a0:d8:a8:34:2b:04:62: 45:5a:2c:c2:8a:61:a7:52:c1:dd:9b:e6:2a:d4:e5:6d: d9:5b:d8:d9:60:32:27:09:16:8b:63:6f:ef:86:b7:5c: 25:26:74:b7:9a:d7:c2:ce:69:19:b4:c3:3a:c4:f1:21: 3c:f3:ba:c2:00:c7:f1:27:01:f4:1e:6d:e8:9f:0b:c8: 99:58:e1:0c:da:2c:0c:b7:76:a6:d8:da:37:94:2d:ff: a0:8e:f9:46:3f:17:0a:84:bb:b3:bc:91:b6:d9:a6:96: 98:86:70:80:9e:7b:4c:4a:7a:c7:61:70:75:9f:6d:a5: a6:62:a1:56:b7:c3:0a:8f:c2:d4:1c:b2:55:83:a4:a5: 50:7f:83:21:17:9a:0a:e5:b0:6f:f8:f2:6c:74:2e:cf: 51:74:c4:8b:73:01:35:81:76:57:65:00:b1:ec:ad:20: 60:80:3c:84:76:a1:eb:c7:d5:0c:66:7f:96:e6:9a:ba: 68:ac:f6:58:77:52:97:29:13:87:dc:21:d5:28:4f:01: 68:55:7b:0b:9e:05:9e:fa:84:9c:4b:0f:8d:30:5d:bc: 98:75:41:8e:93:46:78:d7:33:82:28:4c:ef:f9:78:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:2b:e4:c4:ae:d0:33:ff:e1:b3:43:46:9d:39:37:79: 4c:fe:41:87:44:e0:8b:9c:aa:27:13:14:e7:ce:41:88: 54:a1:36:11:35:77:75:48:61:a7:b0:1c:d7:1e:a9:97: 7a:6b:2f:74:bf:35:b1:7f:58:8d:6c:cb:ee:fb:d1:b3: fd:92:49:9b:19:63:d6:34:3f:5b:a5:e5:37:4d:8e:08: c3:8f:ee:9f:d8:63:49:bf:19:46:9e:14:30:49:de:1a: bf:bf:27:e0:f6:e0:88:e3:4b:32:9f:1b:7a:a5:60:e0: d6:7c:34:a5:cf:7f:15:90:c5:e3:80:25:4e:93:20:f4: cd:3e:0e:3e:83:86:5f:7a:57:95:ae:92:06:1d:50:7d: 3d:91:bf:ee:86:80:be:07:bb:84:bc:d3:8a:a5:b5:dc: 81:af:1a:78:af:79:f0:5c:51:73:ca:14:d2:76:09:29: 22:85:82:52:a0:a2:5d:2a:cd:0b:bc:1e:eb:be:1d:b7: 60:71:cf:c5:1d:57:e3:21:26:4e:2d:6b:79:21:27:63: 34:dd:9d:1a:3a:9b:00:06:8f:42:05:ee:ae:a9:fd:d2: 6d:32:82:ed:99:ea:48:89:ed:8e:24:e4:da:c4:da:36: d6:4d:01:d8:bd:8f:8d:15:6c:b8:5d:e8:a2:91:ce:64 Fingerprint (SHA-256): B7:DA:56:33:33:F6:9B:6A:7D:43:82:9A:7D:95:D5:0A:D4:52:A9:D0:72:8A:E7:FB:94:83:9E:10:FE:08:66:D9 Fingerprint (SHA1): 1E:6F:89:D4:D6:29:9E:18:25:1E:BB:62:A9:3F:C5:44:B2:2F:67:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221224 (0x13163028) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 20 22:17:14 2023 Not After : Mon Mar 20 22:17:14 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:71:48:d3:6a:fe:db:ec:35:69:26:86:9e:5e:57:2a: 36:e8:40:48:ee:ea:48:e5:25:b4:e3:da:45:d5:da:c5: 2c:18:ea:50:fc:02:27:b5:0c:ad:cd:f3:b5:88:a6:19: 7c:64:13:c2:f8:52:3f:54:29:44:f6:97:b0:f9:8b:72: 7d:04:8b:16:dd:35:2d:45:6e:59:78:ee:76:1d:e3:4e: 79:76:be:59:c4:d2:b3:b7:71:2c:bf:ae:54:ea:81:ff: b8:6e:5f:4e:45:bc:1e:d2:cc:e6:95:6a:9a:2f:6a:6b: f6:9a:eb:0e:9f:e7:9c:57:ad:99:71:f2:c8:4b:39:ff: 17:0d:ae:4a:13:dc:0b:f5:69:ae:61:16:32:3b:19:7c: 1a:23:db:6a:02:81:82:ec:9a:3e:7d:40:8b:2b:61:8c: b1:a2:3d:cf:98:f9:e0:be:66:90:b0:01:c3:93:91:6b: f8:f6:90:7c:26:de:09:3e:41:28:23:1c:92:f9:6b:e4: 11:cb:14:ee:db:6c:43:1e:21:a3:24:0f:65:52:5d:7e: 46:56:ff:05:b7:e1:99:1b:30:e7:f3:b9:f7:fd:ef:9e: 99:de:ab:e3:5a:27:5c:92:3f:cf:7f:95:43:3e:14:62: 1c:91:1d:e4:cd:63:43:ad:6d:d7:ad:08:4e:3b:56:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:67:be:75:39:ba:21:e0:db:28:2d:7e:77:da:95:ad: 62:3b:76:6c:2a:3e:76:f2:70:01:d2:ed:d8:2c:ab:49: 59:a7:df:5a:9e:5c:20:69:f7:77:57:06:c2:17:f8:f3: 3b:3c:f0:eb:99:bf:5e:57:60:d0:25:34:a4:23:3e:82: 3d:cf:81:04:91:dc:32:00:cd:e9:36:33:50:45:5a:88: d8:ba:27:38:4d:90:02:ae:a3:a7:3c:46:dc:5c:11:1d: 9b:95:f0:73:ad:17:fb:86:92:1b:29:a8:94:07:8c:3f: e9:b0:5e:4f:cd:05:a3:4c:55:0d:58:4c:70:f2:57:5f: 74:79:ca:69:85:0a:68:f0:d7:f9:44:77:58:bd:d6:25: a0:b1:fa:d9:d4:52:54:dc:a7:5e:2a:e9:6c:6a:a8:c6: 68:d5:86:fb:90:16:6c:83:98:c6:2c:1d:f7:c8:7a:6c: 8b:47:e4:4e:0f:6f:3e:7b:2d:1c:e3:b7:0e:3b:c1:8b: b8:b4:61:7e:a0:bd:6d:70:83:eb:ac:76:c6:43:06:49: cc:16:64:47:7d:e4:13:15:8d:ae:c6:c2:63:85:37:68: a3:fd:c6:3f:e5:ea:74:55:e4:a1:85:fc:45:9c:d8:f8: 69:17:6d:e5:70:ea:e8:ff:34:6c:6f:ae:27:9d:83:2f Fingerprint (SHA-256): D1:03:FE:66:72:D7:D1:33:1A:85:A6:7B:5F:89:9F:73:A7:2E:18:38:27:B2:5C:15:EC:AC:BC:66:2F:15:05:62 Fingerprint (SHA1): 45:F5:E6:52:35:2E:B7:1F:97:71:9C:43:BF:6F:46:61:A5:7A:DB:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221225 (0x13163029) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 20 22:17:15 2023 Not After : Mon Mar 20 22:17:15 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:0b:da:1a:ac:90:fe:c7:f7:28:05:3d:6a:09:4b:30: e4:4e:1a:e1:28:55:7c:92:d0:25:01:f9:b7:d6:b0:a8: 2d:fd:e8:8d:87:25:d5:90:22:3d:a7:3a:2d:19:59:14: 12:a2:d2:3b:58:0e:e6:ba:b7:82:50:74:88:a5:72:16: c8:60:8e:a5:93:db:03:a3:32:75:17:ea:21:f8:1e:21: 94:d7:55:2d:07:76:c2:0f:12:00:35:7c:24:3d:95:dc: d2:20:6f:c8:cd:9d:e4:cb:88:c9:4a:f2:b6:5d:41:74: ea:5e:84:1c:b5:c7:ac:a9:0b:c5:54:58:8f:de:85:86: b3:a5:79:2f:6a:37:8b:d8:a4:24:77:30:a7:fb:9b:f1: 3f:d9:17:1c:6e:b7:3b:e2:cb:7d:5b:8e:9f:ca:d4:94: 21:54:4d:cb:45:7c:8a:88:35:52:3a:c4:10:3a:04:85: 05:08:9d:86:1e:f6:0a:f5:26:6e:5a:38:4a:4d:bf:a3: 0d:31:17:5e:9c:6a:b2:10:7a:82:fb:34:de:48:61:82: 6c:72:b6:84:7b:b4:46:15:43:59:7c:a8:79:34:30:0c: 1b:ea:b9:85:d2:3d:da:bb:34:1e:78:87:fc:00:1b:bf: 52:3a:f2:78:4d:bc:a0:9d:db:c8:ad:1c:3d:8a:d5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:b0:68:dc:13:b7:95:b3:6c:b2:30:09:2d:c1:5c:7d: 05:53:11:ad:9b:78:50:19:ba:62:47:80:85:69:8d:90: 05:a2:f7:00:16:8b:34:b5:9b:2a:38:b5:08:fa:74:b3: ce:1a:68:2a:ca:05:57:2e:2d:a8:24:7a:e2:99:dc:d6: 71:9a:e0:50:d6:5a:a9:33:dc:59:7f:c7:f1:72:1b:e4: 13:f0:45:95:ad:cd:6a:8f:24:fd:f7:ac:07:31:e7:84: ba:a9:1b:f1:49:ad:33:e8:ea:ea:14:15:1b:a2:5d:1b: 4b:b9:1c:6f:04:59:23:43:f1:cb:f0:52:35:49:d2:e8: d9:f2:8c:0b:de:49:3b:1a:4a:a2:e0:68:3b:73:c6:55: c4:50:a5:3a:f5:58:fb:6b:21:1e:32:c2:7f:ca:2b:8f: f8:5d:00:36:a7:f3:f5:2a:bc:aa:01:fb:6f:72:30:36: ba:15:06:2b:eb:ab:5e:5b:6c:fd:c1:08:81:71:6c:95: ca:0f:0f:47:6f:7d:4d:3a:bf:c0:30:f5:b6:7f:76:a3: 56:c3:60:75:39:7b:78:d9:fa:05:78:03:fa:43:60:ec: f4:11:70:33:c8:b9:31:ba:f0:05:2b:3a:99:29:be:02: 24:59:cb:6e:76:9c:8f:2f:73:28:ad:39:f8:e5:90:5b Fingerprint (SHA-256): AE:36:97:10:4C:F8:57:70:05:1D:59:22:A4:BD:7B:F8:87:D4:EA:67:C4:B0:D3:30:90:A2:A2:50:C2:D9:7B:38 Fingerprint (SHA1): 64:66:8C:5D:6B:92:20:85:72:2B:F5:AC:DC:55:51:15:45:59:1E:72 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221240 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221241 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221242 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320221243 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221240 (0x13163038) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:34 2023 Not After : Mon Mar 20 22:17:34 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:fd:1e:e8:52:be:41:1d:c8:45:1f:53:a7:3a:34:b8: 66:82:26:18:f0:26:6b:1e:34:58:01:28:74:28:66:03: 9d:2d:7b:b2:3e:9a:29:f7:ad:4b:da:38:10:11:3d:42: d6:c6:b4:ee:7a:3f:87:34:3d:bc:1f:dd:99:57:92:1a: 25:8f:de:9a:0b:36:44:f5:69:42:c6:27:43:d9:ed:21: 7e:49:7e:5d:6b:0b:af:69:7d:0f:5b:ed:92:d3:12:1a: db:9c:86:7a:14:85:bb:4c:32:1e:a5:f6:58:16:a4:3d: b8:d0:8b:52:5a:bc:f3:0a:1d:46:92:0f:74:23:39:d2: 59:74:f3:f0:2f:9a:a6:f7:2c:e4:8c:63:4e:bb:c3:a4: b9:8d:52:e3:70:7a:1c:e5:4a:b5:8c:fe:05:0b:d9:b8: f3:f9:e6:27:8b:62:a7:78:21:ec:25:6a:a6:cf:f4:0d: 85:aa:be:66:be:ec:9a:bf:45:3d:7d:c4:05:db:1a:86: 76:c1:b8:cf:e5:82:9f:19:23:3b:fd:23:2c:f2:1f:46: 34:9e:18:32:33:a9:a7:ed:ac:30:a8:8d:e1:01:e4:f8: 5d:f9:fb:5e:ad:06:8c:49:6e:78:06:f2:35:df:1e:b1: f2:dc:08:37:77:98:11:fa:6b:b7:15:e6:8d:f4:f7:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:18:20:b2:ad:87:26:4d:c1:db:79:53:13:70:ca:4b: 18:a9:f2:ed:33:83:00:66:15:8e:82:ce:11:4b:ef:9a: 78:90:0e:85:61:4a:bc:0b:b8:d4:1c:07:06:50:eb:e0: be:b4:b6:e2:c8:08:0f:c6:d9:3e:9e:d7:4a:28:4b:98: bf:33:03:b8:1e:dd:0b:cb:51:f4:ae:7e:87:63:76:80: d6:b2:1a:a5:fe:b6:d0:31:54:25:d3:88:3a:a2:a3:cd: c9:db:1b:6f:be:5e:78:6d:59:0c:d0:55:bf:fe:cd:d8: 27:c5:a3:f9:00:03:d6:3b:26:b4:2b:88:34:3f:0d:ad: 80:0b:bb:34:b5:9e:8a:73:fe:17:00:66:90:76:10:10: 04:35:73:70:f8:73:d5:37:56:f8:f3:78:c7:24:26:f4: 21:82:a4:ef:97:06:ca:b2:df:ff:20:e2:b5:b1:c8:84: 4a:ae:99:24:11:4b:99:8b:da:9e:e6:52:b7:81:80:3f: fb:b4:94:cd:0c:ba:3b:b9:a5:15:5d:24:bf:c2:22:34: 58:85:02:86:c7:15:ef:9e:e7:68:0d:8c:b5:cb:db:5e: 82:7f:a3:48:78:98:ab:4c:8e:a1:fe:0f:3a:c1:f1:9b: 6f:47:02:f6:12:e7:98:31:98:19:2c:d1:c5:86:1b:e0 Fingerprint (SHA-256): E0:FC:6E:B4:82:61:94:2B:A3:AD:98:2F:69:49:83:6E:BD:F8:F9:0A:87:35:F5:BE:20:88:5D:3B:29:72:57:1D Fingerprint (SHA1): 88:53:91:FC:19:70:10:31:5E:B8:DB:F9:0A:85:AA:B6:AD:98:93:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221241 (0x13163039) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:35 2023 Not After : Mon Mar 20 22:17:35 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:8d:ed:70:38:dc:72:b0:4d:c0:53:86:42:83:24:77: 9e:72:36:92:4d:fb:be:22:b1:10:6b:55:1c:49:c2:6a: 06:e2:cf:6a:36:2d:ff:a7:e3:3b:37:cb:49:3a:da:d2: fe:a4:84:f6:cb:c5:60:6b:4f:76:47:5a:ab:3d:c4:e3: c8:7d:fa:93:85:06:7c:fe:3e:27:35:d9:57:b0:e9:ce: c5:8e:8a:86:f0:4c:58:96:c6:21:e9:23:86:45:06:ec: c0:2a:6c:3c:6e:87:c3:58:f9:b0:6a:fe:93:d6:51:d7: 18:ec:51:be:6c:d5:d5:c5:d7:48:ac:c9:c5:c2:f0:cf: 94:8d:fe:a5:e6:f6:b1:cf:3d:78:0c:8d:a3:d8:4e:38: 71:c1:97:69:2b:40:fb:2e:bc:93:7d:51:e2:d8:11:8d: 3a:57:99:03:1d:ea:37:cc:e2:d4:20:23:81:77:01:59: e3:6c:6c:6d:d5:44:05:74:0e:1b:4b:9d:77:82:4c:fe: e4:b1:37:2d:11:b4:19:fb:18:95:18:0f:76:e1:01:5b: 90:03:5f:72:7a:a2:18:29:85:29:40:de:43:0c:71:0f: 62:a2:70:ec:f9:c6:fc:0f:0d:ff:a1:b7:a5:44:1d:b1: ad:1f:f1:62:92:c0:c8:09:45:7a:de:23:05:e2:c5:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:70:c4:31:51:00:0f:02:22:b2:ad:32:42:d6:e6:31: d6:c9:10:d5:29:dd:33:f5:1d:c6:9c:06:24:c9:0a:54: ce:2a:84:5f:46:3f:1f:d9:8a:d8:91:a3:b4:5a:47:f9: b2:b5:64:86:ec:bb:e8:61:e4:89:23:8e:04:35:cb:0c: 28:dd:fc:80:7d:ea:33:61:7b:4b:32:29:98:66:a8:b6: 5c:93:dc:c6:52:ea:45:27:e6:05:d5:f2:e1:78:a4:f4: 66:27:1d:51:90:bd:33:98:20:05:44:9f:d2:fc:7d:fe: 41:51:33:74:d5:30:02:c5:8b:10:f9:d2:19:e8:d7:ed: f0:38:88:1a:aa:38:ef:ab:67:9a:5c:6a:ce:18:67:79: 7a:30:1d:cc:cd:e4:34:53:1e:c9:4c:f2:aa:7d:e3:d7: 00:55:a9:2c:0f:a7:ef:81:74:1d:8e:b2:34:ec:43:cf: 66:8c:e4:fd:8f:cb:2d:0c:7c:52:16:cc:f6:97:0a:a2: c7:29:a2:ed:7b:5b:0a:1d:f8:48:38:d8:92:0c:c2:02: 8d:b4:e7:ac:a0:e1:3a:d1:da:6a:0c:95:5c:76:93:fe: 79:06:6a:22:be:3a:71:2e:b4:91:0b:cc:70:4e:34:3f: a1:fc:f7:6c:cb:b6:f7:0c:b2:6f:23:ec:7b:4f:07:d6 Fingerprint (SHA-256): AD:1B:06:CD:EB:CA:16:1E:A6:6F:D3:C7:33:4E:2D:06:48:C9:A1:A6:C6:A7:8B:91:81:E8:70:65:50:73:E0:1F Fingerprint (SHA1): 45:D9:82:68:00:83:5A:43:E1:CA:89:27:27:3E:1C:54:2D:68:D0:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221242 (0x1316303a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:17:37 2023 Not After : Mon Mar 20 22:17:37 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:a2:2a:56:fd:0e:bc:6e:d9:2a:b3:05:bf:c6:08:23: f4:b6:e9:6a:0f:6e:ff:b1:4b:87:d4:21:7e:89:bd:45: 6c:95:5a:4f:3c:10:28:9d:28:75:a8:ef:5e:e3:aa:90: 58:9d:d9:6d:88:b3:dc:ef:b3:68:09:f5:84:19:29:f2: 42:bf:c6:46:74:bd:20:90:69:08:b6:27:87:25:2c:4d: ee:7d:9e:1f:3b:28:47:9d:e1:36:a3:45:e0:ed:86:92: dd:08:4f:b7:b6:81:ff:d3:74:00:ed:eb:78:1a:04:ab: e3:ee:e0:b8:ff:d6:3b:07:b0:8a:4d:75:e9:c1:ae:31: 2c:8e:e4:6d:e1:24:b6:51:96:d8:f9:a2:8f:eb:c2:37: 7f:af:ed:52:d5:17:10:51:3a:8e:36:44:bc:ef:7c:ba: 89:fc:47:56:16:b8:3b:da:55:62:ed:77:d4:59:f6:83: f5:1c:69:6a:3f:b5:80:21:6f:fe:05:f2:d5:11:67:3c: 27:4e:f6:e5:c9:a5:64:4b:09:8b:21:2d:d1:bf:a3:c8: 3b:d6:8d:84:86:81:db:2f:f5:fb:42:95:db:c9:39:25: 9a:11:5c:70:6e:66:c9:07:64:18:8f:55:fd:d5:df:f4: 22:06:d8:a4:ae:88:2c:c9:38:b1:c2:3c:f8:2c:f8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:f6:fc:2a:e7:21:3c:76:ba:e6:e3:46:26:9f:99:e0: fe:8f:e7:3d:b8:7c:56:bd:73:7d:7a:96:41:28:ab:4f: 8f:80:77:d8:8d:dc:6a:16:59:f5:0b:cd:b9:c4:f8:68: 58:cb:b4:2c:56:b4:0a:0d:7e:24:69:8f:9f:77:af:91: a4:b1:d8:be:8d:8d:0d:ff:4b:5c:93:ef:a3:1c:54:fe: 6f:31:d0:d9:c3:9b:6f:7b:6c:c0:1c:3f:a3:90:a2:a3: 65:c5:43:78:ea:87:c3:b5:45:6f:40:89:dd:a1:3b:e5: e1:2f:aa:f2:b9:55:45:fa:9f:c3:a6:14:cd:a6:16:bd: 70:b4:84:3c:5e:80:5e:e7:bc:71:04:55:d5:31:6c:40: dc:59:01:51:86:93:9c:40:9a:9c:bc:d6:c7:0a:32:64: 77:f8:2d:f1:ba:7b:a2:bb:cf:95:79:64:88:33:c3:56: 68:1b:1c:52:d3:b3:1a:e1:1a:32:18:5d:0e:ec:37:b9: bd:8d:f6:33:5b:f5:1a:0d:2f:c6:ac:39:fa:b5:87:80: 3b:81:94:97:9c:5c:bc:4f:08:0a:fc:9a:fb:fa:08:92: 2c:cb:2b:70:26:46:b9:1e:bd:98:c2:d6:29:7e:4e:3a: 04:17:00:36:2a:ac:b8:2c:a7:55:09:6f:1e:15:6a:c2 Fingerprint (SHA-256): F7:B8:EF:F6:20:AD:59:8A:3D:3A:A3:B8:33:2F:E3:34:4F:D1:52:A0:6F:38:07:0C:07:7C:5F:A4:24:C0:FA:FF Fingerprint (SHA1): 72:A4:22:D4:13:49:C7:B5:E2:81:6A:13:1E:3D:E0:1E:83:09:06:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221240 (0x13163038) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:34 2023 Not After : Mon Mar 20 22:17:34 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:fd:1e:e8:52:be:41:1d:c8:45:1f:53:a7:3a:34:b8: 66:82:26:18:f0:26:6b:1e:34:58:01:28:74:28:66:03: 9d:2d:7b:b2:3e:9a:29:f7:ad:4b:da:38:10:11:3d:42: d6:c6:b4:ee:7a:3f:87:34:3d:bc:1f:dd:99:57:92:1a: 25:8f:de:9a:0b:36:44:f5:69:42:c6:27:43:d9:ed:21: 7e:49:7e:5d:6b:0b:af:69:7d:0f:5b:ed:92:d3:12:1a: db:9c:86:7a:14:85:bb:4c:32:1e:a5:f6:58:16:a4:3d: b8:d0:8b:52:5a:bc:f3:0a:1d:46:92:0f:74:23:39:d2: 59:74:f3:f0:2f:9a:a6:f7:2c:e4:8c:63:4e:bb:c3:a4: b9:8d:52:e3:70:7a:1c:e5:4a:b5:8c:fe:05:0b:d9:b8: f3:f9:e6:27:8b:62:a7:78:21:ec:25:6a:a6:cf:f4:0d: 85:aa:be:66:be:ec:9a:bf:45:3d:7d:c4:05:db:1a:86: 76:c1:b8:cf:e5:82:9f:19:23:3b:fd:23:2c:f2:1f:46: 34:9e:18:32:33:a9:a7:ed:ac:30:a8:8d:e1:01:e4:f8: 5d:f9:fb:5e:ad:06:8c:49:6e:78:06:f2:35:df:1e:b1: f2:dc:08:37:77:98:11:fa:6b:b7:15:e6:8d:f4:f7:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:18:20:b2:ad:87:26:4d:c1:db:79:53:13:70:ca:4b: 18:a9:f2:ed:33:83:00:66:15:8e:82:ce:11:4b:ef:9a: 78:90:0e:85:61:4a:bc:0b:b8:d4:1c:07:06:50:eb:e0: be:b4:b6:e2:c8:08:0f:c6:d9:3e:9e:d7:4a:28:4b:98: bf:33:03:b8:1e:dd:0b:cb:51:f4:ae:7e:87:63:76:80: d6:b2:1a:a5:fe:b6:d0:31:54:25:d3:88:3a:a2:a3:cd: c9:db:1b:6f:be:5e:78:6d:59:0c:d0:55:bf:fe:cd:d8: 27:c5:a3:f9:00:03:d6:3b:26:b4:2b:88:34:3f:0d:ad: 80:0b:bb:34:b5:9e:8a:73:fe:17:00:66:90:76:10:10: 04:35:73:70:f8:73:d5:37:56:f8:f3:78:c7:24:26:f4: 21:82:a4:ef:97:06:ca:b2:df:ff:20:e2:b5:b1:c8:84: 4a:ae:99:24:11:4b:99:8b:da:9e:e6:52:b7:81:80:3f: fb:b4:94:cd:0c:ba:3b:b9:a5:15:5d:24:bf:c2:22:34: 58:85:02:86:c7:15:ef:9e:e7:68:0d:8c:b5:cb:db:5e: 82:7f:a3:48:78:98:ab:4c:8e:a1:fe:0f:3a:c1:f1:9b: 6f:47:02:f6:12:e7:98:31:98:19:2c:d1:c5:86:1b:e0 Fingerprint (SHA-256): E0:FC:6E:B4:82:61:94:2B:A3:AD:98:2F:69:49:83:6E:BD:F8:F9:0A:87:35:F5:BE:20:88:5D:3B:29:72:57:1D Fingerprint (SHA1): 88:53:91:FC:19:70:10:31:5E:B8:DB:F9:0A:85:AA:B6:AD:98:93:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221241 (0x13163039) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:35 2023 Not After : Mon Mar 20 22:17:35 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:8d:ed:70:38:dc:72:b0:4d:c0:53:86:42:83:24:77: 9e:72:36:92:4d:fb:be:22:b1:10:6b:55:1c:49:c2:6a: 06:e2:cf:6a:36:2d:ff:a7:e3:3b:37:cb:49:3a:da:d2: fe:a4:84:f6:cb:c5:60:6b:4f:76:47:5a:ab:3d:c4:e3: c8:7d:fa:93:85:06:7c:fe:3e:27:35:d9:57:b0:e9:ce: c5:8e:8a:86:f0:4c:58:96:c6:21:e9:23:86:45:06:ec: c0:2a:6c:3c:6e:87:c3:58:f9:b0:6a:fe:93:d6:51:d7: 18:ec:51:be:6c:d5:d5:c5:d7:48:ac:c9:c5:c2:f0:cf: 94:8d:fe:a5:e6:f6:b1:cf:3d:78:0c:8d:a3:d8:4e:38: 71:c1:97:69:2b:40:fb:2e:bc:93:7d:51:e2:d8:11:8d: 3a:57:99:03:1d:ea:37:cc:e2:d4:20:23:81:77:01:59: e3:6c:6c:6d:d5:44:05:74:0e:1b:4b:9d:77:82:4c:fe: e4:b1:37:2d:11:b4:19:fb:18:95:18:0f:76:e1:01:5b: 90:03:5f:72:7a:a2:18:29:85:29:40:de:43:0c:71:0f: 62:a2:70:ec:f9:c6:fc:0f:0d:ff:a1:b7:a5:44:1d:b1: ad:1f:f1:62:92:c0:c8:09:45:7a:de:23:05:e2:c5:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:70:c4:31:51:00:0f:02:22:b2:ad:32:42:d6:e6:31: d6:c9:10:d5:29:dd:33:f5:1d:c6:9c:06:24:c9:0a:54: ce:2a:84:5f:46:3f:1f:d9:8a:d8:91:a3:b4:5a:47:f9: b2:b5:64:86:ec:bb:e8:61:e4:89:23:8e:04:35:cb:0c: 28:dd:fc:80:7d:ea:33:61:7b:4b:32:29:98:66:a8:b6: 5c:93:dc:c6:52:ea:45:27:e6:05:d5:f2:e1:78:a4:f4: 66:27:1d:51:90:bd:33:98:20:05:44:9f:d2:fc:7d:fe: 41:51:33:74:d5:30:02:c5:8b:10:f9:d2:19:e8:d7:ed: f0:38:88:1a:aa:38:ef:ab:67:9a:5c:6a:ce:18:67:79: 7a:30:1d:cc:cd:e4:34:53:1e:c9:4c:f2:aa:7d:e3:d7: 00:55:a9:2c:0f:a7:ef:81:74:1d:8e:b2:34:ec:43:cf: 66:8c:e4:fd:8f:cb:2d:0c:7c:52:16:cc:f6:97:0a:a2: c7:29:a2:ed:7b:5b:0a:1d:f8:48:38:d8:92:0c:c2:02: 8d:b4:e7:ac:a0:e1:3a:d1:da:6a:0c:95:5c:76:93:fe: 79:06:6a:22:be:3a:71:2e:b4:91:0b:cc:70:4e:34:3f: a1:fc:f7:6c:cb:b6:f7:0c:b2:6f:23:ec:7b:4f:07:d6 Fingerprint (SHA-256): AD:1B:06:CD:EB:CA:16:1E:A6:6F:D3:C7:33:4E:2D:06:48:C9:A1:A6:C6:A7:8B:91:81:E8:70:65:50:73:E0:1F Fingerprint (SHA1): 45:D9:82:68:00:83:5A:43:E1:CA:89:27:27:3E:1C:54:2D:68:D0:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221242 (0x1316303a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:17:37 2023 Not After : Mon Mar 20 22:17:37 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:a2:2a:56:fd:0e:bc:6e:d9:2a:b3:05:bf:c6:08:23: f4:b6:e9:6a:0f:6e:ff:b1:4b:87:d4:21:7e:89:bd:45: 6c:95:5a:4f:3c:10:28:9d:28:75:a8:ef:5e:e3:aa:90: 58:9d:d9:6d:88:b3:dc:ef:b3:68:09:f5:84:19:29:f2: 42:bf:c6:46:74:bd:20:90:69:08:b6:27:87:25:2c:4d: ee:7d:9e:1f:3b:28:47:9d:e1:36:a3:45:e0:ed:86:92: dd:08:4f:b7:b6:81:ff:d3:74:00:ed:eb:78:1a:04:ab: e3:ee:e0:b8:ff:d6:3b:07:b0:8a:4d:75:e9:c1:ae:31: 2c:8e:e4:6d:e1:24:b6:51:96:d8:f9:a2:8f:eb:c2:37: 7f:af:ed:52:d5:17:10:51:3a:8e:36:44:bc:ef:7c:ba: 89:fc:47:56:16:b8:3b:da:55:62:ed:77:d4:59:f6:83: f5:1c:69:6a:3f:b5:80:21:6f:fe:05:f2:d5:11:67:3c: 27:4e:f6:e5:c9:a5:64:4b:09:8b:21:2d:d1:bf:a3:c8: 3b:d6:8d:84:86:81:db:2f:f5:fb:42:95:db:c9:39:25: 9a:11:5c:70:6e:66:c9:07:64:18:8f:55:fd:d5:df:f4: 22:06:d8:a4:ae:88:2c:c9:38:b1:c2:3c:f8:2c:f8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:f6:fc:2a:e7:21:3c:76:ba:e6:e3:46:26:9f:99:e0: fe:8f:e7:3d:b8:7c:56:bd:73:7d:7a:96:41:28:ab:4f: 8f:80:77:d8:8d:dc:6a:16:59:f5:0b:cd:b9:c4:f8:68: 58:cb:b4:2c:56:b4:0a:0d:7e:24:69:8f:9f:77:af:91: a4:b1:d8:be:8d:8d:0d:ff:4b:5c:93:ef:a3:1c:54:fe: 6f:31:d0:d9:c3:9b:6f:7b:6c:c0:1c:3f:a3:90:a2:a3: 65:c5:43:78:ea:87:c3:b5:45:6f:40:89:dd:a1:3b:e5: e1:2f:aa:f2:b9:55:45:fa:9f:c3:a6:14:cd:a6:16:bd: 70:b4:84:3c:5e:80:5e:e7:bc:71:04:55:d5:31:6c:40: dc:59:01:51:86:93:9c:40:9a:9c:bc:d6:c7:0a:32:64: 77:f8:2d:f1:ba:7b:a2:bb:cf:95:79:64:88:33:c3:56: 68:1b:1c:52:d3:b3:1a:e1:1a:32:18:5d:0e:ec:37:b9: bd:8d:f6:33:5b:f5:1a:0d:2f:c6:ac:39:fa:b5:87:80: 3b:81:94:97:9c:5c:bc:4f:08:0a:fc:9a:fb:fa:08:92: 2c:cb:2b:70:26:46:b9:1e:bd:98:c2:d6:29:7e:4e:3a: 04:17:00:36:2a:ac:b8:2c:a7:55:09:6f:1e:15:6a:c2 Fingerprint (SHA-256): F7:B8:EF:F6:20:AD:59:8A:3D:3A:A3:B8:33:2F:E3:34:4F:D1:52:A0:6F:38:07:0C:07:7C:5F:A4:24:C0:FA:FF Fingerprint (SHA1): 72:A4:22:D4:13:49:C7:B5:E2:81:6A:13:1E:3D:E0:1E:83:09:06:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221244 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221245 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221246 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320221247 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320221248 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221244 (0x1316303c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:43 2023 Not After : Mon Mar 20 22:17:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7c:e0:13:a4:82:39:f3:e1:71:de:ed:5e:6b:ce:d6: 7c:b2:86:a3:77:73:bb:69:25:15:55:19:dd:a8:81:64: a7:72:ce:a6:1f:68:de:a0:65:76:70:aa:6c:2c:5c:a6: cf:7a:f8:ce:1b:5b:a6:62:e3:2f:f3:cd:e1:95:05:93: 2e:2d:56:f0:03:cb:e8:7b:39:58:c3:91:6f:c4:e8:2a: 57:6a:7f:cd:c6:60:40:d5:92:d8:7e:62:8e:a1:19:7e: ea:e6:97:df:16:53:87:44:93:c6:42:2a:54:75:a8:12: 7a:56:2e:ed:63:c0:46:e5:40:b1:82:20:e3:e1:8e:52: 5a:fa:2e:28:9a:0f:11:06:cb:1d:13:f7:08:9d:18:e8: 60:e8:f6:dc:dc:28:bf:3e:25:95:82:d4:97:e0:17:30: 87:48:64:a7:50:14:69:81:b2:c6:1f:c5:f7:4c:04:eb: 68:fa:13:6c:bc:8d:c8:04:b0:a6:03:6a:b2:ae:f7:51: da:43:ee:72:57:04:3e:b5:24:57:83:5d:93:bc:5d:22: 7f:f5:33:a4:a5:ed:ce:c0:fd:09:6c:be:49:f7:b8:87: 6d:57:52:96:86:42:6a:1a:39:4d:b7:b1:d2:cf:65:4a: f7:47:80:af:a9:76:45:7f:f2:f0:62:71:3e:27:e5:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:16:46:34:63:2c:b9:46:70:55:e6:c8:1b:26:49:af: 1a:0d:1b:3a:ce:34:13:88:bc:09:4f:5a:07:ea:19:8a: 19:e2:a9:61:52:2e:6d:c0:31:8e:8e:cd:60:c2:72:ae: e7:80:a9:2a:2f:f7:25:11:d2:bf:64:ee:c9:99:7c:bf: 76:1b:5e:09:65:f0:f9:01:e7:d4:88:18:b0:e9:54:be: d0:32:ab:e8:a2:4f:2a:fa:4b:05:9a:26:2a:55:a1:7c: 65:16:db:b2:ed:c1:ad:51:56:e0:24:76:96:4f:dc:da: be:cc:0d:8c:2e:e5:c4:60:8f:f1:e4:9f:bf:84:2b:b3: b7:a2:84:a2:c7:23:b9:52:45:19:93:49:86:3a:ab:ef: 4e:0b:aa:cf:5d:dd:bc:e3:99:ce:9c:0a:7f:60:25:d1: bd:dd:d0:c6:b9:19:e1:85:34:99:b1:92:3d:2a:9e:4f: 2d:63:f2:15:d5:ca:c7:e8:7f:02:b8:b4:4f:32:a0:d5: 65:02:0b:9a:4b:c7:6e:21:d4:f4:42:c3:59:d4:f4:24: ec:85:06:22:fd:52:93:be:d0:4b:d0:64:c3:8f:38:26: cf:8f:0a:5b:f4:af:c9:cc:39:90:aa:f7:3b:d2:5f:46: 61:03:43:b8:41:a5:64:55:45:1b:cc:50:a2:f4:2d:16 Fingerprint (SHA-256): EA:6F:AE:49:95:12:18:C9:45:38:24:B6:92:E2:B9:DC:41:BE:B7:E3:C2:A0:A9:2C:F9:51:B0:9C:BE:8A:93:3A Fingerprint (SHA1): 35:CC:80:E1:B6:28:44:14:6A:46:23:A0:70:DE:74:21:57:0F:45:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221245 (0x1316303d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:44 2023 Not After : Mon Mar 20 22:17:44 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ba:1f:e5:29:53:0e:66:ca:26:26:c8:2a:d7:f6:8b: e3:fd:f1:fc:99:b6:31:ca:30:49:ca:b9:d5:23:ef:76: dc:ac:33:a3:30:69:cb:f4:be:51:ed:9c:05:68:42:82: da:0b:1c:ab:b9:87:63:9e:21:a5:4e:9f:50:c6:96:cf: 39:c0:09:95:e7:2f:55:e7:33:38:9a:f5:c9:38:86:53: 9d:1f:4a:77:e7:32:c1:f6:54:17:bb:c2:9f:f8:b2:21: 37:94:f6:f5:9d:ba:f0:d1:6e:e9:8b:ec:26:88:f7:ad: f8:a8:3a:d1:8c:eb:b4:c9:0b:17:2e:3d:33:ef:fb:da: 14:32:a7:1f:3f:d8:dc:ce:7f:f4:7a:82:45:ec:6d:ea: 21:09:d5:09:e1:10:a0:c5:0b:5a:30:d1:6f:15:f0:72: 45:20:46:5f:ae:24:73:d1:3a:ba:bd:3a:04:8e:71:17: 81:ea:d8:a8:c2:8f:a7:32:7d:45:4f:54:31:d1:95:15: 5c:e5:09:42:27:2b:39:8f:bf:73:fd:56:27:6c:33:88: 0c:ac:fe:97:d9:40:93:fe:4d:6b:c1:5f:76:8a:80:7d: 8f:6b:0d:8b:a4:1c:df:f9:8d:1a:24:c4:9d:23:4c:80: 6b:61:43:33:36:dd:7e:ee:40:b4:cb:8d:ff:5e:7b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:78:19:d1:a6:cd:89:d8:c1:b5:42:fa:05:1f:12:29: 01:3c:a4:bd:67:dd:bb:d8:6e:54:9d:0f:fb:9b:94:91: a9:98:7d:66:75:ac:1b:e2:b2:35:5d:3b:9e:67:1d:e5: e7:3c:d6:9f:23:10:31:36:bb:0c:b3:34:79:31:c2:47: c1:0e:7d:37:5c:a7:5a:74:57:a1:5c:23:66:62:0f:00: 7c:df:5b:55:38:f5:b6:bd:8e:62:40:0a:cd:31:af:40: 5c:12:cd:0b:7e:a8:e2:1c:11:24:24:66:ee:e2:ba:b0: 72:20:0b:ea:b5:43:de:ed:83:9f:a4:26:52:58:89:9b: 90:ef:03:1d:4e:6b:f4:59:98:b0:d3:76:d2:aa:83:44: 41:af:89:aa:ce:a4:91:20:eb:d7:19:8c:8a:38:ac:d5: 7a:cd:62:60:47:37:60:e1:fe:af:cd:43:e2:b7:d4:69: b6:4a:cb:b6:3f:eb:79:0c:83:bd:b4:2e:00:8f:3d:e1: ce:3d:7d:a4:a4:17:97:78:3a:85:50:eb:fa:e7:6a:a9: 04:ed:79:b0:ea:84:4d:97:ca:23:8c:fa:23:72:6f:34: 31:87:71:4a:4e:ee:73:bb:78:a2:a3:8a:80:4e:ed:97: 2f:af:c3:cd:b9:dc:d6:5a:01:16:eb:68:97:06:1d:c4 Fingerprint (SHA-256): 20:A1:1B:A1:24:DA:41:5B:0C:76:CA:F6:35:FE:27:A8:0E:94:D9:D1:22:2D:EC:D1:2C:7A:8D:7E:6D:88:98:9A Fingerprint (SHA1): FD:23:29:0B:C3:A6:DE:84:87:A0:E2:C5:BB:C9:18:00:E4:FD:41:E8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221246 (0x1316303e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:17:46 2023 Not After : Mon Mar 20 22:17:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:90:a9:ce:fe:35:5d:b4:2d:a9:7f:24:4f:02:1b:2f: ab:7a:28:12:53:06:84:a9:4f:80:e2:71:2c:80:cb:b9: 24:1a:61:97:28:29:dd:b3:d9:20:7d:4e:1f:e2:48:21: 1a:48:e6:e2:ac:18:44:75:ab:fc:a9:5b:73:4b:ee:32: 32:67:8d:4e:e9:ed:0b:13:a8:bc:98:4f:63:4c:a9:99: f7:f7:0e:6b:3c:3d:9e:b4:21:6b:c7:74:c8:ca:cc:68: 65:00:5f:37:65:75:99:95:30:85:46:c2:93:2d:9d:f3: 21:6d:9a:a5:3b:fe:cf:03:48:30:d4:c1:96:4e:8e:ba: 57:82:65:74:77:c5:fb:d1:25:d7:bb:74:15:98:35:4d: a9:0c:5d:42:7f:c3:34:9d:95:4d:93:be:d1:2f:02:44: 73:a8:86:66:40:b1:af:9f:17:58:5d:42:b9:64:2e:44: 98:b7:64:4c:a4:a0:47:55:68:8f:35:b3:fc:3e:1f:dc: 57:56:38:fb:78:9a:43:a0:7f:15:a1:5c:79:26:0b:50: 71:ce:ee:da:f6:7c:6a:8a:3f:86:d9:b8:f9:82:72:d0: 0d:b0:c3:a3:b3:83:1b:41:17:67:ee:93:c1:29:4d:4f: 63:0d:71:6b:32:c2:5e:40:60:32:6b:f0:6d:1b:a9:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:89:91:53:da:82:5f:bc:5c:47:ff:2c:5a:ab:16:f1: f0:30:b1:73:8c:4d:09:04:aa:35:d8:7a:38:f1:62:b3: 47:c6:20:94:d8:69:70:99:b5:d9:44:dd:3d:9b:f8:50: ef:ef:1f:04:c3:41:d0:18:69:f3:22:a2:55:c3:d9:e8: e2:c8:4d:62:5c:97:b4:54:21:2a:a8:8f:df:05:05:61: 37:03:9c:50:f0:fa:91:c2:e9:f8:24:5a:3f:ef:b0:ac: 6f:08:d4:7e:19:9e:e4:ba:81:a2:64:50:c9:c7:a1:68: eb:4e:34:4e:d0:c5:0f:6e:9d:31:16:99:d0:96:91:ed: e1:59:54:3d:30:46:1f:c5:e8:4c:5d:0d:8b:06:24:12: 64:46:30:20:67:65:89:65:7f:d7:9a:88:71:6a:41:9e: 92:30:16:0b:13:1c:37:80:90:4d:0b:13:17:45:96:58: 2b:15:76:44:f0:82:eb:43:1d:5a:5c:88:a6:29:d6:cb: b3:7b:7e:50:f7:8c:6e:3e:03:b3:d9:64:3a:f8:0a:1a: 57:65:6e:54:89:f3:b4:90:50:e5:35:e2:1b:fe:b0:43: 62:c3:02:7b:27:cf:8c:a9:b8:98:02:6f:26:ad:96:90: 84:8b:fb:d8:d7:aa:b2:65:06:8d:f3:d1:1d:53:3a:01 Fingerprint (SHA-256): 22:1C:7B:EA:2F:85:84:05:53:B7:89:B9:FE:92:8A:F1:82:7D:27:A5:0D:FA:F5:0C:57:27:FF:66:16:A0:E5:51 Fingerprint (SHA1): 0F:89:74:2A:08:2A:4F:06:14:62:1E:FE:82:27:2E:22:63:AC:00:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221244 (0x1316303c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:43 2023 Not After : Mon Mar 20 22:17:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7c:e0:13:a4:82:39:f3:e1:71:de:ed:5e:6b:ce:d6: 7c:b2:86:a3:77:73:bb:69:25:15:55:19:dd:a8:81:64: a7:72:ce:a6:1f:68:de:a0:65:76:70:aa:6c:2c:5c:a6: cf:7a:f8:ce:1b:5b:a6:62:e3:2f:f3:cd:e1:95:05:93: 2e:2d:56:f0:03:cb:e8:7b:39:58:c3:91:6f:c4:e8:2a: 57:6a:7f:cd:c6:60:40:d5:92:d8:7e:62:8e:a1:19:7e: ea:e6:97:df:16:53:87:44:93:c6:42:2a:54:75:a8:12: 7a:56:2e:ed:63:c0:46:e5:40:b1:82:20:e3:e1:8e:52: 5a:fa:2e:28:9a:0f:11:06:cb:1d:13:f7:08:9d:18:e8: 60:e8:f6:dc:dc:28:bf:3e:25:95:82:d4:97:e0:17:30: 87:48:64:a7:50:14:69:81:b2:c6:1f:c5:f7:4c:04:eb: 68:fa:13:6c:bc:8d:c8:04:b0:a6:03:6a:b2:ae:f7:51: da:43:ee:72:57:04:3e:b5:24:57:83:5d:93:bc:5d:22: 7f:f5:33:a4:a5:ed:ce:c0:fd:09:6c:be:49:f7:b8:87: 6d:57:52:96:86:42:6a:1a:39:4d:b7:b1:d2:cf:65:4a: f7:47:80:af:a9:76:45:7f:f2:f0:62:71:3e:27:e5:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:16:46:34:63:2c:b9:46:70:55:e6:c8:1b:26:49:af: 1a:0d:1b:3a:ce:34:13:88:bc:09:4f:5a:07:ea:19:8a: 19:e2:a9:61:52:2e:6d:c0:31:8e:8e:cd:60:c2:72:ae: e7:80:a9:2a:2f:f7:25:11:d2:bf:64:ee:c9:99:7c:bf: 76:1b:5e:09:65:f0:f9:01:e7:d4:88:18:b0:e9:54:be: d0:32:ab:e8:a2:4f:2a:fa:4b:05:9a:26:2a:55:a1:7c: 65:16:db:b2:ed:c1:ad:51:56:e0:24:76:96:4f:dc:da: be:cc:0d:8c:2e:e5:c4:60:8f:f1:e4:9f:bf:84:2b:b3: b7:a2:84:a2:c7:23:b9:52:45:19:93:49:86:3a:ab:ef: 4e:0b:aa:cf:5d:dd:bc:e3:99:ce:9c:0a:7f:60:25:d1: bd:dd:d0:c6:b9:19:e1:85:34:99:b1:92:3d:2a:9e:4f: 2d:63:f2:15:d5:ca:c7:e8:7f:02:b8:b4:4f:32:a0:d5: 65:02:0b:9a:4b:c7:6e:21:d4:f4:42:c3:59:d4:f4:24: ec:85:06:22:fd:52:93:be:d0:4b:d0:64:c3:8f:38:26: cf:8f:0a:5b:f4:af:c9:cc:39:90:aa:f7:3b:d2:5f:46: 61:03:43:b8:41:a5:64:55:45:1b:cc:50:a2:f4:2d:16 Fingerprint (SHA-256): EA:6F:AE:49:95:12:18:C9:45:38:24:B6:92:E2:B9:DC:41:BE:B7:E3:C2:A0:A9:2C:F9:51:B0:9C:BE:8A:93:3A Fingerprint (SHA1): 35:CC:80:E1:B6:28:44:14:6A:46:23:A0:70:DE:74:21:57:0F:45:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221245 (0x1316303d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:44 2023 Not After : Mon Mar 20 22:17:44 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ba:1f:e5:29:53:0e:66:ca:26:26:c8:2a:d7:f6:8b: e3:fd:f1:fc:99:b6:31:ca:30:49:ca:b9:d5:23:ef:76: dc:ac:33:a3:30:69:cb:f4:be:51:ed:9c:05:68:42:82: da:0b:1c:ab:b9:87:63:9e:21:a5:4e:9f:50:c6:96:cf: 39:c0:09:95:e7:2f:55:e7:33:38:9a:f5:c9:38:86:53: 9d:1f:4a:77:e7:32:c1:f6:54:17:bb:c2:9f:f8:b2:21: 37:94:f6:f5:9d:ba:f0:d1:6e:e9:8b:ec:26:88:f7:ad: f8:a8:3a:d1:8c:eb:b4:c9:0b:17:2e:3d:33:ef:fb:da: 14:32:a7:1f:3f:d8:dc:ce:7f:f4:7a:82:45:ec:6d:ea: 21:09:d5:09:e1:10:a0:c5:0b:5a:30:d1:6f:15:f0:72: 45:20:46:5f:ae:24:73:d1:3a:ba:bd:3a:04:8e:71:17: 81:ea:d8:a8:c2:8f:a7:32:7d:45:4f:54:31:d1:95:15: 5c:e5:09:42:27:2b:39:8f:bf:73:fd:56:27:6c:33:88: 0c:ac:fe:97:d9:40:93:fe:4d:6b:c1:5f:76:8a:80:7d: 8f:6b:0d:8b:a4:1c:df:f9:8d:1a:24:c4:9d:23:4c:80: 6b:61:43:33:36:dd:7e:ee:40:b4:cb:8d:ff:5e:7b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:78:19:d1:a6:cd:89:d8:c1:b5:42:fa:05:1f:12:29: 01:3c:a4:bd:67:dd:bb:d8:6e:54:9d:0f:fb:9b:94:91: a9:98:7d:66:75:ac:1b:e2:b2:35:5d:3b:9e:67:1d:e5: e7:3c:d6:9f:23:10:31:36:bb:0c:b3:34:79:31:c2:47: c1:0e:7d:37:5c:a7:5a:74:57:a1:5c:23:66:62:0f:00: 7c:df:5b:55:38:f5:b6:bd:8e:62:40:0a:cd:31:af:40: 5c:12:cd:0b:7e:a8:e2:1c:11:24:24:66:ee:e2:ba:b0: 72:20:0b:ea:b5:43:de:ed:83:9f:a4:26:52:58:89:9b: 90:ef:03:1d:4e:6b:f4:59:98:b0:d3:76:d2:aa:83:44: 41:af:89:aa:ce:a4:91:20:eb:d7:19:8c:8a:38:ac:d5: 7a:cd:62:60:47:37:60:e1:fe:af:cd:43:e2:b7:d4:69: b6:4a:cb:b6:3f:eb:79:0c:83:bd:b4:2e:00:8f:3d:e1: ce:3d:7d:a4:a4:17:97:78:3a:85:50:eb:fa:e7:6a:a9: 04:ed:79:b0:ea:84:4d:97:ca:23:8c:fa:23:72:6f:34: 31:87:71:4a:4e:ee:73:bb:78:a2:a3:8a:80:4e:ed:97: 2f:af:c3:cd:b9:dc:d6:5a:01:16:eb:68:97:06:1d:c4 Fingerprint (SHA-256): 20:A1:1B:A1:24:DA:41:5B:0C:76:CA:F6:35:FE:27:A8:0E:94:D9:D1:22:2D:EC:D1:2C:7A:8D:7E:6D:88:98:9A Fingerprint (SHA1): FD:23:29:0B:C3:A6:DE:84:87:A0:E2:C5:BB:C9:18:00:E4:FD:41:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221246 (0x1316303e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:17:46 2023 Not After : Mon Mar 20 22:17:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:90:a9:ce:fe:35:5d:b4:2d:a9:7f:24:4f:02:1b:2f: ab:7a:28:12:53:06:84:a9:4f:80:e2:71:2c:80:cb:b9: 24:1a:61:97:28:29:dd:b3:d9:20:7d:4e:1f:e2:48:21: 1a:48:e6:e2:ac:18:44:75:ab:fc:a9:5b:73:4b:ee:32: 32:67:8d:4e:e9:ed:0b:13:a8:bc:98:4f:63:4c:a9:99: f7:f7:0e:6b:3c:3d:9e:b4:21:6b:c7:74:c8:ca:cc:68: 65:00:5f:37:65:75:99:95:30:85:46:c2:93:2d:9d:f3: 21:6d:9a:a5:3b:fe:cf:03:48:30:d4:c1:96:4e:8e:ba: 57:82:65:74:77:c5:fb:d1:25:d7:bb:74:15:98:35:4d: a9:0c:5d:42:7f:c3:34:9d:95:4d:93:be:d1:2f:02:44: 73:a8:86:66:40:b1:af:9f:17:58:5d:42:b9:64:2e:44: 98:b7:64:4c:a4:a0:47:55:68:8f:35:b3:fc:3e:1f:dc: 57:56:38:fb:78:9a:43:a0:7f:15:a1:5c:79:26:0b:50: 71:ce:ee:da:f6:7c:6a:8a:3f:86:d9:b8:f9:82:72:d0: 0d:b0:c3:a3:b3:83:1b:41:17:67:ee:93:c1:29:4d:4f: 63:0d:71:6b:32:c2:5e:40:60:32:6b:f0:6d:1b:a9:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:89:91:53:da:82:5f:bc:5c:47:ff:2c:5a:ab:16:f1: f0:30:b1:73:8c:4d:09:04:aa:35:d8:7a:38:f1:62:b3: 47:c6:20:94:d8:69:70:99:b5:d9:44:dd:3d:9b:f8:50: ef:ef:1f:04:c3:41:d0:18:69:f3:22:a2:55:c3:d9:e8: e2:c8:4d:62:5c:97:b4:54:21:2a:a8:8f:df:05:05:61: 37:03:9c:50:f0:fa:91:c2:e9:f8:24:5a:3f:ef:b0:ac: 6f:08:d4:7e:19:9e:e4:ba:81:a2:64:50:c9:c7:a1:68: eb:4e:34:4e:d0:c5:0f:6e:9d:31:16:99:d0:96:91:ed: e1:59:54:3d:30:46:1f:c5:e8:4c:5d:0d:8b:06:24:12: 64:46:30:20:67:65:89:65:7f:d7:9a:88:71:6a:41:9e: 92:30:16:0b:13:1c:37:80:90:4d:0b:13:17:45:96:58: 2b:15:76:44:f0:82:eb:43:1d:5a:5c:88:a6:29:d6:cb: b3:7b:7e:50:f7:8c:6e:3e:03:b3:d9:64:3a:f8:0a:1a: 57:65:6e:54:89:f3:b4:90:50:e5:35:e2:1b:fe:b0:43: 62:c3:02:7b:27:cf:8c:a9:b8:98:02:6f:26:ad:96:90: 84:8b:fb:d8:d7:aa:b2:65:06:8d:f3:d1:1d:53:3a:01 Fingerprint (SHA-256): 22:1C:7B:EA:2F:85:84:05:53:B7:89:B9:FE:92:8A:F1:82:7D:27:A5:0D:FA:F5:0C:57:27:FF:66:16:A0:E5:51 Fingerprint (SHA1): 0F:89:74:2A:08:2A:4F:06:14:62:1E:FE:82:27:2E:22:63:AC:00:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221244 (0x1316303c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:43 2023 Not After : Mon Mar 20 22:17:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7c:e0:13:a4:82:39:f3:e1:71:de:ed:5e:6b:ce:d6: 7c:b2:86:a3:77:73:bb:69:25:15:55:19:dd:a8:81:64: a7:72:ce:a6:1f:68:de:a0:65:76:70:aa:6c:2c:5c:a6: cf:7a:f8:ce:1b:5b:a6:62:e3:2f:f3:cd:e1:95:05:93: 2e:2d:56:f0:03:cb:e8:7b:39:58:c3:91:6f:c4:e8:2a: 57:6a:7f:cd:c6:60:40:d5:92:d8:7e:62:8e:a1:19:7e: ea:e6:97:df:16:53:87:44:93:c6:42:2a:54:75:a8:12: 7a:56:2e:ed:63:c0:46:e5:40:b1:82:20:e3:e1:8e:52: 5a:fa:2e:28:9a:0f:11:06:cb:1d:13:f7:08:9d:18:e8: 60:e8:f6:dc:dc:28:bf:3e:25:95:82:d4:97:e0:17:30: 87:48:64:a7:50:14:69:81:b2:c6:1f:c5:f7:4c:04:eb: 68:fa:13:6c:bc:8d:c8:04:b0:a6:03:6a:b2:ae:f7:51: da:43:ee:72:57:04:3e:b5:24:57:83:5d:93:bc:5d:22: 7f:f5:33:a4:a5:ed:ce:c0:fd:09:6c:be:49:f7:b8:87: 6d:57:52:96:86:42:6a:1a:39:4d:b7:b1:d2:cf:65:4a: f7:47:80:af:a9:76:45:7f:f2:f0:62:71:3e:27:e5:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:16:46:34:63:2c:b9:46:70:55:e6:c8:1b:26:49:af: 1a:0d:1b:3a:ce:34:13:88:bc:09:4f:5a:07:ea:19:8a: 19:e2:a9:61:52:2e:6d:c0:31:8e:8e:cd:60:c2:72:ae: e7:80:a9:2a:2f:f7:25:11:d2:bf:64:ee:c9:99:7c:bf: 76:1b:5e:09:65:f0:f9:01:e7:d4:88:18:b0:e9:54:be: d0:32:ab:e8:a2:4f:2a:fa:4b:05:9a:26:2a:55:a1:7c: 65:16:db:b2:ed:c1:ad:51:56:e0:24:76:96:4f:dc:da: be:cc:0d:8c:2e:e5:c4:60:8f:f1:e4:9f:bf:84:2b:b3: b7:a2:84:a2:c7:23:b9:52:45:19:93:49:86:3a:ab:ef: 4e:0b:aa:cf:5d:dd:bc:e3:99:ce:9c:0a:7f:60:25:d1: bd:dd:d0:c6:b9:19:e1:85:34:99:b1:92:3d:2a:9e:4f: 2d:63:f2:15:d5:ca:c7:e8:7f:02:b8:b4:4f:32:a0:d5: 65:02:0b:9a:4b:c7:6e:21:d4:f4:42:c3:59:d4:f4:24: ec:85:06:22:fd:52:93:be:d0:4b:d0:64:c3:8f:38:26: cf:8f:0a:5b:f4:af:c9:cc:39:90:aa:f7:3b:d2:5f:46: 61:03:43:b8:41:a5:64:55:45:1b:cc:50:a2:f4:2d:16 Fingerprint (SHA-256): EA:6F:AE:49:95:12:18:C9:45:38:24:B6:92:E2:B9:DC:41:BE:B7:E3:C2:A0:A9:2C:F9:51:B0:9C:BE:8A:93:3A Fingerprint (SHA1): 35:CC:80:E1:B6:28:44:14:6A:46:23:A0:70:DE:74:21:57:0F:45:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221244 (0x1316303c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:43 2023 Not After : Mon Mar 20 22:17:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7c:e0:13:a4:82:39:f3:e1:71:de:ed:5e:6b:ce:d6: 7c:b2:86:a3:77:73:bb:69:25:15:55:19:dd:a8:81:64: a7:72:ce:a6:1f:68:de:a0:65:76:70:aa:6c:2c:5c:a6: cf:7a:f8:ce:1b:5b:a6:62:e3:2f:f3:cd:e1:95:05:93: 2e:2d:56:f0:03:cb:e8:7b:39:58:c3:91:6f:c4:e8:2a: 57:6a:7f:cd:c6:60:40:d5:92:d8:7e:62:8e:a1:19:7e: ea:e6:97:df:16:53:87:44:93:c6:42:2a:54:75:a8:12: 7a:56:2e:ed:63:c0:46:e5:40:b1:82:20:e3:e1:8e:52: 5a:fa:2e:28:9a:0f:11:06:cb:1d:13:f7:08:9d:18:e8: 60:e8:f6:dc:dc:28:bf:3e:25:95:82:d4:97:e0:17:30: 87:48:64:a7:50:14:69:81:b2:c6:1f:c5:f7:4c:04:eb: 68:fa:13:6c:bc:8d:c8:04:b0:a6:03:6a:b2:ae:f7:51: da:43:ee:72:57:04:3e:b5:24:57:83:5d:93:bc:5d:22: 7f:f5:33:a4:a5:ed:ce:c0:fd:09:6c:be:49:f7:b8:87: 6d:57:52:96:86:42:6a:1a:39:4d:b7:b1:d2:cf:65:4a: f7:47:80:af:a9:76:45:7f:f2:f0:62:71:3e:27:e5:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:16:46:34:63:2c:b9:46:70:55:e6:c8:1b:26:49:af: 1a:0d:1b:3a:ce:34:13:88:bc:09:4f:5a:07:ea:19:8a: 19:e2:a9:61:52:2e:6d:c0:31:8e:8e:cd:60:c2:72:ae: e7:80:a9:2a:2f:f7:25:11:d2:bf:64:ee:c9:99:7c:bf: 76:1b:5e:09:65:f0:f9:01:e7:d4:88:18:b0:e9:54:be: d0:32:ab:e8:a2:4f:2a:fa:4b:05:9a:26:2a:55:a1:7c: 65:16:db:b2:ed:c1:ad:51:56:e0:24:76:96:4f:dc:da: be:cc:0d:8c:2e:e5:c4:60:8f:f1:e4:9f:bf:84:2b:b3: b7:a2:84:a2:c7:23:b9:52:45:19:93:49:86:3a:ab:ef: 4e:0b:aa:cf:5d:dd:bc:e3:99:ce:9c:0a:7f:60:25:d1: bd:dd:d0:c6:b9:19:e1:85:34:99:b1:92:3d:2a:9e:4f: 2d:63:f2:15:d5:ca:c7:e8:7f:02:b8:b4:4f:32:a0:d5: 65:02:0b:9a:4b:c7:6e:21:d4:f4:42:c3:59:d4:f4:24: ec:85:06:22:fd:52:93:be:d0:4b:d0:64:c3:8f:38:26: cf:8f:0a:5b:f4:af:c9:cc:39:90:aa:f7:3b:d2:5f:46: 61:03:43:b8:41:a5:64:55:45:1b:cc:50:a2:f4:2d:16 Fingerprint (SHA-256): EA:6F:AE:49:95:12:18:C9:45:38:24:B6:92:E2:B9:DC:41:BE:B7:E3:C2:A0:A9:2C:F9:51:B0:9C:BE:8A:93:3A Fingerprint (SHA1): 35:CC:80:E1:B6:28:44:14:6A:46:23:A0:70:DE:74:21:57:0F:45:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221245 (0x1316303d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:44 2023 Not After : Mon Mar 20 22:17:44 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ba:1f:e5:29:53:0e:66:ca:26:26:c8:2a:d7:f6:8b: e3:fd:f1:fc:99:b6:31:ca:30:49:ca:b9:d5:23:ef:76: dc:ac:33:a3:30:69:cb:f4:be:51:ed:9c:05:68:42:82: da:0b:1c:ab:b9:87:63:9e:21:a5:4e:9f:50:c6:96:cf: 39:c0:09:95:e7:2f:55:e7:33:38:9a:f5:c9:38:86:53: 9d:1f:4a:77:e7:32:c1:f6:54:17:bb:c2:9f:f8:b2:21: 37:94:f6:f5:9d:ba:f0:d1:6e:e9:8b:ec:26:88:f7:ad: f8:a8:3a:d1:8c:eb:b4:c9:0b:17:2e:3d:33:ef:fb:da: 14:32:a7:1f:3f:d8:dc:ce:7f:f4:7a:82:45:ec:6d:ea: 21:09:d5:09:e1:10:a0:c5:0b:5a:30:d1:6f:15:f0:72: 45:20:46:5f:ae:24:73:d1:3a:ba:bd:3a:04:8e:71:17: 81:ea:d8:a8:c2:8f:a7:32:7d:45:4f:54:31:d1:95:15: 5c:e5:09:42:27:2b:39:8f:bf:73:fd:56:27:6c:33:88: 0c:ac:fe:97:d9:40:93:fe:4d:6b:c1:5f:76:8a:80:7d: 8f:6b:0d:8b:a4:1c:df:f9:8d:1a:24:c4:9d:23:4c:80: 6b:61:43:33:36:dd:7e:ee:40:b4:cb:8d:ff:5e:7b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:78:19:d1:a6:cd:89:d8:c1:b5:42:fa:05:1f:12:29: 01:3c:a4:bd:67:dd:bb:d8:6e:54:9d:0f:fb:9b:94:91: a9:98:7d:66:75:ac:1b:e2:b2:35:5d:3b:9e:67:1d:e5: e7:3c:d6:9f:23:10:31:36:bb:0c:b3:34:79:31:c2:47: c1:0e:7d:37:5c:a7:5a:74:57:a1:5c:23:66:62:0f:00: 7c:df:5b:55:38:f5:b6:bd:8e:62:40:0a:cd:31:af:40: 5c:12:cd:0b:7e:a8:e2:1c:11:24:24:66:ee:e2:ba:b0: 72:20:0b:ea:b5:43:de:ed:83:9f:a4:26:52:58:89:9b: 90:ef:03:1d:4e:6b:f4:59:98:b0:d3:76:d2:aa:83:44: 41:af:89:aa:ce:a4:91:20:eb:d7:19:8c:8a:38:ac:d5: 7a:cd:62:60:47:37:60:e1:fe:af:cd:43:e2:b7:d4:69: b6:4a:cb:b6:3f:eb:79:0c:83:bd:b4:2e:00:8f:3d:e1: ce:3d:7d:a4:a4:17:97:78:3a:85:50:eb:fa:e7:6a:a9: 04:ed:79:b0:ea:84:4d:97:ca:23:8c:fa:23:72:6f:34: 31:87:71:4a:4e:ee:73:bb:78:a2:a3:8a:80:4e:ed:97: 2f:af:c3:cd:b9:dc:d6:5a:01:16:eb:68:97:06:1d:c4 Fingerprint (SHA-256): 20:A1:1B:A1:24:DA:41:5B:0C:76:CA:F6:35:FE:27:A8:0E:94:D9:D1:22:2D:EC:D1:2C:7A:8D:7E:6D:88:98:9A Fingerprint (SHA1): FD:23:29:0B:C3:A6:DE:84:87:A0:E2:C5:BB:C9:18:00:E4:FD:41:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221245 (0x1316303d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:17:44 2023 Not After : Mon Mar 20 22:17:44 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ba:1f:e5:29:53:0e:66:ca:26:26:c8:2a:d7:f6:8b: e3:fd:f1:fc:99:b6:31:ca:30:49:ca:b9:d5:23:ef:76: dc:ac:33:a3:30:69:cb:f4:be:51:ed:9c:05:68:42:82: da:0b:1c:ab:b9:87:63:9e:21:a5:4e:9f:50:c6:96:cf: 39:c0:09:95:e7:2f:55:e7:33:38:9a:f5:c9:38:86:53: 9d:1f:4a:77:e7:32:c1:f6:54:17:bb:c2:9f:f8:b2:21: 37:94:f6:f5:9d:ba:f0:d1:6e:e9:8b:ec:26:88:f7:ad: f8:a8:3a:d1:8c:eb:b4:c9:0b:17:2e:3d:33:ef:fb:da: 14:32:a7:1f:3f:d8:dc:ce:7f:f4:7a:82:45:ec:6d:ea: 21:09:d5:09:e1:10:a0:c5:0b:5a:30:d1:6f:15:f0:72: 45:20:46:5f:ae:24:73:d1:3a:ba:bd:3a:04:8e:71:17: 81:ea:d8:a8:c2:8f:a7:32:7d:45:4f:54:31:d1:95:15: 5c:e5:09:42:27:2b:39:8f:bf:73:fd:56:27:6c:33:88: 0c:ac:fe:97:d9:40:93:fe:4d:6b:c1:5f:76:8a:80:7d: 8f:6b:0d:8b:a4:1c:df:f9:8d:1a:24:c4:9d:23:4c:80: 6b:61:43:33:36:dd:7e:ee:40:b4:cb:8d:ff:5e:7b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:78:19:d1:a6:cd:89:d8:c1:b5:42:fa:05:1f:12:29: 01:3c:a4:bd:67:dd:bb:d8:6e:54:9d:0f:fb:9b:94:91: a9:98:7d:66:75:ac:1b:e2:b2:35:5d:3b:9e:67:1d:e5: e7:3c:d6:9f:23:10:31:36:bb:0c:b3:34:79:31:c2:47: c1:0e:7d:37:5c:a7:5a:74:57:a1:5c:23:66:62:0f:00: 7c:df:5b:55:38:f5:b6:bd:8e:62:40:0a:cd:31:af:40: 5c:12:cd:0b:7e:a8:e2:1c:11:24:24:66:ee:e2:ba:b0: 72:20:0b:ea:b5:43:de:ed:83:9f:a4:26:52:58:89:9b: 90:ef:03:1d:4e:6b:f4:59:98:b0:d3:76:d2:aa:83:44: 41:af:89:aa:ce:a4:91:20:eb:d7:19:8c:8a:38:ac:d5: 7a:cd:62:60:47:37:60:e1:fe:af:cd:43:e2:b7:d4:69: b6:4a:cb:b6:3f:eb:79:0c:83:bd:b4:2e:00:8f:3d:e1: ce:3d:7d:a4:a4:17:97:78:3a:85:50:eb:fa:e7:6a:a9: 04:ed:79:b0:ea:84:4d:97:ca:23:8c:fa:23:72:6f:34: 31:87:71:4a:4e:ee:73:bb:78:a2:a3:8a:80:4e:ed:97: 2f:af:c3:cd:b9:dc:d6:5a:01:16:eb:68:97:06:1d:c4 Fingerprint (SHA-256): 20:A1:1B:A1:24:DA:41:5B:0C:76:CA:F6:35:FE:27:A8:0E:94:D9:D1:22:2D:EC:D1:2C:7A:8D:7E:6D:88:98:9A Fingerprint (SHA1): FD:23:29:0B:C3:A6:DE:84:87:A0:E2:C5:BB:C9:18:00:E4:FD:41:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221246 (0x1316303e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:17:46 2023 Not After : Mon Mar 20 22:17:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:90:a9:ce:fe:35:5d:b4:2d:a9:7f:24:4f:02:1b:2f: ab:7a:28:12:53:06:84:a9:4f:80:e2:71:2c:80:cb:b9: 24:1a:61:97:28:29:dd:b3:d9:20:7d:4e:1f:e2:48:21: 1a:48:e6:e2:ac:18:44:75:ab:fc:a9:5b:73:4b:ee:32: 32:67:8d:4e:e9:ed:0b:13:a8:bc:98:4f:63:4c:a9:99: f7:f7:0e:6b:3c:3d:9e:b4:21:6b:c7:74:c8:ca:cc:68: 65:00:5f:37:65:75:99:95:30:85:46:c2:93:2d:9d:f3: 21:6d:9a:a5:3b:fe:cf:03:48:30:d4:c1:96:4e:8e:ba: 57:82:65:74:77:c5:fb:d1:25:d7:bb:74:15:98:35:4d: a9:0c:5d:42:7f:c3:34:9d:95:4d:93:be:d1:2f:02:44: 73:a8:86:66:40:b1:af:9f:17:58:5d:42:b9:64:2e:44: 98:b7:64:4c:a4:a0:47:55:68:8f:35:b3:fc:3e:1f:dc: 57:56:38:fb:78:9a:43:a0:7f:15:a1:5c:79:26:0b:50: 71:ce:ee:da:f6:7c:6a:8a:3f:86:d9:b8:f9:82:72:d0: 0d:b0:c3:a3:b3:83:1b:41:17:67:ee:93:c1:29:4d:4f: 63:0d:71:6b:32:c2:5e:40:60:32:6b:f0:6d:1b:a9:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:89:91:53:da:82:5f:bc:5c:47:ff:2c:5a:ab:16:f1: f0:30:b1:73:8c:4d:09:04:aa:35:d8:7a:38:f1:62:b3: 47:c6:20:94:d8:69:70:99:b5:d9:44:dd:3d:9b:f8:50: ef:ef:1f:04:c3:41:d0:18:69:f3:22:a2:55:c3:d9:e8: e2:c8:4d:62:5c:97:b4:54:21:2a:a8:8f:df:05:05:61: 37:03:9c:50:f0:fa:91:c2:e9:f8:24:5a:3f:ef:b0:ac: 6f:08:d4:7e:19:9e:e4:ba:81:a2:64:50:c9:c7:a1:68: eb:4e:34:4e:d0:c5:0f:6e:9d:31:16:99:d0:96:91:ed: e1:59:54:3d:30:46:1f:c5:e8:4c:5d:0d:8b:06:24:12: 64:46:30:20:67:65:89:65:7f:d7:9a:88:71:6a:41:9e: 92:30:16:0b:13:1c:37:80:90:4d:0b:13:17:45:96:58: 2b:15:76:44:f0:82:eb:43:1d:5a:5c:88:a6:29:d6:cb: b3:7b:7e:50:f7:8c:6e:3e:03:b3:d9:64:3a:f8:0a:1a: 57:65:6e:54:89:f3:b4:90:50:e5:35:e2:1b:fe:b0:43: 62:c3:02:7b:27:cf:8c:a9:b8:98:02:6f:26:ad:96:90: 84:8b:fb:d8:d7:aa:b2:65:06:8d:f3:d1:1d:53:3a:01 Fingerprint (SHA-256): 22:1C:7B:EA:2F:85:84:05:53:B7:89:B9:FE:92:8A:F1:82:7D:27:A5:0D:FA:F5:0C:57:27:FF:66:16:A0:E5:51 Fingerprint (SHA1): 0F:89:74:2A:08:2A:4F:06:14:62:1E:FE:82:27:2E:22:63:AC:00:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221246 (0x1316303e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:17:46 2023 Not After : Mon Mar 20 22:17:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:90:a9:ce:fe:35:5d:b4:2d:a9:7f:24:4f:02:1b:2f: ab:7a:28:12:53:06:84:a9:4f:80:e2:71:2c:80:cb:b9: 24:1a:61:97:28:29:dd:b3:d9:20:7d:4e:1f:e2:48:21: 1a:48:e6:e2:ac:18:44:75:ab:fc:a9:5b:73:4b:ee:32: 32:67:8d:4e:e9:ed:0b:13:a8:bc:98:4f:63:4c:a9:99: f7:f7:0e:6b:3c:3d:9e:b4:21:6b:c7:74:c8:ca:cc:68: 65:00:5f:37:65:75:99:95:30:85:46:c2:93:2d:9d:f3: 21:6d:9a:a5:3b:fe:cf:03:48:30:d4:c1:96:4e:8e:ba: 57:82:65:74:77:c5:fb:d1:25:d7:bb:74:15:98:35:4d: a9:0c:5d:42:7f:c3:34:9d:95:4d:93:be:d1:2f:02:44: 73:a8:86:66:40:b1:af:9f:17:58:5d:42:b9:64:2e:44: 98:b7:64:4c:a4:a0:47:55:68:8f:35:b3:fc:3e:1f:dc: 57:56:38:fb:78:9a:43:a0:7f:15:a1:5c:79:26:0b:50: 71:ce:ee:da:f6:7c:6a:8a:3f:86:d9:b8:f9:82:72:d0: 0d:b0:c3:a3:b3:83:1b:41:17:67:ee:93:c1:29:4d:4f: 63:0d:71:6b:32:c2:5e:40:60:32:6b:f0:6d:1b:a9:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:89:91:53:da:82:5f:bc:5c:47:ff:2c:5a:ab:16:f1: f0:30:b1:73:8c:4d:09:04:aa:35:d8:7a:38:f1:62:b3: 47:c6:20:94:d8:69:70:99:b5:d9:44:dd:3d:9b:f8:50: ef:ef:1f:04:c3:41:d0:18:69:f3:22:a2:55:c3:d9:e8: e2:c8:4d:62:5c:97:b4:54:21:2a:a8:8f:df:05:05:61: 37:03:9c:50:f0:fa:91:c2:e9:f8:24:5a:3f:ef:b0:ac: 6f:08:d4:7e:19:9e:e4:ba:81:a2:64:50:c9:c7:a1:68: eb:4e:34:4e:d0:c5:0f:6e:9d:31:16:99:d0:96:91:ed: e1:59:54:3d:30:46:1f:c5:e8:4c:5d:0d:8b:06:24:12: 64:46:30:20:67:65:89:65:7f:d7:9a:88:71:6a:41:9e: 92:30:16:0b:13:1c:37:80:90:4d:0b:13:17:45:96:58: 2b:15:76:44:f0:82:eb:43:1d:5a:5c:88:a6:29:d6:cb: b3:7b:7e:50:f7:8c:6e:3e:03:b3:d9:64:3a:f8:0a:1a: 57:65:6e:54:89:f3:b4:90:50:e5:35:e2:1b:fe:b0:43: 62:c3:02:7b:27:cf:8c:a9:b8:98:02:6f:26:ad:96:90: 84:8b:fb:d8:d7:aa:b2:65:06:8d:f3:d1:1d:53:3a:01 Fingerprint (SHA-256): 22:1C:7B:EA:2F:85:84:05:53:B7:89:B9:FE:92:8A:F1:82:7D:27:A5:0D:FA:F5:0C:57:27:FF:66:16:A0:E5:51 Fingerprint (SHA1): 0F:89:74:2A:08:2A:4F:06:14:62:1E:FE:82:27:2E:22:63:AC:00:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221249 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320221250 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221251 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 320221252 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 320221253 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 320221254 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 320221255 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221249 (0x13163041) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:17:54 2023 Not After : Mon Mar 20 22:17:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:6d:c0:80:e3:2a:09:33:32:17:e4:40:43:18:fb:8c: a6:1a:a0:47:d0:7f:ad:5b:5e:e3:a8:c8:72:11:05:40: df:99:04:4b:4f:4c:e1:97:a5:f6:c6:cc:41:4e:bd:6e: 2d:d4:35:ce:98:b3:25:cf:8f:3a:2c:db:5a:f9:80:5b: f6:45:71:fb:49:d8:fe:89:d0:7e:a4:69:84:d8:d5:67: f7:4d:8b:3d:26:6e:30:72:a7:90:aa:5e:77:76:e3:df: 97:50:d4:02:14:5d:8f:e5:8a:b4:13:bf:25:da:72:d0: d6:93:8d:c5:6d:70:1b:f5:5c:17:92:ac:dc:3f:03:90: 34:f9:12:05:f4:66:3a:0c:2e:c6:e5:0a:9b:65:9c:32: fd:b0:11:af:6c:b1:b7:a4:49:8c:7f:f7:d0:c1:38:15: c0:e6:67:1f:6a:e8:eb:76:92:4e:bc:03:d7:b1:0c:f5: 91:4c:14:60:43:a7:74:03:24:46:7e:12:2c:0e:33:c1: fe:17:d1:14:d5:57:b0:87:b0:8d:97:e4:e5:86:7d:1b: 43:c1:ed:73:54:bb:83:3a:04:e5:77:76:8f:83:58:ca: 55:30:5a:ca:13:2c:14:ab:cd:e4:9c:5a:d2:c4:43:a8: 25:94:22:e4:dd:4e:e6:8b:8e:87:4d:de:b0:62:30:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:fb:7b:57:21:16:3e:6d:7f:da:75:1e:c8:92:13:1a: f1:5b:90:9d:f1:fd:ea:bb:9f:78:94:95:0c:42:38:74: 4c:8c:9d:e5:62:52:fc:fa:d1:e3:d3:75:fa:a2:9a:b3: 34:8a:6d:e6:02:db:3f:83:14:c4:04:33:c9:8f:3d:2e: bb:cd:a4:9e:a9:ea:17:4e:64:8c:91:d4:3f:b2:fc:b5: f1:41:7e:55:40:df:6f:51:4f:3e:05:16:a0:a8:7a:d6: af:68:1c:ff:ff:55:6b:89:4f:93:e0:d7:9c:62:5f:e7: f8:e3:13:6d:a2:4c:99:41:2b:d8:77:d2:58:ea:75:08: 3c:ce:4a:d0:d3:2a:d4:28:3a:fa:85:8a:27:d2:a5:f2: 9f:7f:f1:d3:70:f3:14:e9:cf:8f:05:aa:3c:37:bf:e5: db:f1:1d:40:49:f2:7d:80:6a:39:ec:3b:85:3b:8c:49: 09:c1:18:9d:09:be:e7:e7:41:b1:74:64:da:22:72:b5: 17:a2:73:28:e8:9c:f5:9e:60:fb:d2:95:76:0b:5a:05: 2e:5b:f7:02:c4:04:5c:cf:8e:ee:3a:87:34:cb:83:a3: 02:18:33:71:e5:07:b6:d5:40:8a:4f:85:0f:d8:f0:6c: 3f:a3:ef:b7:c1:e0:82:48:4a:13:7f:df:6e:2e:8f:31 Fingerprint (SHA-256): 71:2F:82:10:44:35:5C:7B:54:71:AC:32:38:75:D2:FC:FD:38:7F:27:2C:8E:E9:E6:93:C0:65:71:EE:DC:D3:96 Fingerprint (SHA1): 3B:72:B0:83:9E:B3:B6:9B:C8:DF:A3:E3:8C:CE:65:BB:92:6A:EC:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221249 (0x13163041) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:17:54 2023 Not After : Mon Mar 20 22:17:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:6d:c0:80:e3:2a:09:33:32:17:e4:40:43:18:fb:8c: a6:1a:a0:47:d0:7f:ad:5b:5e:e3:a8:c8:72:11:05:40: df:99:04:4b:4f:4c:e1:97:a5:f6:c6:cc:41:4e:bd:6e: 2d:d4:35:ce:98:b3:25:cf:8f:3a:2c:db:5a:f9:80:5b: f6:45:71:fb:49:d8:fe:89:d0:7e:a4:69:84:d8:d5:67: f7:4d:8b:3d:26:6e:30:72:a7:90:aa:5e:77:76:e3:df: 97:50:d4:02:14:5d:8f:e5:8a:b4:13:bf:25:da:72:d0: d6:93:8d:c5:6d:70:1b:f5:5c:17:92:ac:dc:3f:03:90: 34:f9:12:05:f4:66:3a:0c:2e:c6:e5:0a:9b:65:9c:32: fd:b0:11:af:6c:b1:b7:a4:49:8c:7f:f7:d0:c1:38:15: c0:e6:67:1f:6a:e8:eb:76:92:4e:bc:03:d7:b1:0c:f5: 91:4c:14:60:43:a7:74:03:24:46:7e:12:2c:0e:33:c1: fe:17:d1:14:d5:57:b0:87:b0:8d:97:e4:e5:86:7d:1b: 43:c1:ed:73:54:bb:83:3a:04:e5:77:76:8f:83:58:ca: 55:30:5a:ca:13:2c:14:ab:cd:e4:9c:5a:d2:c4:43:a8: 25:94:22:e4:dd:4e:e6:8b:8e:87:4d:de:b0:62:30:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:fb:7b:57:21:16:3e:6d:7f:da:75:1e:c8:92:13:1a: f1:5b:90:9d:f1:fd:ea:bb:9f:78:94:95:0c:42:38:74: 4c:8c:9d:e5:62:52:fc:fa:d1:e3:d3:75:fa:a2:9a:b3: 34:8a:6d:e6:02:db:3f:83:14:c4:04:33:c9:8f:3d:2e: bb:cd:a4:9e:a9:ea:17:4e:64:8c:91:d4:3f:b2:fc:b5: f1:41:7e:55:40:df:6f:51:4f:3e:05:16:a0:a8:7a:d6: af:68:1c:ff:ff:55:6b:89:4f:93:e0:d7:9c:62:5f:e7: f8:e3:13:6d:a2:4c:99:41:2b:d8:77:d2:58:ea:75:08: 3c:ce:4a:d0:d3:2a:d4:28:3a:fa:85:8a:27:d2:a5:f2: 9f:7f:f1:d3:70:f3:14:e9:cf:8f:05:aa:3c:37:bf:e5: db:f1:1d:40:49:f2:7d:80:6a:39:ec:3b:85:3b:8c:49: 09:c1:18:9d:09:be:e7:e7:41:b1:74:64:da:22:72:b5: 17:a2:73:28:e8:9c:f5:9e:60:fb:d2:95:76:0b:5a:05: 2e:5b:f7:02:c4:04:5c:cf:8e:ee:3a:87:34:cb:83:a3: 02:18:33:71:e5:07:b6:d5:40:8a:4f:85:0f:d8:f0:6c: 3f:a3:ef:b7:c1:e0:82:48:4a:13:7f:df:6e:2e:8f:31 Fingerprint (SHA-256): 71:2F:82:10:44:35:5C:7B:54:71:AC:32:38:75:D2:FC:FD:38:7F:27:2C:8E:E9:E6:93:C0:65:71:EE:DC:D3:96 Fingerprint (SHA1): 3B:72:B0:83:9E:B3:B6:9B:C8:DF:A3:E3:8C:CE:65:BB:92:6A:EC:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221256 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320221257 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 320221258 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 320221259 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 320221260 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 320221261 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 320221262 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 320221263 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 320221264 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 320221265 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 320221266 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 320221267 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 320221268 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 320221269 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 320221270 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 320221271 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 320221272 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 320221273 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 320221274 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 320221275 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 320221276 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 320221277 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 320221278 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 320221279 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 320221280 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 320221281 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 320221282 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 320221283 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 320221284 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 320221285 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221256 (0x13163048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:18:06 2023 Not After : Mon Mar 20 22:18:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:31:ea:49:09:eb:d6:c6:f9:f1:e2:c0:71:cf:04: f2:4f:66:d4:5c:53:ad:fb:60:98:b2:92:cd:38:cd:83: 8c:a5:b2:d5:99:63:ff:b1:3b:22:37:04:29:8c:1f:b1: a0:f6:70:58:b5:d6:bf:a3:0b:25:85:06:17:91:be:c9: af:56:2e:fb:76:be:11:39:fc:ae:55:db:9a:db:3c:aa: 9b:20:14:b4:25:08:e1:a4:b7:ce:63:c1:8a:11:c4:2e: 8e:0f:5a:d7:d5:8f:ae:59:bf:e5:2d:72:a3:8f:30:53: 61:6b:28:95:3b:dd:e3:2e:be:fb:3e:95:70:ba:cb:62: f0:b0:a4:ed:46:20:61:c1:b7:9c:ff:a8:f2:66:07:b3: c3:79:36:02:9f:19:94:e2:46:13:1e:39:c0:b5:1a:ae: cf:b7:d8:0e:39:28:df:23:43:e9:cb:91:8a:01:88:c1: 60:58:41:97:91:3e:12:ad:84:73:77:9a:06:1c:ce:07: 53:ac:9f:b7:de:be:fd:5a:83:79:b4:a9:c2:31:e3:af: 18:86:c2:1b:47:ba:bf:14:9b:b0:8c:88:96:43:53:d5: 46:17:b0:f1:57:2e:26:cc:28:a3:8e:41:18:61:5d:7f: 8c:0f:11:7c:b0:36:f0:08:6c:66:bf:66:9a:ee:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:72:78:62:f8:a7:22:b7:59:df:b2:20:29:d1:1f:09: 30:63:63:e4:69:0d:54:50:ee:eb:85:79:f7:ed:84:df: 5a:4d:b5:b6:a2:c1:e0:96:fc:0b:b3:04:5a:44:c1:9f: 6c:ee:d9:fe:35:95:cb:a4:58:00:5c:f9:47:a1:18:81: 4c:21:69:bc:24:3b:34:ff:0b:20:a1:48:90:ab:f9:93: da:cb:99:6d:ef:e5:0b:86:84:1d:62:50:4e:49:39:a5: 25:c9:a3:d3:04:2a:f0:a7:48:9e:47:43:80:bb:86:1e: ff:20:5a:f7:d3:c2:0b:98:a3:51:3a:d4:c8:2c:c7:6c: 0b:bb:5c:56:0b:8c:79:e1:f1:14:c4:3b:80:f9:72:0b: 4b:77:47:76:2b:2e:7b:72:56:eb:c8:c4:26:82:66:d8: 08:16:69:27:db:71:42:3d:40:20:f7:3d:20:6e:82:21: c2:55:99:50:7b:af:e2:47:c6:03:bb:f4:5e:68:cb:2e: 5b:ba:51:88:8b:b1:3e:ec:1d:9b:b4:a3:01:90:87:3e: a0:1a:93:63:cd:d1:88:11:66:3f:3f:f4:7d:ba:6d:49: e1:31:0e:3d:8f:ca:e0:dc:8e:d6:f3:6e:89:20:61:e3: ba:fe:0b:0c:06:d6:bf:b6:27:de:7a:43:c1:b5:9b:a1 Fingerprint (SHA-256): B3:76:AC:A0:1C:1F:2E:55:DC:42:46:FD:7D:2E:4B:C7:00:5F:1E:8F:19:7A:1F:2C:97:E1:21:CD:8C:D7:64:89 Fingerprint (SHA1): CE:25:24:19:3A:56:94:FC:4C:B2:AF:37:6E:28:57:2C:64:CB:3B:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221286 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 320221287 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 320221288 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 320221289 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 320221290 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 320221291 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 320221292 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221286 (0x13163066) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:18:57 2023 Not After : Mon Mar 20 22:18:57 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:4c:2a:a4:35:a1:99:54:8b:ca:ec:5c:73:a9:a0:de: 85:07:0a:79:40:d2:f7:68:c6:86:c4:43:d9:cd:aa:70: 1e:88:e9:50:13:86:81:70:36:e0:b5:8c:0c:26:f4:c3: 4d:e4:a1:1e:6a:61:c4:ef:27:8d:43:d4:c9:d7:0e:bd: 67:7c:96:d4:3d:94:f2:82:73:cc:be:29:37:d5:76:4a: 07:9d:16:55:16:a2:57:61:02:0f:cc:f4:50:16:c3:cc: 4e:f2:7a:10:7e:0d:04:38:c1:78:b8:d6:45:da:f8:52: be:79:4d:b7:b8:80:01:96:65:3d:dc:2c:18:8b:b3:2b: 62:8b:78:fe:0a:77:5b:10:59:a1:28:da:85:b0:25:ec: a2:1f:7c:8c:2f:09:5a:e5:d1:68:46:fb:c9:f1:6e:d0: 03:42:90:89:f6:91:f0:48:ee:6a:14:57:92:6f:a4:51: 71:92:38:52:0c:16:6c:d4:ac:2f:6e:50:9c:de:40:2c: a5:e4:12:96:a4:50:46:25:3b:e4:ce:65:f3:e4:a2:cb: 52:00:1a:d8:96:74:9d:6c:ed:2f:c9:a9:3d:6a:4c:c4: 93:87:9e:7d:5b:e0:d1:22:6b:4c:ee:28:82:c3:1b:41: d5:3c:02:a8:98:05:4b:d9:61:14:53:9b:0a:61:fb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:1f:81:6f:56:21:f0:36:a6:c6:b4:80:67:8c:2b:af: 6e:69:bc:41:88:9b:05:bd:66:2c:d6:02:a4:9c:2b:75: d0:db:57:2b:c4:a3:12:a9:f0:5d:c9:6d:df:ab:eb:b6: 04:00:89:e6:4d:63:13:b8:d5:a3:d5:7c:b0:a1:0f:d8: 5c:35:62:2d:7f:1f:63:37:5c:61:ab:c6:6d:ed:b0:ef: e6:6d:0c:9d:48:81:7d:ce:1c:7f:b1:b5:5b:d4:e0:5b: cf:7a:f3:40:6f:b2:8c:0f:cb:a6:27:8f:91:6f:7a:8c: 9a:ff:d2:93:44:00:88:63:0c:cf:67:cd:f4:77:59:91: e2:a4:cd:e4:aa:05:03:28:7a:07:60:dd:6f:2e:a7:5a: 1f:6c:f7:9f:79:aa:e6:5c:1d:81:a9:d2:8b:61:ba:26: 7c:c1:12:10:d3:3b:ff:d5:5f:1b:d7:99:48:ca:2b:ee: 7f:18:63:19:fb:5c:d6:70:4c:23:dd:16:e8:78:42:90: 05:16:98:5e:11:c9:6d:f4:39:38:d9:23:24:ed:d1:a8: ad:ea:62:fe:3c:de:84:0f:da:96:74:d1:27:02:f4:0c: cd:e2:8c:71:a7:9d:78:54:0c:23:f3:08:c9:57:ca:54: b8:c3:e4:47:fc:68:26:62:75:a0:4d:94:91:03:d0:e9 Fingerprint (SHA-256): D1:FB:11:84:87:F8:65:C4:65:08:E5:87:91:1D:DF:28:09:A6:16:38:28:0B:94:2B:F0:DD:82:26:5C:2B:31:0E Fingerprint (SHA1): C7:A4:90:58:75:FD:3A:12:6A:40:0A:06:BA:20:12:26:45:AF:01:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221286 (0x13163066) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:18:57 2023 Not After : Mon Mar 20 22:18:57 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:4c:2a:a4:35:a1:99:54:8b:ca:ec:5c:73:a9:a0:de: 85:07:0a:79:40:d2:f7:68:c6:86:c4:43:d9:cd:aa:70: 1e:88:e9:50:13:86:81:70:36:e0:b5:8c:0c:26:f4:c3: 4d:e4:a1:1e:6a:61:c4:ef:27:8d:43:d4:c9:d7:0e:bd: 67:7c:96:d4:3d:94:f2:82:73:cc:be:29:37:d5:76:4a: 07:9d:16:55:16:a2:57:61:02:0f:cc:f4:50:16:c3:cc: 4e:f2:7a:10:7e:0d:04:38:c1:78:b8:d6:45:da:f8:52: be:79:4d:b7:b8:80:01:96:65:3d:dc:2c:18:8b:b3:2b: 62:8b:78:fe:0a:77:5b:10:59:a1:28:da:85:b0:25:ec: a2:1f:7c:8c:2f:09:5a:e5:d1:68:46:fb:c9:f1:6e:d0: 03:42:90:89:f6:91:f0:48:ee:6a:14:57:92:6f:a4:51: 71:92:38:52:0c:16:6c:d4:ac:2f:6e:50:9c:de:40:2c: a5:e4:12:96:a4:50:46:25:3b:e4:ce:65:f3:e4:a2:cb: 52:00:1a:d8:96:74:9d:6c:ed:2f:c9:a9:3d:6a:4c:c4: 93:87:9e:7d:5b:e0:d1:22:6b:4c:ee:28:82:c3:1b:41: d5:3c:02:a8:98:05:4b:d9:61:14:53:9b:0a:61:fb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:1f:81:6f:56:21:f0:36:a6:c6:b4:80:67:8c:2b:af: 6e:69:bc:41:88:9b:05:bd:66:2c:d6:02:a4:9c:2b:75: d0:db:57:2b:c4:a3:12:a9:f0:5d:c9:6d:df:ab:eb:b6: 04:00:89:e6:4d:63:13:b8:d5:a3:d5:7c:b0:a1:0f:d8: 5c:35:62:2d:7f:1f:63:37:5c:61:ab:c6:6d:ed:b0:ef: e6:6d:0c:9d:48:81:7d:ce:1c:7f:b1:b5:5b:d4:e0:5b: cf:7a:f3:40:6f:b2:8c:0f:cb:a6:27:8f:91:6f:7a:8c: 9a:ff:d2:93:44:00:88:63:0c:cf:67:cd:f4:77:59:91: e2:a4:cd:e4:aa:05:03:28:7a:07:60:dd:6f:2e:a7:5a: 1f:6c:f7:9f:79:aa:e6:5c:1d:81:a9:d2:8b:61:ba:26: 7c:c1:12:10:d3:3b:ff:d5:5f:1b:d7:99:48:ca:2b:ee: 7f:18:63:19:fb:5c:d6:70:4c:23:dd:16:e8:78:42:90: 05:16:98:5e:11:c9:6d:f4:39:38:d9:23:24:ed:d1:a8: ad:ea:62:fe:3c:de:84:0f:da:96:74:d1:27:02:f4:0c: cd:e2:8c:71:a7:9d:78:54:0c:23:f3:08:c9:57:ca:54: b8:c3:e4:47:fc:68:26:62:75:a0:4d:94:91:03:d0:e9 Fingerprint (SHA-256): D1:FB:11:84:87:F8:65:C4:65:08:E5:87:91:1D:DF:28:09:A6:16:38:28:0B:94:2B:F0:DD:82:26:5C:2B:31:0E Fingerprint (SHA1): C7:A4:90:58:75:FD:3A:12:6A:40:0A:06:BA:20:12:26:45:AF:01:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221293 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221294 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221295 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320221296 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221293 (0x1316306d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:19:10 2023 Not After : Mon Mar 20 22:19:10 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:40:39:a2:ce:c3:bc:b2:ba:de:f4:3e:ff:0d:eb:6d: f6:04:a9:64:a6:91:43:dc:73:33:e9:aa:ba:60:f5:3d: 9f:3b:5c:72:91:ff:a2:c3:ca:18:8c:91:13:d3:8a:01: 0b:12:f8:1c:66:cf:49:c7:3e:4d:86:2d:11:37:c4:57: a5:5b:28:0d:a1:0c:8d:58:4d:44:1b:a6:6e:d0:0f:15: 2c:6d:0d:94:66:f9:00:9b:47:38:40:3e:6d:04:03:2f: 5f:56:c7:63:43:9e:84:e9:6b:14:50:bf:39:8e:29:91: be:88:cb:58:8e:1f:ec:1b:b2:75:ac:46:50:1b:77:bc: cc:38:6a:a2:9e:d9:e1:ff:19:9b:59:d6:99:8f:0b:1e: c0:40:81:c6:36:cb:70:5c:7f:11:b9:00:64:aa:c6:b0: 31:08:08:24:54:8b:09:3d:cc:16:11:17:52:86:21:5c: 93:0e:e1:9c:c4:59:69:29:e4:ff:51:ea:8b:1e:99:be: f2:10:af:44:79:f5:54:65:80:a2:7f:48:3d:de:35:90: 47:f9:b7:cb:8a:69:b8:f9:1a:12:8b:16:4c:79:f1:f3: bb:cc:f2:48:63:64:9f:93:eb:3e:b9:00:6a:d7:ca:e7: e0:95:e0:08:1b:3f:30:c1:6c:57:d6:80:14:f6:38:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:65:51:60:90:ac:a7:09:2a:51:46:c4:23:83:97:2c: e5:cc:f3:b5:a7:ce:a2:97:8a:56:23:27:72:39:ff:be: 7d:9f:b7:ce:01:d8:bd:32:23:96:18:e6:78:e1:d4:e4: 12:ef:6d:14:da:9f:c5:82:1a:86:34:cd:e9:e6:a9:44: 00:6d:e8:29:b7:c6:47:82:5c:61:65:d5:19:e0:6a:eb: d3:73:13:87:84:08:b3:99:73:36:14:db:c5:c3:cd:e1: 3a:52:e7:2e:a7:42:ec:15:8d:6e:cd:67:0a:9f:46:4e: 82:fb:af:45:66:c0:5d:dd:6b:c5:be:79:a4:c4:08:36: ba:9e:45:94:7a:ce:b7:40:fb:0a:dd:61:45:83:27:35: 5a:ba:db:e9:6a:05:6a:0b:2e:ce:8b:c2:fb:75:fb:00: 0c:ac:ff:2e:f9:f7:1a:d4:33:49:1a:1f:96:36:d1:a7: 0e:df:71:fb:0d:4c:c4:97:62:0d:46:61:ca:e1:4c:4e: ae:30:7e:65:72:2e:81:e5:5e:89:0c:11:9c:57:be:87: 82:13:6f:6f:1a:c2:6b:d9:c5:ff:e5:d8:ce:fd:56:24: 43:7d:c6:a2:c6:20:a7:15:28:a5:e8:8e:64:b4:74:f6: 01:0d:76:b1:60:33:2f:70:c0:31:0c:70:55:8c:5d:d5 Fingerprint (SHA-256): 78:09:A9:3B:D6:A1:5B:23:57:00:08:1B:BE:C9:93:32:0E:4B:11:68:20:73:58:FF:BB:1F:82:CE:0B:EA:EB:88 Fingerprint (SHA1): B6:69:E0:F5:16:33:2A:20:DC:11:9E:4D:6F:EE:9A:9E:A1:8E:9A:D0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221294 (0x1316306e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:19:12 2023 Not After : Mon Mar 20 22:19:12 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:5b:ce:90:c4:9e:a8:f2:77:b1:11:84:ea:d8:d6:b3: 7a:07:45:71:8c:97:8a:15:ea:f5:a8:42:e8:8d:44:f5: ae:d5:e6:4f:62:29:98:af:83:14:6a:c8:b7:ad:7a:7d: 19:c4:e5:61:c4:1f:d3:8a:91:6f:f8:9b:f0:e7:16:26: 74:4a:4e:2f:ab:92:81:ca:2b:e3:5c:10:aa:81:64:32: 77:72:aa:6b:a7:cc:8c:ad:8c:c9:85:c8:f9:5c:79:59: 7d:cf:77:8c:a7:b5:02:4b:71:85:b1:80:52:0d:54:27: 51:e1:18:39:6e:8d:7f:0b:82:e7:b4:1e:9a:06:6e:f3: d5:2e:8e:cb:a6:d7:1a:b4:8b:79:c4:c2:f7:46:f6:65: 08:5d:83:07:bd:69:38:72:ce:de:5d:31:cf:b8:38:5b: 76:ab:a6:1e:d3:e8:aa:ee:62:11:13:c4:2a:f6:cd:a0: c4:67:d4:27:52:91:e8:e7:02:71:e9:75:b6:9d:5d:77: 9f:a1:c2:5e:12:7b:8d:7f:64:16:d8:a2:3e:6f:9a:a6: e1:29:1a:c2:6b:21:17:c6:44:f8:2e:02:12:f1:34:19: 8b:ff:6a:43:bc:a0:1a:3d:6c:e9:e3:ce:77:74:19:ea: 06:6c:cf:17:ca:9b:df:c4:ba:96:4e:1c:13:75:ab:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:c7:d1:1a:8c:43:6f:5e:5b:fc:1a:c9:a2:49:f1:78: 15:e2:4c:a1:d1:f1:6b:6b:5c:76:49:12:92:9b:e1:73: 5c:36:aa:62:6b:ad:dc:8e:8b:22:70:4b:f0:ec:d2:78: 21:54:57:bb:dd:b5:7b:b5:4b:b6:ff:59:86:e3:1d:39: 2f:36:ab:c6:9e:b0:bc:46:e7:a4:17:7c:4a:06:b2:7f: 5e:e3:ed:d7:47:b0:a4:2b:fc:cb:a7:d1:bd:9e:06:6d: d8:c0:53:8a:ef:6c:3a:25:ff:27:83:9c:f3:08:83:16: 7d:7a:25:2c:40:00:07:6c:1a:1e:e1:b5:f2:77:9b:e6: c6:54:c9:da:f6:11:3d:25:21:20:aa:c1:93:2d:79:2a: 10:93:fd:92:f2:b0:cb:14:ca:f0:5e:de:9c:71:ce:2c: 5b:ff:37:01:25:2c:80:e9:72:a7:f6:b1:08:95:05:2e: 53:4e:88:f2:92:e0:3b:dd:2c:fe:66:fe:de:70:2f:f8: f3:8f:5c:8b:be:a6:0a:6b:b6:0e:6d:07:d0:66:fd:b5: dd:51:b6:3c:d0:1d:19:ba:c8:db:67:38:41:e0:69:b7: 04:85:45:cc:23:a6:cd:57:de:de:fd:6a:e9:6b:ea:d1: 9f:90:ef:18:d6:3f:d2:eb:d5:7a:6b:17:ca:cf:38:45 Fingerprint (SHA-256): FC:64:2A:C2:5C:CC:1D:B1:E3:AD:8E:AF:D2:D0:7F:15:6B:9E:9B:AA:B2:CD:9B:1D:1B:F5:AE:06:3D:39:FC:EA Fingerprint (SHA1): 67:80:61:D2:2A:31:FC:22:A1:69:92:A8:E1:16:CB:B2:21:AE:D8:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221295 (0x1316306f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:19:14 2023 Not After : Mon Mar 20 22:19:14 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a0:f0:6a:5d:5f:b2:8f:a4:45:29:3b:70:cd:5c:28: 63:10:d0:bc:23:42:e4:c4:f9:e9:17:59:8c:83:f4:b0: 2b:39:92:da:0c:0e:b3:74:09:75:20:83:ca:31:a5:ff: 68:2f:6a:d2:0d:2f:1f:90:fb:99:68:f0:63:91:e9:97: cd:b9:a6:a1:65:cc:e4:4c:91:f5:01:44:5d:9e:ab:e4: 53:c8:22:41:4e:54:3b:19:d4:25:27:b4:16:3e:05:53: 5c:cf:21:83:83:44:99:5f:1c:cf:e6:34:12:d0:09:e3: 82:08:75:bf:b1:8a:62:e5:39:6e:9c:1a:53:21:08:69: e3:10:a5:4c:e7:1c:1f:f0:b9:00:7d:f6:e7:9d:5a:98: d3:44:46:32:2c:d2:4b:4f:4e:65:c7:a0:9e:63:f7:b0: e7:d2:f3:05:79:fb:bf:78:7e:c0:01:7e:18:ad:b2:df: 2d:81:21:8b:78:9e:c1:81:08:22:b4:bc:20:02:34:b4: 7a:c7:33:c0:73:67:2c:0c:86:43:21:34:6a:c1:7c:df: 6f:86:80:86:f9:1e:a7:b4:fc:43:3c:a3:27:dd:97:72: 8c:56:bc:d7:8b:42:86:42:da:ca:83:4b:f2:1a:35:f1: e0:1f:57:24:06:a9:be:09:98:8c:1d:19:ea:f9:36:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:66:33:05:de:d3:56:1a:d9:7e:23:8d:78:0c:63:2b: e2:91:0d:bd:c1:fd:27:64:fc:fd:b5:0c:e7:65:87:73: fa:07:99:42:8d:40:0f:e5:ea:9c:d3:00:9c:d6:10:22: 26:95:2c:c0:af:58:c8:c3:98:92:6f:ed:15:06:0b:22: 80:c2:25:f8:bc:4e:c1:77:78:62:60:04:d4:34:3e:09: e5:89:bb:50:1a:d4:4f:ae:05:1e:a1:38:75:e6:54:80: ce:10:81:b0:73:e8:18:3d:2d:e9:d9:22:73:cf:ac:34: c6:a9:af:ce:d3:c4:f3:3e:d5:90:85:e7:ed:b9:04:4e: 64:31:60:19:38:ea:1f:9d:3a:5a:47:a7:f9:da:3c:f4: 17:1e:af:ce:98:65:58:1e:30:60:34:6d:66:0d:94:1e: d7:29:da:4c:a4:ca:11:16:dc:12:13:67:ed:fc:ee:7b: 3f:70:d6:e6:10:87:ea:70:77:49:d7:4a:a9:7f:fd:06: 56:de:32:9f:86:c4:74:b7:73:22:d4:90:77:a6:eb:8e: 7a:f4:49:cd:44:23:6d:0a:fe:f9:af:f7:5e:a8:d7:47: c1:ab:77:60:b2:ff:6b:6e:49:77:e8:d6:86:98:06:bd: b1:94:ec:a8:2e:da:ff:ae:38:fd:2a:ce:bf:5d:d9:4d Fingerprint (SHA-256): 65:41:34:79:0A:E3:95:8B:13:43:DF:AB:EA:55:01:41:34:80:11:D4:FB:C8:28:15:E7:B9:59:0A:35:08:25:0F Fingerprint (SHA1): FE:5E:05:F6:55:A4:40:3F:1C:FF:01:0C:CB:FD:4E:32:AC:4B:FD:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221297 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221298 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221299 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 320221300 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 320221301 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221297 (0x13163071) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:19:18 2023 Not After : Mon Mar 20 22:19:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:68:f2:52:62:f5:40:2f:17:2f:2e:8b:de:d5:e0:a2: ce:f3:07:65:a9:5f:57:34:0a:8c:12:11:7b:48:e9:dc: 48:f7:48:01:8b:cd:1a:5f:d8:b2:fd:ca:bb:b3:12:76: c8:09:1b:a0:8b:f6:ee:c9:3e:c3:ab:1a:11:78:a8:87: b8:23:2c:0d:7f:e5:ae:bb:bb:6a:a5:8e:84:84:97:56: c6:76:c4:bd:a6:ff:a9:10:c6:d8:58:4c:eb:6f:ff:00: 50:53:cf:cc:7b:48:6e:b5:d0:ab:d5:78:0a:68:42:45: ed:cd:7d:4c:64:b2:99:60:05:2f:7b:17:f5:e0:2a:91: 11:e5:ad:5b:e4:03:82:d1:bf:da:7d:e3:94:50:c8:9f: 01:28:ad:39:7d:7a:26:48:77:3a:20:be:56:39:c4:ce: 40:05:3f:93:b4:02:6f:a9:c8:31:3b:34:e5:47:53:17: 99:23:9f:98:eb:1a:32:28:be:97:4c:82:69:74:8c:c8: ec:e4:e5:42:7f:70:84:d3:19:e0:fd:8d:a1:12:9e:8a: 60:e4:ca:4e:f1:c7:da:73:ae:95:a0:fc:71:b6:9a:77: 2f:90:bd:c8:d1:4c:7c:2a:43:0f:0f:a5:a7:55:2a:9b: 19:d7:99:f0:b1:02:19:17:8b:58:82:66:12:7f:d9:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:89:d8:6b:9e:b4:15:d9:aa:f8:3d:91:a0:1e:b7:a8: c3:2a:01:26:f0:ca:08:2b:a9:d0:74:80:d7:26:85:76: ce:d9:38:3c:90:4a:c7:7c:1a:a9:d9:be:ad:26:03:f9: 15:c6:76:fe:80:fe:ee:f8:74:f2:e6:c1:96:e0:9e:05: 10:d9:fb:6a:8c:63:a4:a9:28:7a:83:97:3f:45:e9:f5: 64:2d:46:58:a6:97:21:6d:85:97:8b:f9:ae:a1:ed:2f: 5c:2d:73:4b:2b:54:2e:ae:a9:e6:6a:b1:a0:14:af:0c: 04:25:bd:d6:47:14:1a:01:f8:49:86:8a:e6:2a:81:4d: ca:f3:b0:3f:db:e3:06:3b:0d:3e:01:c1:56:6f:ba:da: dd:9d:e9:f4:b3:20:18:db:8d:9f:cd:93:fa:21:fd:21: c9:d4:4c:de:aa:c5:b1:51:7d:5b:df:d7:10:1d:b6:8c: e9:a7:23:dc:01:ee:7c:66:0e:bf:31:8f:b0:5e:7a:b4: a6:83:3a:65:ef:83:55:af:1c:79:88:3c:5d:60:f0:02: 26:a4:06:1e:f8:bf:65:bc:71:d6:57:2d:d0:49:fb:c2: 27:c1:22:c2:2d:fd:db:39:8a:51:da:9c:47:40:0d:5f: 98:4b:f7:74:a1:87:42:2b:37:80:d2:e7:46:09:62:3d Fingerprint (SHA-256): 03:27:B4:04:F2:1B:1B:29:F9:91:96:2E:8D:88:3F:59:01:5B:12:1C:CF:D5:E5:3A:5F:88:F0:4A:FC:72:8F:F4 Fingerprint (SHA1): 55:8A:93:71:84:0E:B8:52:A2:BF:C0:E3:7C:18:DC:19:03:A3:D5:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221298 (0x13163072) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:19:20 2023 Not After : Mon Mar 20 22:19:20 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:22:fe:c5:f5:bb:68:0d:0f:d3:48:fd:91:72:30:7a: 9d:8b:e4:e4:02:f6:d2:60:a1:45:6c:5e:8a:a7:ed:6b: 0b:dd:5f:a6:3e:ef:d4:0c:a5:c6:cb:ec:3f:a4:76:81: f0:76:8c:60:d3:75:f0:64:65:00:dc:de:b6:34:2e:9b: 5e:dd:82:5b:b7:4c:c0:e0:c1:d1:1d:e4:40:b1:6e:33: 8c:80:15:de:41:72:c9:e5:1f:9a:fe:43:0a:25:1b:37: 07:63:2b:39:e3:3c:0b:12:f4:1a:55:e3:9e:a1:f3:ab: f0:6d:6a:ea:02:40:e4:a9:27:0a:bb:38:45:d2:bb:e6: 36:2c:5a:f7:92:b2:0d:8f:d5:b3:25:8d:34:a0:88:da: 37:46:90:88:5a:39:38:42:b3:26:b5:d9:21:a6:23:80: 2c:c5:ed:63:33:d7:77:97:03:0e:a8:03:5c:2c:b9:e9: 31:b7:f3:0e:d3:05:45:74:34:8d:99:0b:de:af:ce:c6: 39:3a:32:61:fd:d6:94:e2:5b:c2:d7:c2:b3:9b:41:04: 7e:c7:68:84:ce:ea:b8:db:51:82:b0:f5:00:25:18:29: 55:70:68:7a:30:50:c8:1a:d1:43:2d:41:df:cf:81:96: 5c:2d:b9:f1:68:84:c7:e1:e1:1e:a2:9c:20:64:13:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:05:88:ff:d4:a8:b7:1e:bc:ed:09:9a:a3:4e:ff:e0: 9e:1a:52:ae:bd:cd:e6:d9:7c:48:52:a5:02:28:7b:75: 9a:18:84:12:c4:2d:83:3f:1e:e9:fc:71:74:3e:46:a3: 0f:24:0d:6f:23:ae:2f:cf:ca:d9:0e:97:82:75:8b:4d: 00:78:a8:46:c4:62:c9:7f:86:d5:e5:9b:8f:ea:6d:87: 9f:8f:81:b6:cd:14:e6:cd:6a:f8:6a:0d:b9:fa:ec:e0: b9:a7:3d:6f:68:1e:26:f7:61:37:ab:ee:f9:ea:5f:78: 86:7d:43:b2:2c:00:d4:36:7a:18:99:06:4b:c2:e2:e9: 80:c4:7c:e2:e7:1e:7f:e4:42:ca:cf:9e:88:00:dd:0b: 65:92:e0:56:9b:81:5a:a2:4f:72:31:27:8f:af:70:b9: 6f:b4:63:bb:62:91:21:91:81:e7:ea:50:01:1d:76:9b: 83:a0:be:d8:d3:53:47:71:0a:35:7f:23:7e:b0:19:f5: 3e:d6:94:82:c5:f7:5b:1f:50:10:07:f2:fe:73:d3:02: 76:95:79:2d:cd:5d:ed:ad:97:8c:aa:03:f8:e4:2e:83: 58:4f:3d:ae:bd:08:20:d1:12:3a:80:99:82:7c:59:f6: f3:0b:30:7f:7e:ed:84:dc:e8:1c:5e:81:2b:e6:4a:ec Fingerprint (SHA-256): C9:3E:F4:52:D2:53:F9:70:1B:E0:A6:28:67:EB:0C:2E:05:FC:F4:C8:AB:9A:30:FB:73:D0:FB:2C:14:BD:12:F3 Fingerprint (SHA1): 4D:AC:3C:F8:A9:7F:86:F0:74:5B:7A:7B:57:0E:C3:C7:E5:B5:75:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221299 (0x13163073) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:19:21 2023 Not After : Mon Mar 20 22:19:21 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ad:8e:2a:ad:9d:9b:18:9d:f0:b2:80:97:e3:99:c7: 85:0f:40:00:be:43:e0:31:53:90:ba:e3:4d:b9:93:8d: d4:1f:98:38:5d:46:21:99:78:96:f5:b5:4d:3d:40:02: c0:f4:be:42:76:ee:2c:07:2c:28:26:f6:34:b6:2a:c7: 9c:fd:1b:0a:7d:9b:27:d8:da:dd:44:d3:21:05:2f:e9: 08:fd:7c:55:b0:b7:d5:24:05:0e:f5:b0:53:ad:c9:97: 0e:b7:e3:cf:dc:13:66:cc:c3:61:96:74:67:af:be:f6: f8:8d:e8:24:80:f5:43:92:13:79:c1:30:14:bb:7d:50: d1:41:b2:98:ae:d7:83:1d:8d:52:4c:b6:0b:ef:36:2d: bd:f9:cd:5e:31:c5:3c:01:e6:ff:3b:3d:f4:e5:fd:4e: fd:ef:a4:5d:4a:f4:e2:3a:38:7b:bb:5d:99:8f:5f:c3: ce:e3:06:0c:47:7e:03:33:ac:2a:bd:ac:7a:1a:90:88: 03:04:8f:4e:e2:95:67:fb:0f:79:f9:76:23:fe:45:c2: ad:11:b9:9e:c4:b4:2d:f0:2a:31:d4:61:64:34:50:4e: 0d:1a:9a:a7:b5:c3:24:08:8e:2c:73:84:a1:cc:d7:45: 78:04:da:45:90:8d:57:d9:45:62:8e:20:ca:65:71:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:ec:67:74:9c:4d:37:ff:f2:b4:53:68:14:e7:25:d4: cb:02:cf:c7:b4:9c:a9:a3:6c:90:6b:59:d4:50:59:66: b2:e0:dd:57:c9:85:0b:19:31:27:12:0a:f9:4d:95:0d: fd:c3:75:e4:85:d0:49:d8:67:a8:8a:82:7b:9f:83:11: af:54:4e:92:0e:3c:da:25:64:4f:e8:27:b2:57:28:f3: f4:29:3c:9a:a8:81:c9:9a:1d:e3:4e:2f:38:17:17:d6: 33:ed:e4:46:b2:9b:2e:0d:ba:30:60:b5:e7:d1:67:f4: ec:b4:22:f3:80:7c:aa:5e:47:c2:42:cc:52:6a:57:f8: f5:a6:2f:c2:ec:bb:ca:1c:d8:84:70:ba:6d:dc:fb:f4: ee:79:8b:09:cf:6a:04:a6:68:ab:db:88:26:60:0a:a2: c9:73:70:a9:72:1e:c6:e1:2e:52:90:d0:5e:3a:55:a2: ca:0c:57:76:3f:35:0c:02:e0:8d:4a:6d:75:50:94:9d: fc:aa:11:c9:18:91:42:64:00:1c:58:67:9d:1f:1f:41: 62:6c:44:58:1e:40:ab:65:89:36:db:57:d8:d0:dd:45: 40:46:08:13:69:3e:ac:fe:5c:10:f0:82:ec:c8:44:50: 90:87:03:e1:04:22:7e:7b:ef:92:80:5d:62:54:64:c4 Fingerprint (SHA-256): 0A:A2:D2:2C:80:60:EF:58:2B:96:CF:D6:4B:89:5E:08:33:46:E9:6A:C8:C2:86:73:0A:90:99:26:18:29:8E:AC Fingerprint (SHA1): BF:A4:44:C3:F9:49:35:72:FE:C2:FE:20:ED:A7:A7:25:F6:F1:FF:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221302 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221303 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221304 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA1Root-320221065.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 320221305 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221302 (0x13163076) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:19:28 2023 Not After : Mon Mar 20 22:19:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:03:6f:56:eb:30:bf:a6:07:be:0f:42:0a:05:69:f1: 4d:d4:26:7f:5d:d2:17:74:49:d7:37:5e:17:04:b3:3b: ee:69:6d:e4:1a:68:7e:ee:18:36:22:2d:d6:d1:85:d0: e9:e2:24:50:80:02:5a:bb:89:8a:03:ee:52:a9:6c:78: dd:47:51:ef:05:40:7d:24:6c:5b:48:9b:79:06:64:6f: 7c:e1:7f:5d:20:bf:f1:4f:64:72:3c:1f:28:8f:81:04: 4d:f7:8d:90:7f:b0:9a:39:77:1f:7d:73:ba:2b:e1:a8: 70:e0:42:9f:be:7d:a4:49:f8:2d:9e:c1:73:56:c1:4e: d8:b5:e8:46:f7:00:05:d5:3b:f4:41:a5:9c:aa:35:a3: 5f:33:32:ab:20:82:08:b0:94:51:1b:78:24:0c:48:71: 17:bc:78:f9:04:6c:0d:a1:e4:84:a8:64:48:90:79:f8: ea:0e:f3:a7:00:5e:50:93:3c:27:d2:75:34:d6:59:d3: 83:d2:73:ad:af:c9:55:bf:d4:e4:c5:65:4b:a8:09:10: 02:ca:06:87:bb:43:69:50:31:2f:09:b9:29:d5:d0:57: f0:9b:f1:b4:6e:c3:e4:0b:47:0d:a0:d3:b5:8b:0b:1a: 99:ec:d7:ab:e5:0a:0d:be:99:e6:55:34:dd:ca:1b:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:a8:f4:fb:88:3b:dd:a0:8f:53:05:17:a1:53:18:28: 5a:c0:dd:54:eb:51:10:4e:47:df:ce:f2:86:3c:88:e1: 35:60:7d:5f:e0:fe:3b:62:97:cc:83:8f:22:ea:87:dd: 97:2c:d4:06:77:f3:6c:cb:3d:67:38:83:02:24:c6:11: fd:ad:1e:9d:bc:81:c7:c4:ce:6d:5c:c8:4f:88:64:0c: 46:2a:60:3a:b5:4b:b2:1d:c3:f5:b3:cc:97:a2:fe:1e: bf:97:e5:aa:58:99:b8:74:bc:98:0d:b2:da:07:15:a8: c0:f4:5a:21:87:de:89:6f:7f:6d:5c:33:4e:91:da:2e: b2:e8:38:3e:48:7f:94:98:de:73:3a:05:e3:00:f0:07: f7:fd:6c:9e:13:84:4d:48:ee:c8:8d:66:8e:de:ec:3e: 72:c2:98:4d:02:a7:91:e7:6e:d5:01:45:d3:9d:c7:d1: db:4e:ae:92:f6:36:7c:f3:bb:0f:32:c8:99:4b:ec:57: 0b:eb:ae:d5:07:38:30:31:3d:a2:11:cf:c3:9a:9f:1c: dc:11:1d:d3:4f:11:79:f4:22:d0:93:f1:32:2b:f8:71: c4:36:28:cc:9e:5c:f0:ca:3c:12:e9:70:fd:75:aa:9f: e2:10:b0:aa:4f:01:33:b5:1f:16:fd:0d:4a:66:0d:00 Fingerprint (SHA-256): 02:1C:18:06:02:ED:83:05:11:8E:CA:78:16:D1:B8:A5:EC:8F:05:68:41:73:F9:45:1E:FD:B5:32:B1:CA:8B:22 Fingerprint (SHA1): C2:9A:45:9E:D1:40:E8:8D:2F:EA:FF:19:33:43:4F:B5:2B:34:1D:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221306 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221307 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320221308 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320221309 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320221310 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320221066.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221311 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221306 (0x1316307a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:19:36 2023 Not After : Mon Mar 20 22:19:36 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:6e:32:f7:06:44:55:9a:da:80:a6:62:de:29:a4:87: 82:a7:ad:47:f2:a8:a2:62:b3:16:d3:f3:7d:19:7c:84: e1:4d:21:da:6c:72:6f:30:d3:f5:f7:7e:a2:67:f0:92: 2b:1c:57:e4:c5:3f:75:2b:a6:d7:ab:2c:df:6b:c1:a0: d7:fb:a3:91:c9:cc:67:9c:5a:c2:b1:ac:fb:6d:07:6b: 3e:9b:76:32:01:df:ec:60:d2:7d:1c:67:a4:f9:99:fa: d5:b7:90:04:f6:fc:42:0e:c7:43:bf:b7:20:6d:c9:02: 41:a8:5e:ab:38:3b:1d:3b:3d:d2:e5:d0:c0:f0:e2:e2: 33:41:aa:98:6a:7c:bd:07:d9:bb:0a:1d:17:10:c5:00: 91:a3:6a:e2:43:5c:8f:ba:7d:65:85:23:8a:f6:38:0a: d9:eb:0f:04:db:6f:cb:f9:ee:46:cf:15:95:d4:89:c0: ec:cd:16:01:d8:cd:db:9c:4e:f6:d4:6f:c1:f5:3d:0b: 72:01:a5:50:24:d1:fd:a9:fa:5d:9d:07:76:51:19:db: 34:ba:fc:c2:b5:cd:13:a4:b4:69:f7:e0:a6:55:e8:db: 93:20:11:27:85:30:04:5e:14:25:7e:80:a9:78:28:e6: 2c:1a:1c:9d:82:b2:df:6e:8a:f8:dc:98:b9:4a:86:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:8d:a6:e2:b7:6d:92:c2:e3:d3:e9:69:19:8d:68:e5: 1c:6a:a3:53:12:ef:03:0c:28:43:cc:73:1b:15:5e:b4: 2b:1c:e6:32:fa:6e:01:86:58:0c:a6:40:0a:7e:fb:8c: 11:e9:4e:86:06:9f:f9:bb:53:5d:f9:b7:c7:a0:3c:bd: 81:4b:79:c1:f1:30:4d:dd:7b:a6:4f:01:dc:3d:79:e9: af:76:81:d3:c9:ee:b1:27:15:f4:84:37:52:dd:7f:d4: a8:7b:81:66:4f:59:d9:0a:00:80:fc:56:07:d5:77:dc: 27:5c:6e:92:2b:2e:24:f1:60:4d:f3:c2:e8:68:43:e1: 9b:95:a3:b7:d1:2b:1e:d0:7e:dc:2f:56:1d:cd:d8:bf: 3f:01:db:74:0e:6a:1d:58:d7:52:91:cb:86:17:1d:d2: 52:08:af:6f:a8:7c:a9:34:e9:96:c9:18:ea:c7:b6:3f: ac:53:87:3d:3d:7d:a9:13:ff:a7:df:e0:a6:7b:80:30: ff:e2:db:e8:75:2f:75:aa:c4:4a:39:86:a0:7b:44:cc: 7e:b7:f6:74:f9:f4:54:86:9c:09:4e:f0:75:5f:7d:f4: 0e:01:aa:51:20:83:16:12:34:b2:33:ed:ce:15:9b:58: 30:d5:60:00:08:ae:33:33:4b:59:e1:30:49:94:72:de Fingerprint (SHA-256): 18:38:6A:4B:90:44:33:D2:46:C1:D0:2F:53:6A:32:8D:CE:97:D2:DD:03:CB:6C:72:CA:8F:0F:3C:4A:93:26:2B Fingerprint (SHA1): 7C:B8:B0:5B:D9:29:CC:34:D8:C6:0C:45:7C:D8:66:9C:07:1E:B2:65 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221307 (0x1316307b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:37 2023 Not After : Mon Mar 20 22:19:37 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:91:ce:c6:42:cc:ae:57:6c:5f:67:47:e9:26:5e:e6: cb:29:5f:e8:f0:49:38:0f:38:3e:eb:eb:96:3d:00:48: 91:2a:10:57:15:ac:d9:bc:03:3e:db:7b:c0:72:6f:c7: 1d:ed:bf:a0:3d:32:a6:20:be:b8:e6:8c:14:6e:96:38: d0:b1:d7:b3:d6:1c:89:46:1f:7b:78:ec:32:7f:5c:52: 38:a0:58:ff:82:90:2a:1d:19:ea:2c:69:89:29:fe:9f: 66:69:d7:39:3f:55:1f:79:f1:f0:0a:2f:72:01:19:95: 5b:f2:91:16:a7:12:0d:56:9d:63:4a:fc:59:b2:9b:22: dc:e0:cd:38:ce:38:17:52:a0:33:d5:3d:ba:f1:03:ea: d4:99:89:63:e4:fe:9c:9d:40:a3:12:c9:20:e4:e2:7c: 41:c8:de:03:5a:8d:e3:c4:39:24:b7:ac:1f:55:c8:cc: 98:cd:04:74:7a:0d:71:de:ce:1a:db:95:6a:f8:b9:d2: 03:51:96:91:cd:d7:23:c2:da:95:6a:6b:e3:97:03:98: 89:15:f3:ad:52:9e:05:95:3b:dc:54:03:a0:14:1a:d7: 88:c7:d1:23:a4:dc:80:f4:fc:7f:69:3e:3e:31:da:f8: 7f:5c:29:df:14:92:9d:f7:c0:8b:bc:8d:26:7e:92:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:9d:5e:85:7c:24:98:9f:57:3d:d4:a2:6b:60:7a:54: 9f:21:3f:39:51:5a:14:95:77:b8:ce:a3:2a:27:96:8f: 8b:eb:37:3e:9c:ea:3e:5d:2c:d5:7a:8a:ca:75:f1:cc: c4:13:cc:7b:32:73:46:fa:59:22:fc:5d:e8:ff:cc:61: 5e:6f:8f:1f:d6:cf:08:95:bd:a8:fe:65:f2:ae:74:25: b0:7e:72:a9:5d:0f:04:f5:29:27:5a:87:f2:46:a6:01: 56:5f:9c:0c:78:3e:fa:92:26:90:2e:74:c0:e3:32:f5: 62:72:f4:7d:71:38:19:74:15:bf:f1:77:09:b0:cc:97: 02:c2:3e:84:77:ba:2e:15:08:96:03:08:5f:de:11:63: 33:a3:81:55:0a:be:f3:6f:d7:ab:83:fb:d8:24:96:7a: a3:be:c0:f1:88:3f:d8:45:0b:73:42:9f:ab:70:87:02: e0:49:c7:b2:b3:9f:db:3f:95:6b:9e:bf:25:10:f5:b2: 61:8a:2d:6d:5b:f0:70:c3:6c:f1:c4:f4:c6:79:fb:89: 95:21:b8:6b:34:4a:54:22:2b:63:6e:28:0c:09:96:e8: dd:3a:b7:59:d7:bb:df:f5:80:95:e8:26:d2:1d:3c:68: ab:d6:7f:8c:fe:06:51:de:75:9c:bb:1e:d3:6a:ea:f6 Fingerprint (SHA-256): 0C:A4:C2:D1:A3:E7:EA:2F:E9:11:C0:71:26:C9:B4:33:62:09:90:69:29:EF:98:0E:DF:A7:08:C1:6A:72:7B:22 Fingerprint (SHA1): 7D:7B:3A:1C:CB:F3:C3:E3:B8:63:58:9E:EA:9D:4F:58:4A:7D:30:D1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221307 (0x1316307b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:37 2023 Not After : Mon Mar 20 22:19:37 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:91:ce:c6:42:cc:ae:57:6c:5f:67:47:e9:26:5e:e6: cb:29:5f:e8:f0:49:38:0f:38:3e:eb:eb:96:3d:00:48: 91:2a:10:57:15:ac:d9:bc:03:3e:db:7b:c0:72:6f:c7: 1d:ed:bf:a0:3d:32:a6:20:be:b8:e6:8c:14:6e:96:38: d0:b1:d7:b3:d6:1c:89:46:1f:7b:78:ec:32:7f:5c:52: 38:a0:58:ff:82:90:2a:1d:19:ea:2c:69:89:29:fe:9f: 66:69:d7:39:3f:55:1f:79:f1:f0:0a:2f:72:01:19:95: 5b:f2:91:16:a7:12:0d:56:9d:63:4a:fc:59:b2:9b:22: dc:e0:cd:38:ce:38:17:52:a0:33:d5:3d:ba:f1:03:ea: d4:99:89:63:e4:fe:9c:9d:40:a3:12:c9:20:e4:e2:7c: 41:c8:de:03:5a:8d:e3:c4:39:24:b7:ac:1f:55:c8:cc: 98:cd:04:74:7a:0d:71:de:ce:1a:db:95:6a:f8:b9:d2: 03:51:96:91:cd:d7:23:c2:da:95:6a:6b:e3:97:03:98: 89:15:f3:ad:52:9e:05:95:3b:dc:54:03:a0:14:1a:d7: 88:c7:d1:23:a4:dc:80:f4:fc:7f:69:3e:3e:31:da:f8: 7f:5c:29:df:14:92:9d:f7:c0:8b:bc:8d:26:7e:92:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:9d:5e:85:7c:24:98:9f:57:3d:d4:a2:6b:60:7a:54: 9f:21:3f:39:51:5a:14:95:77:b8:ce:a3:2a:27:96:8f: 8b:eb:37:3e:9c:ea:3e:5d:2c:d5:7a:8a:ca:75:f1:cc: c4:13:cc:7b:32:73:46:fa:59:22:fc:5d:e8:ff:cc:61: 5e:6f:8f:1f:d6:cf:08:95:bd:a8:fe:65:f2:ae:74:25: b0:7e:72:a9:5d:0f:04:f5:29:27:5a:87:f2:46:a6:01: 56:5f:9c:0c:78:3e:fa:92:26:90:2e:74:c0:e3:32:f5: 62:72:f4:7d:71:38:19:74:15:bf:f1:77:09:b0:cc:97: 02:c2:3e:84:77:ba:2e:15:08:96:03:08:5f:de:11:63: 33:a3:81:55:0a:be:f3:6f:d7:ab:83:fb:d8:24:96:7a: a3:be:c0:f1:88:3f:d8:45:0b:73:42:9f:ab:70:87:02: e0:49:c7:b2:b3:9f:db:3f:95:6b:9e:bf:25:10:f5:b2: 61:8a:2d:6d:5b:f0:70:c3:6c:f1:c4:f4:c6:79:fb:89: 95:21:b8:6b:34:4a:54:22:2b:63:6e:28:0c:09:96:e8: dd:3a:b7:59:d7:bb:df:f5:80:95:e8:26:d2:1d:3c:68: ab:d6:7f:8c:fe:06:51:de:75:9c:bb:1e:d3:6a:ea:f6 Fingerprint (SHA-256): 0C:A4:C2:D1:A3:E7:EA:2F:E9:11:C0:71:26:C9:B4:33:62:09:90:69:29:EF:98:0E:DF:A7:08:C1:6A:72:7B:22 Fingerprint (SHA1): 7D:7B:3A:1C:CB:F3:C3:E3:B8:63:58:9E:EA:9D:4F:58:4A:7D:30:D1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221312 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221313 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 320221314 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 320221315 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320221316 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-Bridge-320221067.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221317 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320221318 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-BridgeNavy-320221068.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320221319 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221312 (0x13163080) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:19:45 2023 Not After : Mon Mar 20 22:19:45 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:10:be:ff:ed:6d:ba:19:61:da:c1:83:1b:8a:9f:ac: 04:5d:ed:9a:ab:57:3b:65:17:65:55:6d:c8:94:3f:67: d5:b1:fe:41:be:7c:18:1b:98:a9:5b:3d:3a:84:63:f0: 2d:f1:55:b9:6e:5d:67:0f:a2:ed:11:01:b9:24:b0:78: 05:d8:d3:43:df:51:e9:da:31:54:44:bc:b8:16:58:8c: 27:13:ba:b7:83:53:db:e3:4e:06:56:cb:91:e2:7f:ce: 56:52:63:8b:2f:35:5e:16:5e:b5:d2:ff:5c:bd:7c:44: 03:a8:44:ef:69:ea:b8:f3:81:ed:0e:c8:e5:9e:49:69: a1:d8:8f:a7:e0:dc:09:9b:e8:31:81:0a:b9:a1:18:bf: e3:35:80:8c:99:e8:24:17:d8:be:b2:2a:b6:ca:90:1f: f7:90:3f:ce:45:ed:26:dc:ee:2a:1f:c0:56:94:b9:4e: 08:0e:41:87:70:12:8a:05:92:51:53:93:4b:78:f3:62: 65:ac:8e:fb:7e:0b:44:03:63:78:9e:6e:b1:4d:c2:b1: 0e:0a:fb:dc:59:49:9e:59:e5:69:ec:91:e3:9a:95:34: 6b:ca:e1:13:af:2f:c3:b8:4f:1f:c5:4a:51:e7:48:ef: 4d:24:ec:bd:2b:7e:0f:a4:bb:e1:c0:91:75:48:e3:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:a1:b8:8c:b3:9c:f1:a8:ea:44:15:01:9c:8a:34:05: 81:a9:3a:c2:f5:79:2e:22:4d:43:a3:7d:33:7a:10:1e: bf:92:d8:7a:f4:4f:12:ef:5d:e3:1e:75:df:46:e8:9b: 05:d5:1b:5a:b0:98:5b:ee:6b:09:0f:93:5b:03:e4:1a: b0:3b:1c:31:a9:ef:1a:e1:37:e9:a2:05:d2:53:a4:c2: 9d:3a:e0:2b:d0:70:bc:9e:4a:c8:a6:4b:bf:c9:b3:a2: 2f:f3:3a:07:98:6d:f5:f4:54:6a:25:a0:5e:f4:f1:95: 2c:9d:40:13:ab:5e:54:49:6a:66:b7:a3:99:f6:99:66: 30:bf:a2:bd:75:fa:36:95:75:ef:fa:4c:60:65:ae:9d: 49:a0:d5:59:8a:1b:ed:4c:68:6c:42:b5:43:c8:e8:11: a3:29:df:fa:11:08:1a:8a:0c:12:14:a5:0c:0f:b3:8a: 14:56:f8:52:36:36:0d:b3:26:f6:ac:1a:88:4d:f2:9c: 7a:4a:a8:ab:d9:06:f9:24:2f:7d:5c:ee:d7:30:a5:d9: a0:26:15:36:32:7f:b6:c5:25:7e:fd:0b:bf:f3:12:b0: 02:dc:f1:ae:6a:98:f4:ea:c1:73:4d:58:27:85:50:cf: 6e:ad:b6:27:d3:c2:29:4b:5f:6e:51:f2:ba:b4:03:16 Fingerprint (SHA-256): 4B:F6:D0:B6:82:05:AA:2A:4F:43:8F:EE:89:1D:FF:80:F1:2C:40:71:30:0E:B6:18:38:7E:62:A2:49:2E:85:84 Fingerprint (SHA1): D1:C2:FD:8C:CC:86:17:5B:6F:8A:38:77:B8:58:EF:8D:9A:0D:43:25 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221313 (0x13163081) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:46 2023 Not After : Mon Mar 20 22:19:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2a:68:2e:f8:97:f6:a9:f3:88:2c:d7:7a:f3:e7:51: 21:48:01:99:44:45:7c:3e:87:d3:d5:ee:65:74:d9:e1: f8:3b:96:33:86:2b:f6:8f:dd:78:75:23:0e:57:89:33: 2d:da:4c:f1:c6:93:2c:da:02:fb:df:b3:aa:1a:1a:99: 4b:1c:46:4c:69:be:62:d3:c2:18:dc:9c:d2:9a:c1:f2: 8f:78:f0:8e:cc:e4:55:fd:42:96:e0:cb:5b:4c:6b:18: ce:ed:33:11:00:95:16:98:b3:85:8b:56:32:39:9e:a8: 55:3f:90:4a:97:d0:eb:68:e2:44:64:77:41:33:b1:5f: e8:39:7e:15:fb:1a:a1:99:51:e0:1d:93:5e:cd:05:25: 21:43:fa:23:8b:40:67:1f:00:7a:47:98:8b:20:55:ad: d5:d6:58:12:f9:31:7e:5f:99:60:a8:cc:de:65:c8:73: 72:1e:3c:5e:06:34:57:88:38:51:6b:c5:03:14:61:b3: 76:95:23:3e:4c:ed:9b:f7:08:09:fc:a6:ca:81:23:e8: 1b:dc:40:9d:17:dd:3e:46:8d:74:6d:c4:1d:18:0e:c6: 83:ec:ab:54:25:19:96:4a:86:06:cf:06:44:32:5d:96: 50:2c:ce:4b:67:76:b4:2e:6a:03:0e:18:60:b2:03:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:e2:6c:fd:f2:6d:54:98:93:aa:6e:d7:a4:8e:db:cb: 0a:51:f9:7a:1d:b0:96:45:56:d7:4b:9e:bf:b9:28:c7: 56:d4:11:a1:0e:0b:9f:02:02:a0:f8:4d:70:45:de:ac: 93:9f:b0:ba:da:e0:a0:47:50:ce:08:21:58:b9:45:4c: fe:ea:79:df:32:b7:75:6f:95:e4:52:44:6b:7e:15:99: 91:ff:0d:50:33:de:7d:ac:4a:0a:d5:33:49:52:86:cb: 9f:e3:da:56:d8:d1:52:c0:af:8f:43:f1:44:ac:7f:61: 58:5e:62:6b:26:bb:8b:fa:01:b4:7a:38:94:11:ef:0b: 4b:98:62:5f:92:d0:82:1c:05:01:42:ad:fb:28:4c:71: b3:22:ac:3e:40:f8:d4:68:39:04:53:15:10:c8:cf:b8: 90:1a:92:e6:f9:6d:96:ee:8f:64:81:c7:9f:48:55:12: 8f:67:49:55:15:af:14:a9:98:77:32:f0:89:98:0c:69: 86:54:95:3a:0b:52:7c:3a:de:3b:fd:30:51:8d:79:72: 4c:e5:e0:aa:d2:dd:2e:1e:e8:3e:68:1c:bf:87:ee:ad: 91:72:f2:60:71:55:c6:7a:5c:17:86:f1:a5:d5:e3:74: 72:12:07:42:5a:fb:32:7e:79:21:9f:b4:fb:40:86:7e Fingerprint (SHA-256): 91:32:FF:77:EB:4D:CE:14:23:ED:67:36:B5:C1:E5:2C:53:E9:FF:22:DD:3B:82:D4:AA:2A:3B:74:37:72:7C:72 Fingerprint (SHA1): A8:38:0B:4E:CB:D2:75:D0:32:1F:37:08:17:0D:31:21:ED:40:43:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221313 (0x13163081) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:46 2023 Not After : Mon Mar 20 22:19:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2a:68:2e:f8:97:f6:a9:f3:88:2c:d7:7a:f3:e7:51: 21:48:01:99:44:45:7c:3e:87:d3:d5:ee:65:74:d9:e1: f8:3b:96:33:86:2b:f6:8f:dd:78:75:23:0e:57:89:33: 2d:da:4c:f1:c6:93:2c:da:02:fb:df:b3:aa:1a:1a:99: 4b:1c:46:4c:69:be:62:d3:c2:18:dc:9c:d2:9a:c1:f2: 8f:78:f0:8e:cc:e4:55:fd:42:96:e0:cb:5b:4c:6b:18: ce:ed:33:11:00:95:16:98:b3:85:8b:56:32:39:9e:a8: 55:3f:90:4a:97:d0:eb:68:e2:44:64:77:41:33:b1:5f: e8:39:7e:15:fb:1a:a1:99:51:e0:1d:93:5e:cd:05:25: 21:43:fa:23:8b:40:67:1f:00:7a:47:98:8b:20:55:ad: d5:d6:58:12:f9:31:7e:5f:99:60:a8:cc:de:65:c8:73: 72:1e:3c:5e:06:34:57:88:38:51:6b:c5:03:14:61:b3: 76:95:23:3e:4c:ed:9b:f7:08:09:fc:a6:ca:81:23:e8: 1b:dc:40:9d:17:dd:3e:46:8d:74:6d:c4:1d:18:0e:c6: 83:ec:ab:54:25:19:96:4a:86:06:cf:06:44:32:5d:96: 50:2c:ce:4b:67:76:b4:2e:6a:03:0e:18:60:b2:03:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:e2:6c:fd:f2:6d:54:98:93:aa:6e:d7:a4:8e:db:cb: 0a:51:f9:7a:1d:b0:96:45:56:d7:4b:9e:bf:b9:28:c7: 56:d4:11:a1:0e:0b:9f:02:02:a0:f8:4d:70:45:de:ac: 93:9f:b0:ba:da:e0:a0:47:50:ce:08:21:58:b9:45:4c: fe:ea:79:df:32:b7:75:6f:95:e4:52:44:6b:7e:15:99: 91:ff:0d:50:33:de:7d:ac:4a:0a:d5:33:49:52:86:cb: 9f:e3:da:56:d8:d1:52:c0:af:8f:43:f1:44:ac:7f:61: 58:5e:62:6b:26:bb:8b:fa:01:b4:7a:38:94:11:ef:0b: 4b:98:62:5f:92:d0:82:1c:05:01:42:ad:fb:28:4c:71: b3:22:ac:3e:40:f8:d4:68:39:04:53:15:10:c8:cf:b8: 90:1a:92:e6:f9:6d:96:ee:8f:64:81:c7:9f:48:55:12: 8f:67:49:55:15:af:14:a9:98:77:32:f0:89:98:0c:69: 86:54:95:3a:0b:52:7c:3a:de:3b:fd:30:51:8d:79:72: 4c:e5:e0:aa:d2:dd:2e:1e:e8:3e:68:1c:bf:87:ee:ad: 91:72:f2:60:71:55:c6:7a:5c:17:86:f1:a5:d5:e3:74: 72:12:07:42:5a:fb:32:7e:79:21:9f:b4:fb:40:86:7e Fingerprint (SHA-256): 91:32:FF:77:EB:4D:CE:14:23:ED:67:36:B5:C1:E5:2C:53:E9:FF:22:DD:3B:82:D4:AA:2A:3B:74:37:72:7C:72 Fingerprint (SHA1): A8:38:0B:4E:CB:D2:75:D0:32:1F:37:08:17:0D:31:21:ED:40:43:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221312 (0x13163080) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:19:45 2023 Not After : Mon Mar 20 22:19:45 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:10:be:ff:ed:6d:ba:19:61:da:c1:83:1b:8a:9f:ac: 04:5d:ed:9a:ab:57:3b:65:17:65:55:6d:c8:94:3f:67: d5:b1:fe:41:be:7c:18:1b:98:a9:5b:3d:3a:84:63:f0: 2d:f1:55:b9:6e:5d:67:0f:a2:ed:11:01:b9:24:b0:78: 05:d8:d3:43:df:51:e9:da:31:54:44:bc:b8:16:58:8c: 27:13:ba:b7:83:53:db:e3:4e:06:56:cb:91:e2:7f:ce: 56:52:63:8b:2f:35:5e:16:5e:b5:d2:ff:5c:bd:7c:44: 03:a8:44:ef:69:ea:b8:f3:81:ed:0e:c8:e5:9e:49:69: a1:d8:8f:a7:e0:dc:09:9b:e8:31:81:0a:b9:a1:18:bf: e3:35:80:8c:99:e8:24:17:d8:be:b2:2a:b6:ca:90:1f: f7:90:3f:ce:45:ed:26:dc:ee:2a:1f:c0:56:94:b9:4e: 08:0e:41:87:70:12:8a:05:92:51:53:93:4b:78:f3:62: 65:ac:8e:fb:7e:0b:44:03:63:78:9e:6e:b1:4d:c2:b1: 0e:0a:fb:dc:59:49:9e:59:e5:69:ec:91:e3:9a:95:34: 6b:ca:e1:13:af:2f:c3:b8:4f:1f:c5:4a:51:e7:48:ef: 4d:24:ec:bd:2b:7e:0f:a4:bb:e1:c0:91:75:48:e3:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:a1:b8:8c:b3:9c:f1:a8:ea:44:15:01:9c:8a:34:05: 81:a9:3a:c2:f5:79:2e:22:4d:43:a3:7d:33:7a:10:1e: bf:92:d8:7a:f4:4f:12:ef:5d:e3:1e:75:df:46:e8:9b: 05:d5:1b:5a:b0:98:5b:ee:6b:09:0f:93:5b:03:e4:1a: b0:3b:1c:31:a9:ef:1a:e1:37:e9:a2:05:d2:53:a4:c2: 9d:3a:e0:2b:d0:70:bc:9e:4a:c8:a6:4b:bf:c9:b3:a2: 2f:f3:3a:07:98:6d:f5:f4:54:6a:25:a0:5e:f4:f1:95: 2c:9d:40:13:ab:5e:54:49:6a:66:b7:a3:99:f6:99:66: 30:bf:a2:bd:75:fa:36:95:75:ef:fa:4c:60:65:ae:9d: 49:a0:d5:59:8a:1b:ed:4c:68:6c:42:b5:43:c8:e8:11: a3:29:df:fa:11:08:1a:8a:0c:12:14:a5:0c:0f:b3:8a: 14:56:f8:52:36:36:0d:b3:26:f6:ac:1a:88:4d:f2:9c: 7a:4a:a8:ab:d9:06:f9:24:2f:7d:5c:ee:d7:30:a5:d9: a0:26:15:36:32:7f:b6:c5:25:7e:fd:0b:bf:f3:12:b0: 02:dc:f1:ae:6a:98:f4:ea:c1:73:4d:58:27:85:50:cf: 6e:ad:b6:27:d3:c2:29:4b:5f:6e:51:f2:ba:b4:03:16 Fingerprint (SHA-256): 4B:F6:D0:B6:82:05:AA:2A:4F:43:8F:EE:89:1D:FF:80:F1:2C:40:71:30:0E:B6:18:38:7E:62:A2:49:2E:85:84 Fingerprint (SHA1): D1:C2:FD:8C:CC:86:17:5B:6F:8A:38:77:B8:58:EF:8D:9A:0D:43:25 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221313 (0x13163081) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:46 2023 Not After : Mon Mar 20 22:19:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2a:68:2e:f8:97:f6:a9:f3:88:2c:d7:7a:f3:e7:51: 21:48:01:99:44:45:7c:3e:87:d3:d5:ee:65:74:d9:e1: f8:3b:96:33:86:2b:f6:8f:dd:78:75:23:0e:57:89:33: 2d:da:4c:f1:c6:93:2c:da:02:fb:df:b3:aa:1a:1a:99: 4b:1c:46:4c:69:be:62:d3:c2:18:dc:9c:d2:9a:c1:f2: 8f:78:f0:8e:cc:e4:55:fd:42:96:e0:cb:5b:4c:6b:18: ce:ed:33:11:00:95:16:98:b3:85:8b:56:32:39:9e:a8: 55:3f:90:4a:97:d0:eb:68:e2:44:64:77:41:33:b1:5f: e8:39:7e:15:fb:1a:a1:99:51:e0:1d:93:5e:cd:05:25: 21:43:fa:23:8b:40:67:1f:00:7a:47:98:8b:20:55:ad: d5:d6:58:12:f9:31:7e:5f:99:60:a8:cc:de:65:c8:73: 72:1e:3c:5e:06:34:57:88:38:51:6b:c5:03:14:61:b3: 76:95:23:3e:4c:ed:9b:f7:08:09:fc:a6:ca:81:23:e8: 1b:dc:40:9d:17:dd:3e:46:8d:74:6d:c4:1d:18:0e:c6: 83:ec:ab:54:25:19:96:4a:86:06:cf:06:44:32:5d:96: 50:2c:ce:4b:67:76:b4:2e:6a:03:0e:18:60:b2:03:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:e2:6c:fd:f2:6d:54:98:93:aa:6e:d7:a4:8e:db:cb: 0a:51:f9:7a:1d:b0:96:45:56:d7:4b:9e:bf:b9:28:c7: 56:d4:11:a1:0e:0b:9f:02:02:a0:f8:4d:70:45:de:ac: 93:9f:b0:ba:da:e0:a0:47:50:ce:08:21:58:b9:45:4c: fe:ea:79:df:32:b7:75:6f:95:e4:52:44:6b:7e:15:99: 91:ff:0d:50:33:de:7d:ac:4a:0a:d5:33:49:52:86:cb: 9f:e3:da:56:d8:d1:52:c0:af:8f:43:f1:44:ac:7f:61: 58:5e:62:6b:26:bb:8b:fa:01:b4:7a:38:94:11:ef:0b: 4b:98:62:5f:92:d0:82:1c:05:01:42:ad:fb:28:4c:71: b3:22:ac:3e:40:f8:d4:68:39:04:53:15:10:c8:cf:b8: 90:1a:92:e6:f9:6d:96:ee:8f:64:81:c7:9f:48:55:12: 8f:67:49:55:15:af:14:a9:98:77:32:f0:89:98:0c:69: 86:54:95:3a:0b:52:7c:3a:de:3b:fd:30:51:8d:79:72: 4c:e5:e0:aa:d2:dd:2e:1e:e8:3e:68:1c:bf:87:ee:ad: 91:72:f2:60:71:55:c6:7a:5c:17:86:f1:a5:d5:e3:74: 72:12:07:42:5a:fb:32:7e:79:21:9f:b4:fb:40:86:7e Fingerprint (SHA-256): 91:32:FF:77:EB:4D:CE:14:23:ED:67:36:B5:C1:E5:2C:53:E9:FF:22:DD:3B:82:D4:AA:2A:3B:74:37:72:7C:72 Fingerprint (SHA1): A8:38:0B:4E:CB:D2:75:D0:32:1F:37:08:17:0D:31:21:ED:40:43:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221313 (0x13163081) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:46 2023 Not After : Mon Mar 20 22:19:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2a:68:2e:f8:97:f6:a9:f3:88:2c:d7:7a:f3:e7:51: 21:48:01:99:44:45:7c:3e:87:d3:d5:ee:65:74:d9:e1: f8:3b:96:33:86:2b:f6:8f:dd:78:75:23:0e:57:89:33: 2d:da:4c:f1:c6:93:2c:da:02:fb:df:b3:aa:1a:1a:99: 4b:1c:46:4c:69:be:62:d3:c2:18:dc:9c:d2:9a:c1:f2: 8f:78:f0:8e:cc:e4:55:fd:42:96:e0:cb:5b:4c:6b:18: ce:ed:33:11:00:95:16:98:b3:85:8b:56:32:39:9e:a8: 55:3f:90:4a:97:d0:eb:68:e2:44:64:77:41:33:b1:5f: e8:39:7e:15:fb:1a:a1:99:51:e0:1d:93:5e:cd:05:25: 21:43:fa:23:8b:40:67:1f:00:7a:47:98:8b:20:55:ad: d5:d6:58:12:f9:31:7e:5f:99:60:a8:cc:de:65:c8:73: 72:1e:3c:5e:06:34:57:88:38:51:6b:c5:03:14:61:b3: 76:95:23:3e:4c:ed:9b:f7:08:09:fc:a6:ca:81:23:e8: 1b:dc:40:9d:17:dd:3e:46:8d:74:6d:c4:1d:18:0e:c6: 83:ec:ab:54:25:19:96:4a:86:06:cf:06:44:32:5d:96: 50:2c:ce:4b:67:76:b4:2e:6a:03:0e:18:60:b2:03:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:e2:6c:fd:f2:6d:54:98:93:aa:6e:d7:a4:8e:db:cb: 0a:51:f9:7a:1d:b0:96:45:56:d7:4b:9e:bf:b9:28:c7: 56:d4:11:a1:0e:0b:9f:02:02:a0:f8:4d:70:45:de:ac: 93:9f:b0:ba:da:e0:a0:47:50:ce:08:21:58:b9:45:4c: fe:ea:79:df:32:b7:75:6f:95:e4:52:44:6b:7e:15:99: 91:ff:0d:50:33:de:7d:ac:4a:0a:d5:33:49:52:86:cb: 9f:e3:da:56:d8:d1:52:c0:af:8f:43:f1:44:ac:7f:61: 58:5e:62:6b:26:bb:8b:fa:01:b4:7a:38:94:11:ef:0b: 4b:98:62:5f:92:d0:82:1c:05:01:42:ad:fb:28:4c:71: b3:22:ac:3e:40:f8:d4:68:39:04:53:15:10:c8:cf:b8: 90:1a:92:e6:f9:6d:96:ee:8f:64:81:c7:9f:48:55:12: 8f:67:49:55:15:af:14:a9:98:77:32:f0:89:98:0c:69: 86:54:95:3a:0b:52:7c:3a:de:3b:fd:30:51:8d:79:72: 4c:e5:e0:aa:d2:dd:2e:1e:e8:3e:68:1c:bf:87:ee:ad: 91:72:f2:60:71:55:c6:7a:5c:17:86:f1:a5:d5:e3:74: 72:12:07:42:5a:fb:32:7e:79:21:9f:b4:fb:40:86:7e Fingerprint (SHA-256): 91:32:FF:77:EB:4D:CE:14:23:ED:67:36:B5:C1:E5:2C:53:E9:FF:22:DD:3B:82:D4:AA:2A:3B:74:37:72:7C:72 Fingerprint (SHA1): A8:38:0B:4E:CB:D2:75:D0:32:1F:37:08:17:0D:31:21:ED:40:43:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221320 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221321 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 320221322 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 320221323 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 320221324 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 320221325 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 320221326 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 320221327 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221328 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320221329 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221320 (0x13163088) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 20 22:19:57 2023 Not After : Mon Mar 20 22:19:57 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:2b:bc:cc:ea:1a:f3:ad:f0:b8:0d:a7:8d:29:5b:73: ce:c1:49:ed:ad:65:10:d1:47:a1:5e:b3:4b:19:0b:b6: c9:26:e5:f9:ea:24:ad:05:06:cf:28:a4:8b:13:33:92: 0f:df:f7:06:97:48:e5:b7:42:28:dd:3c:eb:43:05:dc: 8a:5f:ea:bc:ba:30:d6:32:1c:74:fd:a0:2d:8d:eb:01: af:bb:d7:84:c8:a6:4e:59:3b:e8:94:d1:ab:c0:c1:1b: 09:23:23:ea:a2:d7:98:b8:ae:d0:bd:b2:46:b2:d0:dd: d8:71:b8:82:27:60:e5:5f:63:99:77:c1:d7:1a:d1:23: a3:a9:df:d0:de:58:b0:cd:88:52:90:43:24:a1:2c:dd: 09:cb:e1:d2:bc:92:44:a7:37:57:2b:72:a9:29:c2:10: 49:c7:c2:fa:f4:67:3a:db:35:10:d7:6b:14:f3:e9:ed: e3:7d:ec:f1:77:d8:a8:ff:c9:62:8d:ee:b3:b8:66:41: 04:e5:c3:27:3c:67:fe:64:90:39:68:49:42:e7:e6:33: e0:69:93:64:de:de:e9:ea:00:61:de:b6:cb:6e:f8:be: 89:2f:1a:0a:e5:d9:d3:3d:ec:7b:39:57:8b:a1:45:30: 72:04:e4:6a:b5:19:e4:68:9d:e6:cd:9d:f8:81:51:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:36:ff:bc:5f:e1:cc:56:7f:3e:f6:84:a0:ca:5c:2e: a9:76:8a:cf:a0:1f:b9:65:1a:76:f1:99:46:a1:99:87: 04:9d:94:a7:62:41:67:7b:1d:dc:90:61:64:58:27:b9: 16:1b:7b:da:f1:a6:c9:b9:c6:b3:c2:1f:df:04:8d:23: 7a:9e:8e:5a:3f:dd:f3:36:6f:7e:fb:16:2a:ef:b0:2f: 3e:fd:a0:d9:3d:e9:bd:88:5b:a0:1d:d9:8f:01:2a:de: 28:88:5e:2a:64:0f:e4:6d:24:60:a4:8c:93:7e:f6:04: b2:12:fa:6f:72:86:62:75:b0:94:80:60:d0:ee:83:ff: f5:3a:85:39:ee:99:a1:6a:fe:2b:22:c4:70:ab:e1:c8: 2d:6a:f3:de:86:a7:b9:99:cc:e9:6a:0a:a5:29:43:d8: 92:52:8b:ad:fe:89:c1:f1:7c:ff:29:cf:4e:ca:de:36: c0:95:84:ed:f4:85:f9:2f:5c:0e:5e:72:c8:c8:9c:b9: 24:a9:60:89:6f:bf:3f:4b:79:14:3c:d8:03:09:5e:dd: f0:5c:7d:22:dd:c8:cc:e2:e7:4c:36:48:ec:8f:4e:ad: b7:31:2e:2a:20:5b:cc:24:b4:6b:83:4e:89:d8:6f:03: e5:4c:b4:12:3e:8d:18:51:c1:5e:94:10:dc:4d:d9:e8 Fingerprint (SHA-256): 7C:DB:2E:FE:5A:F8:D4:39:02:31:8A:EE:7B:DF:8F:52:6D:8E:75:48:1D:83:9D:9D:14:74:99:FB:DF:74:D9:FD Fingerprint (SHA1): 14:D9:8E:B4:BE:13:92:22:94:0D:DF:FA:A5:A4:B6:76:A2:64:41:86 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221321 (0x13163089) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 20 22:19:59 2023 Not After : Mon Mar 20 22:19:59 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7f:48:78:42:c1:78:51:06:b5:b1:37:a4:6d:10:5e: 13:aa:c6:cd:7d:41:a7:88:c3:54:c9:74:25:fd:fe:4c: bd:c8:44:bb:9f:41:78:0d:1e:cb:be:f4:0e:85:87:e9: 2e:a1:39:d6:78:73:6d:b6:c2:e2:5f:d5:46:5a:da:82: d5:8a:db:c7:2f:a7:e5:88:86:11:62:c7:59:fd:e9:89: d4:a9:c8:f8:38:03:54:3d:e8:21:43:6a:ee:ee:02:5a: 4b:ee:86:23:b6:5a:72:c8:d1:d3:30:4b:2c:43:c9:6b: e3:a9:1c:27:02:0e:31:75:e1:e9:d1:38:4b:d0:75:9d: 16:9f:70:5d:5e:9f:25:25:bf:01:cf:2b:1d:63:6d:3a: 68:98:16:29:b2:c1:bf:1e:a9:46:03:e2:a5:2e:53:75: e1:15:f5:e0:f1:5f:9c:15:3d:c3:c2:2f:e0:a2:78:e7: 2e:b4:f7:cb:a6:a0:8d:0e:f3:91:db:fc:cc:ef:2b:c6: d7:58:72:c4:e6:1f:41:14:20:d8:ad:d3:82:2d:21:96: 76:ee:81:47:86:62:ed:3c:64:4a:93:ed:89:7f:e8:3d: bf:8d:df:d1:5c:fe:00:31:3b:c8:9b:4e:f1:73:3f:e7: c0:d4:87:cb:c2:09:ed:8d:67:4a:b0:c3:52:b6:1a:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:c3:d3:f6:92:81:1a:42:c6:2c:28:b9:a9:0a:69:3d: 30:57:21:8c:fe:72:73:68:5c:fa:0b:ad:91:96:1e:52: 1d:22:18:c9:04:21:b0:c0:af:2e:6a:4c:3d:ad:87:9f: ff:29:66:2a:9a:4f:25:01:e8:9d:d0:43:cd:1b:f0:1f: b6:fa:e7:ae:6a:72:bd:e9:11:d3:f8:ae:91:d3:84:ba: 9a:e1:15:bf:12:98:8a:ed:d2:c0:21:63:af:73:a0:c1: 98:23:a1:e1:01:cc:ce:03:1f:3e:1f:29:f9:c2:ad:c9: f5:d8:65:a4:35:45:79:c1:ee:d0:9f:3a:26:10:c0:06: bd:42:d4:91:d3:b1:6b:29:b9:bc:5b:52:f1:c5:ca:2e: 80:3c:62:5f:db:fb:23:de:55:4c:df:2e:8d:6f:05:e3: b8:12:6e:64:61:be:69:f7:5e:7c:8d:60:0b:8c:fe:9e: cf:45:27:b4:7d:14:3c:6c:03:21:9a:c2:79:0e:8a:c4: dc:51:87:be:ad:a4:c9:6d:87:e9:44:b6:49:2b:5f:b7: 81:fb:0a:27:88:24:77:ff:a3:ec:05:c1:2e:69:66:8b: 0f:73:a4:9a:91:d2:88:ef:66:01:b4:9b:8a:c4:ec:d0: c2:04:6c:57:a2:f9:83:a6:92:2b:08:20:16:19:46:8c Fingerprint (SHA-256): 20:57:89:5F:99:AD:F6:26:A7:BC:5F:42:F8:21:CE:1C:70:C0:AE:13:8F:B7:9E:C3:5A:1B:27:69:2C:3E:D8:C2 Fingerprint (SHA1): BA:BF:CE:0B:B8:20:5C:F2:BC:E1:38:FB:B6:25:38:CF:A3:B4:22:D9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221330 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 320221331 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 320221332 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 320221333 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 320221334 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 320221335 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 320221336 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 320221337 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 320221338 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221330 (0x13163092) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:15 2023 Not After : Mon Mar 20 22:20:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a0:11:74:96:a3:83:f9:a9:6f:1f:4d:85:a5:24:00:36: 5b:a0:a3:00:b5:be:95:dd:f3:89:d2:52:ff:82:52:f7: b1:ac:54:84:63:aa:83:e4:b0:6a:58:bb:14:a5:99:23: 93:cf:c7:36:58:6f:e1:5b:7b:e8:7f:9c:57:f0:28:0b: ee:49:0a:8b:dc:13:36:4f:0a:06:6c:0d:cd:f6:e1:f6: d4:78:52:57:de:b2:e2:19:1f:61:4f:80:21:fa:0a:7b: a9:0a:ff:4e:e7:58:22:24:9d:42:2b:e2:dc:43:db:0a: 2e:60:e7:6d:0f:9a:dc:0f:c0:c5:9e:57:87:3d:bc:d1: df:36:54:6d:10:d9:04:a8:4f:ab:e2:c2:02:94:c8:12: 3b:a1:d0:e4:01:d5:dc:f9:e9:85:08:75:45:a4:ce:aa: 92:09:48:eb:e2:86:bd:ea:c3:06:7e:d9:00:37:d6:8a: b1:36:1a:6b:73:dc:1b:d3:67:62:83:0c:7a:1e:d0:54: 72:17:a3:6c:3e:cc:aa:40:44:dc:bc:bb:ad:30:f9:98: 95:c7:ed:9d:90:29:0b:da:db:46:a7:a2:40:47:28:17: 38:8e:ec:d9:68:ad:49:30:31:af:11:77:ae:16:59:61: 14:66:f6:6c:5d:1b:e4:cc:5d:d9:1b:65:b9:a6:63:48 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:09:db:59:2b:73:94:3f:a0:e2:04:9f: fa:63:46:f2:15:45:5a:48:d8:25:00:94:b7:3b:84:9a: 02:1c:40:b5:a5:77:3a:c5:26:e9:f6:26:61:c2:52:4d: d3:02:86:2d:11:31:3c:c4:9e:c1:86:c4:0b:6e Fingerprint (SHA-256): B0:DD:75:91:C1:A8:10:7A:86:37:CF:10:1C:F5:52:D6:21:76:8A:5E:2B:EB:F4:03:9E:B2:33:C7:BE:F8:2E:74 Fingerprint (SHA1): 6F:F2:EC:B4:8E:6B:55:78:2C:33:B6:06:A8:86:94:C7:98:12:E6:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221330 (0x13163092) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:15 2023 Not After : Mon Mar 20 22:20:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a0:11:74:96:a3:83:f9:a9:6f:1f:4d:85:a5:24:00:36: 5b:a0:a3:00:b5:be:95:dd:f3:89:d2:52:ff:82:52:f7: b1:ac:54:84:63:aa:83:e4:b0:6a:58:bb:14:a5:99:23: 93:cf:c7:36:58:6f:e1:5b:7b:e8:7f:9c:57:f0:28:0b: ee:49:0a:8b:dc:13:36:4f:0a:06:6c:0d:cd:f6:e1:f6: d4:78:52:57:de:b2:e2:19:1f:61:4f:80:21:fa:0a:7b: a9:0a:ff:4e:e7:58:22:24:9d:42:2b:e2:dc:43:db:0a: 2e:60:e7:6d:0f:9a:dc:0f:c0:c5:9e:57:87:3d:bc:d1: df:36:54:6d:10:d9:04:a8:4f:ab:e2:c2:02:94:c8:12: 3b:a1:d0:e4:01:d5:dc:f9:e9:85:08:75:45:a4:ce:aa: 92:09:48:eb:e2:86:bd:ea:c3:06:7e:d9:00:37:d6:8a: b1:36:1a:6b:73:dc:1b:d3:67:62:83:0c:7a:1e:d0:54: 72:17:a3:6c:3e:cc:aa:40:44:dc:bc:bb:ad:30:f9:98: 95:c7:ed:9d:90:29:0b:da:db:46:a7:a2:40:47:28:17: 38:8e:ec:d9:68:ad:49:30:31:af:11:77:ae:16:59:61: 14:66:f6:6c:5d:1b:e4:cc:5d:d9:1b:65:b9:a6:63:48 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:09:db:59:2b:73:94:3f:a0:e2:04:9f: fa:63:46:f2:15:45:5a:48:d8:25:00:94:b7:3b:84:9a: 02:1c:40:b5:a5:77:3a:c5:26:e9:f6:26:61:c2:52:4d: d3:02:86:2d:11:31:3c:c4:9e:c1:86:c4:0b:6e Fingerprint (SHA-256): B0:DD:75:91:C1:A8:10:7A:86:37:CF:10:1C:F5:52:D6:21:76:8A:5E:2B:EB:F4:03:9E:B2:33:C7:BE:F8:2E:74 Fingerprint (SHA1): 6F:F2:EC:B4:8E:6B:55:78:2C:33:B6:06:A8:86:94:C7:98:12:E6:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221330 (0x13163092) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:15 2023 Not After : Mon Mar 20 22:20:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a0:11:74:96:a3:83:f9:a9:6f:1f:4d:85:a5:24:00:36: 5b:a0:a3:00:b5:be:95:dd:f3:89:d2:52:ff:82:52:f7: b1:ac:54:84:63:aa:83:e4:b0:6a:58:bb:14:a5:99:23: 93:cf:c7:36:58:6f:e1:5b:7b:e8:7f:9c:57:f0:28:0b: ee:49:0a:8b:dc:13:36:4f:0a:06:6c:0d:cd:f6:e1:f6: d4:78:52:57:de:b2:e2:19:1f:61:4f:80:21:fa:0a:7b: a9:0a:ff:4e:e7:58:22:24:9d:42:2b:e2:dc:43:db:0a: 2e:60:e7:6d:0f:9a:dc:0f:c0:c5:9e:57:87:3d:bc:d1: df:36:54:6d:10:d9:04:a8:4f:ab:e2:c2:02:94:c8:12: 3b:a1:d0:e4:01:d5:dc:f9:e9:85:08:75:45:a4:ce:aa: 92:09:48:eb:e2:86:bd:ea:c3:06:7e:d9:00:37:d6:8a: b1:36:1a:6b:73:dc:1b:d3:67:62:83:0c:7a:1e:d0:54: 72:17:a3:6c:3e:cc:aa:40:44:dc:bc:bb:ad:30:f9:98: 95:c7:ed:9d:90:29:0b:da:db:46:a7:a2:40:47:28:17: 38:8e:ec:d9:68:ad:49:30:31:af:11:77:ae:16:59:61: 14:66:f6:6c:5d:1b:e4:cc:5d:d9:1b:65:b9:a6:63:48 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:09:db:59:2b:73:94:3f:a0:e2:04:9f: fa:63:46:f2:15:45:5a:48:d8:25:00:94:b7:3b:84:9a: 02:1c:40:b5:a5:77:3a:c5:26:e9:f6:26:61:c2:52:4d: d3:02:86:2d:11:31:3c:c4:9e:c1:86:c4:0b:6e Fingerprint (SHA-256): B0:DD:75:91:C1:A8:10:7A:86:37:CF:10:1C:F5:52:D6:21:76:8A:5E:2B:EB:F4:03:9E:B2:33:C7:BE:F8:2E:74 Fingerprint (SHA1): 6F:F2:EC:B4:8E:6B:55:78:2C:33:B6:06:A8:86:94:C7:98:12:E6:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221330 (0x13163092) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:15 2023 Not After : Mon Mar 20 22:20:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a0:11:74:96:a3:83:f9:a9:6f:1f:4d:85:a5:24:00:36: 5b:a0:a3:00:b5:be:95:dd:f3:89:d2:52:ff:82:52:f7: b1:ac:54:84:63:aa:83:e4:b0:6a:58:bb:14:a5:99:23: 93:cf:c7:36:58:6f:e1:5b:7b:e8:7f:9c:57:f0:28:0b: ee:49:0a:8b:dc:13:36:4f:0a:06:6c:0d:cd:f6:e1:f6: d4:78:52:57:de:b2:e2:19:1f:61:4f:80:21:fa:0a:7b: a9:0a:ff:4e:e7:58:22:24:9d:42:2b:e2:dc:43:db:0a: 2e:60:e7:6d:0f:9a:dc:0f:c0:c5:9e:57:87:3d:bc:d1: df:36:54:6d:10:d9:04:a8:4f:ab:e2:c2:02:94:c8:12: 3b:a1:d0:e4:01:d5:dc:f9:e9:85:08:75:45:a4:ce:aa: 92:09:48:eb:e2:86:bd:ea:c3:06:7e:d9:00:37:d6:8a: b1:36:1a:6b:73:dc:1b:d3:67:62:83:0c:7a:1e:d0:54: 72:17:a3:6c:3e:cc:aa:40:44:dc:bc:bb:ad:30:f9:98: 95:c7:ed:9d:90:29:0b:da:db:46:a7:a2:40:47:28:17: 38:8e:ec:d9:68:ad:49:30:31:af:11:77:ae:16:59:61: 14:66:f6:6c:5d:1b:e4:cc:5d:d9:1b:65:b9:a6:63:48 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:09:db:59:2b:73:94:3f:a0:e2:04:9f: fa:63:46:f2:15:45:5a:48:d8:25:00:94:b7:3b:84:9a: 02:1c:40:b5:a5:77:3a:c5:26:e9:f6:26:61:c2:52:4d: d3:02:86:2d:11:31:3c:c4:9e:c1:86:c4:0b:6e Fingerprint (SHA-256): B0:DD:75:91:C1:A8:10:7A:86:37:CF:10:1C:F5:52:D6:21:76:8A:5E:2B:EB:F4:03:9E:B2:33:C7:BE:F8:2E:74 Fingerprint (SHA1): 6F:F2:EC:B4:8E:6B:55:78:2C:33:B6:06:A8:86:94:C7:98:12:E6:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320222036Z nextupdate=20240320222036Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 22:20:36 2023 Next Update: Wed Mar 20 22:20:36 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320222036Z nextupdate=20240320222036Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:20:36 2023 Next Update: Wed Mar 20 22:20:36 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320222037Z nextupdate=20240320222037Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 22:20:37 2023 Next Update: Wed Mar 20 22:20:37 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320222037Z nextupdate=20240320222037Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 22:20:37 2023 Next Update: Wed Mar 20 22:20:37 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320222038Z addcert 14 20230320222038Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 22:20:38 2023 Next Update: Wed Mar 20 22:20:37 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 20 22:20:38 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320222039Z addcert 15 20230320222039Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:20:39 2023 Next Update: Wed Mar 20 22:20:36 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 20 22:20:39 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:26 2023 Not After : Mon Mar 20 22:20:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ce:28:bd:52:d3:16:16:02:b5:2c:62:fb:bb:76:03: 74:cf:79:f2:4b:9a:67:89:bf:31:09:81:80:49:42:92: 5a:ef:b9:ef:ba:74:61:5d:db:b2:fd:3a:3d:35:ea:ea: 44:1e:d7:3c:61:9a:ae:18:83:a3:70:fc:9e:c4:c1:d7: f8:0c:f2:c2:20:1c:71:fc:13:b9:1c:1b:f9:16:46:f6: 22:1d:74:5b:ce:10:e9:77:8f:ff:14:05:26:b7:58:c8: 13:0c:8f:d9:cb:69:56:08:e3:05:94:15:0b:9d:b3:50: d8:38:e5:90:64:cf:ad:55:4b:46:cb:2f:3d:5d:8c:c6: 15:7f:a8:8f:d9:a0:8f:c3:a2:db:be:53:02:f3:de:a3: 48:62:a3:aa:b1:a2:a9:37:c7:00:b9:09:57:8f:c7:25: 7e:cf:dc:93:9d:c3:f6:4c:5b:e9:8e:5a:8e:31:92:31: ae:49:7c:c0:6d:69:9a:d1:4b:d0:4d:6a:2b:60:bc:87: 86:c3:10:a0:d7:d5:c7:51:be:6e:ec:b8:42:66:3e:92: a1:f5:b7:ae:54:f3:33:86:79:2d:5f:40:b2:de:10:0a: 99:1a:b7:e5:e7:4f:67:74:7a:c3:08:24:98:1f:5b:40: bd:01:5a:98:61:57:75:04:bb:11:fa:d9:a7:59:46:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:f4:27:c9:3e:83:04:57:38:2f:82:7d:1f:cd:2a:77: 4f:31:8f:da:3b:73:95:6f:35:78:84:49:ca:4d:17:dc: 5f:0e:f6:1f:fa:ff:ac:9e:89:81:b2:cf:2c:b7:70:f1: 2d:86:b0:3f:7b:df:b7:78:f0:24:31:8a:6e:06:78:ff: 93:aa:83:cf:b2:bd:0d:31:dd:4e:37:d5:f4:f2:77:6a: 88:07:06:62:74:ee:ae:42:b3:ef:82:a0:01:16:a5:5a: 5e:ef:4d:44:18:c3:2f:66:91:a0:84:6c:77:55:1d:ab: e0:ae:ea:e8:db:ed:2e:ac:59:74:48:dd:8d:95:08:3c: a4:f2:35:fe:8e:12:8c:0f:fe:80:67:e9:70:a7:24:df: 2a:f5:fb:e6:6d:56:24:0d:21:f5:32:6a:a9:54:37:fd: 1c:0b:59:ff:b2:2f:d7:9b:52:54:48:64:32:4f:23:38: 0c:59:87:24:35:5c:08:3b:f6:6f:48:37:92:25:d4:2f: f3:c8:9c:c3:a1:99:49:8b:6d:5f:27:17:39:0a:2d:5a: 18:99:d8:95:61:9d:20:21:e5:5e:4a:ad:b7:92:61:67: 0d:6b:bd:6d:a2:ba:f1:c4:ed:74:af:62:e3:8b:31:09: aa:7d:c8:bb:ae:cd:0f:59:e3:6c:91:7f:4f:64:2d:0b Fingerprint (SHA-256): B0:DA:DE:06:A0:AA:DB:97:8E:DB:2E:4A:F0:E4:AB:A5:90:1D:55:BA:3F:CF:A7:47:98:FB:EA:7A:13:4C:60:78 Fingerprint (SHA1): 08:8D:81:0D:E2:C7:7A:BC:24:B5:1B:2A:0B:9C:42:9E:AF:C4:D3:80 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:26 2023 Not After : Mon Mar 20 22:20:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ce:28:bd:52:d3:16:16:02:b5:2c:62:fb:bb:76:03: 74:cf:79:f2:4b:9a:67:89:bf:31:09:81:80:49:42:92: 5a:ef:b9:ef:ba:74:61:5d:db:b2:fd:3a:3d:35:ea:ea: 44:1e:d7:3c:61:9a:ae:18:83:a3:70:fc:9e:c4:c1:d7: f8:0c:f2:c2:20:1c:71:fc:13:b9:1c:1b:f9:16:46:f6: 22:1d:74:5b:ce:10:e9:77:8f:ff:14:05:26:b7:58:c8: 13:0c:8f:d9:cb:69:56:08:e3:05:94:15:0b:9d:b3:50: d8:38:e5:90:64:cf:ad:55:4b:46:cb:2f:3d:5d:8c:c6: 15:7f:a8:8f:d9:a0:8f:c3:a2:db:be:53:02:f3:de:a3: 48:62:a3:aa:b1:a2:a9:37:c7:00:b9:09:57:8f:c7:25: 7e:cf:dc:93:9d:c3:f6:4c:5b:e9:8e:5a:8e:31:92:31: ae:49:7c:c0:6d:69:9a:d1:4b:d0:4d:6a:2b:60:bc:87: 86:c3:10:a0:d7:d5:c7:51:be:6e:ec:b8:42:66:3e:92: a1:f5:b7:ae:54:f3:33:86:79:2d:5f:40:b2:de:10:0a: 99:1a:b7:e5:e7:4f:67:74:7a:c3:08:24:98:1f:5b:40: bd:01:5a:98:61:57:75:04:bb:11:fa:d9:a7:59:46:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:f4:27:c9:3e:83:04:57:38:2f:82:7d:1f:cd:2a:77: 4f:31:8f:da:3b:73:95:6f:35:78:84:49:ca:4d:17:dc: 5f:0e:f6:1f:fa:ff:ac:9e:89:81:b2:cf:2c:b7:70:f1: 2d:86:b0:3f:7b:df:b7:78:f0:24:31:8a:6e:06:78:ff: 93:aa:83:cf:b2:bd:0d:31:dd:4e:37:d5:f4:f2:77:6a: 88:07:06:62:74:ee:ae:42:b3:ef:82:a0:01:16:a5:5a: 5e:ef:4d:44:18:c3:2f:66:91:a0:84:6c:77:55:1d:ab: e0:ae:ea:e8:db:ed:2e:ac:59:74:48:dd:8d:95:08:3c: a4:f2:35:fe:8e:12:8c:0f:fe:80:67:e9:70:a7:24:df: 2a:f5:fb:e6:6d:56:24:0d:21:f5:32:6a:a9:54:37:fd: 1c:0b:59:ff:b2:2f:d7:9b:52:54:48:64:32:4f:23:38: 0c:59:87:24:35:5c:08:3b:f6:6f:48:37:92:25:d4:2f: f3:c8:9c:c3:a1:99:49:8b:6d:5f:27:17:39:0a:2d:5a: 18:99:d8:95:61:9d:20:21:e5:5e:4a:ad:b7:92:61:67: 0d:6b:bd:6d:a2:ba:f1:c4:ed:74:af:62:e3:8b:31:09: aa:7d:c8:bb:ae:cd:0f:59:e3:6c:91:7f:4f:64:2d:0b Fingerprint (SHA-256): B0:DA:DE:06:A0:AA:DB:97:8E:DB:2E:4A:F0:E4:AB:A5:90:1D:55:BA:3F:CF:A7:47:98:FB:EA:7A:13:4C:60:78 Fingerprint (SHA1): 08:8D:81:0D:E2:C7:7A:BC:24:B5:1B:2A:0B:9C:42:9E:AF:C4:D3:80 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221339 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 320221340 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221096.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221069.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221096.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 320221341 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221096.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221070.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 320221342 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221096.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221071.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9897/localhost-30514-CA0-320221096.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9897/localhost-30514-CA0Root-320221072.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20230320222055Z nextupdate=20240320222055Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 20 22:20:55 2023 Next Update: Wed Mar 20 22:20:55 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320222055Z nextupdate=20240320222055Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:20:55 2023 Next Update: Wed Mar 20 22:20:55 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20230320222055Z nextupdate=20240320222055Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 20 22:20:55 2023 Next Update: Wed Mar 20 22:20:55 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20230320222056Z nextupdate=20240320222056Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 20 22:20:56 2023 Next Update: Wed Mar 20 22:20:56 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320222057Z addcert 20 20230320222057Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:20:57 2023 Next Update: Wed Mar 20 22:20:55 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 22:20:57 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20230320222058Z addcert 40 20230320222058Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 20 22:20:58 2023 Next Update: Wed Mar 20 22:20:55 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 20 22:20:57 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 20 22:20:58 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221339 (0x1316309b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:43 2023 Not After : Mon Mar 20 22:20:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:d6:db:14:cf:7e:23:75:d8:d1:b7:11:8d:1a:ec:50: a6:ec:8b:22:22:ef:86:74:66:93:df:7f:46:f5:aa:e4: 3f:ec:6b:b9:a8:79:6c:f8:a2:e0:75:f2:d6:b1:be:45: 8f:c2:c5:a8:17:7d:cb:9b:0b:df:f1:c8:81:5e:54:fe: c1:e5:f0:94:ef:ef:db:87:99:d4:f3:7a:bc:3f:9d:5a: f5:a2:b2:a4:cb:cc:2f:11:d1:92:57:3b:80:e8:42:22: a9:35:7c:3f:04:70:ef:8b:16:6b:1e:26:45:37:d2:06: 4b:4a:9b:fb:3f:48:d4:aa:cb:f7:2f:fc:98:cf:a5:e7: 01:93:49:d8:a4:be:6e:a1:8d:2d:5f:58:d9:3c:6d:3b: b9:2f:e4:94:7e:38:46:0d:2e:e9:c8:5f:54:52:65:af: 72:20:f5:52:e6:c8:97:cd:ff:59:2c:47:5e:bb:25:cc: 62:02:ec:da:e2:2c:86:ba:5d:cb:8d:57:09:be:62:58: 3d:90:ce:0d:e0:db:4d:1c:81:80:bd:c8:80:da:71:3a: 74:4e:24:f6:9e:04:e3:0f:4a:7d:f8:91:c0:68:6c:79: fe:1e:7f:42:83:f3:8a:3c:c3:c9:f1:58:cf:e4:36:e0: 61:dd:22:d5:d4:3d:54:7a:71:a8:83:5f:fb:b4:e6:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:fd:44:ed:b6:c1:eb:ed:ef:ae:e2:f1:54:7f:59:0e: 45:d2:fe:28:67:18:28:ad:9a:02:80:e0:95:0b:c6:db: 99:26:97:d6:e1:00:ec:9e:7c:8d:d0:f8:b4:42:90:81: a3:77:1b:ef:c0:61:f7:dd:7a:d7:54:22:79:1b:75:7e: 81:17:7e:18:03:e7:4f:23:54:23:44:2a:24:95:b9:89: 60:99:b5:86:fd:88:27:22:af:4f:d2:11:4d:6a:81:9c: 5a:e0:ff:ff:db:18:ed:9d:0e:24:6b:97:1e:cb:ef:f7: 92:5f:c8:76:76:3d:e5:1b:05:aa:ed:6e:4f:f5:32:f7: 22:2e:84:b4:90:e5:0d:b7:f9:ef:09:07:8a:11:00:18: c3:fd:0c:42:b5:4d:ae:07:29:be:72:da:2a:dc:3c:26: fe:0f:da:f5:35:9d:d0:65:9e:db:47:d7:de:06:fe:fe: 2e:cb:0e:e1:44:7e:83:50:9c:bd:af:24:90:ad:85:23: 66:b9:62:c8:1d:5e:5e:18:fb:4b:6a:c6:7d:2a:74:e6: fe:5a:29:19:8d:0f:5c:c7:ff:52:5c:a3:01:a1:d3:a0: d9:e9:5e:05:0b:fe:64:7f:4e:38:cb:6d:b4:8c:fc:da: 87:c4:e7:00:83:b9:0d:f2:64:47:9e:d9:84:19:e6:f9 Fingerprint (SHA-256): 91:19:7A:91:7C:A7:16:D8:CD:F3:2F:36:33:FE:01:C0:3A:1F:7B:62:4C:46:1D:E0:3D:4E:C5:B9:42:D0:91:43 Fingerprint (SHA1): 28:7E:94:3F:77:FC:2B:C5:06:50:5A:A3:0A:65:CC:97:2C:97:76:93 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221339 (0x1316309b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 20 22:20:43 2023 Not After : Mon Mar 20 22:20:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:d6:db:14:cf:7e:23:75:d8:d1:b7:11:8d:1a:ec:50: a6:ec:8b:22:22:ef:86:74:66:93:df:7f:46:f5:aa:e4: 3f:ec:6b:b9:a8:79:6c:f8:a2:e0:75:f2:d6:b1:be:45: 8f:c2:c5:a8:17:7d:cb:9b:0b:df:f1:c8:81:5e:54:fe: c1:e5:f0:94:ef:ef:db:87:99:d4:f3:7a:bc:3f:9d:5a: f5:a2:b2:a4:cb:cc:2f:11:d1:92:57:3b:80:e8:42:22: a9:35:7c:3f:04:70:ef:8b:16:6b:1e:26:45:37:d2:06: 4b:4a:9b:fb:3f:48:d4:aa:cb:f7:2f:fc:98:cf:a5:e7: 01:93:49:d8:a4:be:6e:a1:8d:2d:5f:58:d9:3c:6d:3b: b9:2f:e4:94:7e:38:46:0d:2e:e9:c8:5f:54:52:65:af: 72:20:f5:52:e6:c8:97:cd:ff:59:2c:47:5e:bb:25:cc: 62:02:ec:da:e2:2c:86:ba:5d:cb:8d:57:09:be:62:58: 3d:90:ce:0d:e0:db:4d:1c:81:80:bd:c8:80:da:71:3a: 74:4e:24:f6:9e:04:e3:0f:4a:7d:f8:91:c0:68:6c:79: fe:1e:7f:42:83:f3:8a:3c:c3:c9:f1:58:cf:e4:36:e0: 61:dd:22:d5:d4:3d:54:7a:71:a8:83:5f:fb:b4:e6:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:fd:44:ed:b6:c1:eb:ed:ef:ae:e2:f1:54:7f:59:0e: 45:d2:fe:28:67:18:28:ad:9a:02:80:e0:95:0b:c6:db: 99:26:97:d6:e1:00:ec:9e:7c:8d:d0:f8:b4:42:90:81: a3:77:1b:ef:c0:61:f7:dd:7a:d7:54:22:79:1b:75:7e: 81:17:7e:18:03:e7:4f:23:54:23:44:2a:24:95:b9:89: 60:99:b5:86:fd:88:27:22:af:4f:d2:11:4d:6a:81:9c: 5a:e0:ff:ff:db:18:ed:9d:0e:24:6b:97:1e:cb:ef:f7: 92:5f:c8:76:76:3d:e5:1b:05:aa:ed:6e:4f:f5:32:f7: 22:2e:84:b4:90:e5:0d:b7:f9:ef:09:07:8a:11:00:18: c3:fd:0c:42:b5:4d:ae:07:29:be:72:da:2a:dc:3c:26: fe:0f:da:f5:35:9d:d0:65:9e:db:47:d7:de:06:fe:fe: 2e:cb:0e:e1:44:7e:83:50:9c:bd:af:24:90:ad:85:23: 66:b9:62:c8:1d:5e:5e:18:fb:4b:6a:c6:7d:2a:74:e6: fe:5a:29:19:8d:0f:5c:c7:ff:52:5c:a3:01:a1:d3:a0: d9:e9:5e:05:0b:fe:64:7f:4e:38:cb:6d:b4:8c:fc:da: 87:c4:e7:00:83:b9:0d:f2:64:47:9e:d9:84:19:e6:f9 Fingerprint (SHA-256): 91:19:7A:91:7C:A7:16:D8:CD:F3:2F:36:33:FE:01:C0:3A:1F:7B:62:4C:46:1D:E0:3D:4E:C5:B9:42:D0:91:43 Fingerprint (SHA1): 28:7E:94:3F:77:FC:2B:C5:06:50:5A:A3:0A:65:CC:97:2C:97:76:93 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221343 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 320221344 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 320221345 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 320221346 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 320221347 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 320221348 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 320221349 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221343 (0x1316309f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:21:01 2023 Not After : Mon Mar 20 22:21:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3b:3b:e5:8b:52:eb:01:c6:0b:a4:49:52:d2:9c:70: 25:25:3c:5a:ec:be:ce:35:23:ff:96:e3:8c:6e:13:8a: 0c:28:53:18:30:7a:d2:45:ab:35:ac:2d:27:c8:24:3a: cd:36:fe:0d:0f:04:53:4f:b5:dd:f9:2b:5e:38:76:67: 79:5e:02:1e:75:0c:48:c5:3d:11:ff:bf:f6:ac:67:54: 11:1d:11:df:ce:6a:b9:9f:f3:b0:44:95:65:35:5a:c2: 12:5f:64:dc:44:86:bc:eb:fb:e7:f8:a3:99:90:10:30: 3e:cf:8c:c6:d4:4d:de:1c:e2:fa:62:c6:4a:81:55:4b: 1a:54:ff:fc:2e:24:c5:13:83:ca:ec:89:87:87:84:0c: af:f5:1e:c6:d3:a3:33:93:47:cc:77:3e:52:27:d7:e3: a5:63:65:d4:88:50:54:a0:cb:5e:a1:c0:b7:c3:25:be: af:30:37:52:6f:95:a2:a9:9b:53:41:de:cf:9f:0e:e1: 22:0f:68:9e:d3:34:3f:85:52:48:3e:51:cc:e1:13:dd: 56:30:97:56:96:58:f3:bf:fe:92:01:3a:64:28:86:be: 0c:63:d6:b2:27:13:bc:68:9e:70:8d:7c:0f:f4:b2:a3: ee:1a:d0:5a:ef:09:85:a5:c7:9e:ff:79:da:73:61:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:41:04:25:ed:a3:95:3a:c3:14:f3:1a:23:ec:22:7d: 39:fa:41:72:20:58:a5:44:9d:71:71:4d:a8:d6:f4:e6: ab:0c:fe:34:72:ca:12:61:1a:ce:cd:95:c8:9a:36:f7: 52:f6:af:8f:29:75:12:bd:de:8c:e5:d6:5e:64:9d:7d: f1:72:47:02:d0:3a:2c:a9:0b:03:7a:e6:9b:9c:fb:93: 9b:fa:76:c6:7b:c9:9a:db:0f:6a:bd:0a:fc:74:2b:46: 55:9b:76:6a:6d:43:d7:d5:6b:23:f1:6b:70:f1:5b:14: 96:3e:87:ec:28:79:2c:a8:1e:73:1c:33:ed:57:6d:82: ae:2c:55:fc:0b:b5:df:0c:e7:2f:bf:2a:f7:7d:fb:fb: f8:20:4e:c8:1e:aa:3d:16:bb:79:19:cf:04:ab:1b:9d: 13:2e:15:bd:e5:2f:20:d8:70:3e:64:bc:44:0e:5b:33: 36:d5:05:ed:d9:03:2b:e5:12:09:35:95:16:fa:6d:e2: 03:36:d5:82:e4:1b:fd:36:aa:2d:5a:da:d3:9c:be:11: 74:d2:f4:c3:96:fa:84:73:6f:63:40:31:8f:cc:31:d0: 46:77:02:bd:a2:0c:ad:c7:e6:5a:18:e2:c4:b8:3a:98: 9e:25:33:23:46:81:dc:d3:a8:4f:85:32:34:5b:fe:6d Fingerprint (SHA-256): 16:4E:DC:3D:89:40:D4:CF:C8:A5:26:50:B2:86:D4:C3:3C:7B:27:2F:0F:A2:C7:80:1B:0B:86:C3:21:61:63:C7 Fingerprint (SHA1): DB:06:F8:69:E2:EE:A4:9F:BF:BE:D1:2F:62:14:8A:04:89:55:B0:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221345 (0x131630a1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:21:04 2023 Not After : Mon Mar 20 22:21:04 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:02:43:b9:2c:d2:f2:90:c6:0a:0d:7d:32:94:7e:d2: c1:7d:2d:59:f3:c4:e1:26:4b:3a:4a:9f:e7:4d:87:0b: f1:67:ed:2f:ea:ed:4e:e5:cc:34:8b:c9:f1:be:5d:4f: 40:fa:53:71:d3:70:b2:b8:1e:33:27:50:7d:88:9e:28: 24:d0:f5:75:21:c2:a8:b2:58:b6:78:54:d3:4a:9b:98: 12:a8:4e:5a:e3:ef:3b:85:eb:07:0e:41:97:05:3d:0c: 8c:4f:cf:52:ce:70:20:51:ce:8d:82:50:00:a4:8d:05: 9c:04:b4:ce:39:3f:f3:16:15:0c:66:74:59:9b:a1:fb: d4:df:55:a6:97:84:02:12:4c:87:3e:2d:0e:5d:27:fb: ee:2b:91:69:90:5c:e0:34:71:99:84:81:76:17:88:6a: 17:49:3f:7c:21:2e:f7:f4:1a:7b:10:cb:57:f6:4f:39: 08:fd:4c:a1:ea:0b:1c:f2:68:34:97:60:4c:09:09:26: e4:c9:f4:db:8a:75:81:a8:35:cd:81:7e:76:0d:60:5f: 16:68:83:4b:16:c7:26:75:8d:97:cb:2b:6a:75:c5:81: 3a:33:b7:76:17:d8:37:ca:ca:87:cc:83:02:96:f7:4a: 78:33:e9:0b:3e:fc:b0:3c:51:81:e6:49:60:ca:2e:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:79:28:5d:a4:5e:ea:37:7c:78:eb:b2:d6:65:e0:25: fc:be:a9:f0:79:18:d4:31:4d:cf:c4:98:8b:58:54:3d: 5e:06:52:2f:87:4e:06:3b:aa:97:2a:bb:17:5a:cb:11: 13:51:f1:d0:fd:3d:b8:f9:69:e9:ff:a9:c1:61:5b:9e: 4a:17:46:73:a9:5a:fa:c0:99:8d:32:71:7c:c9:1b:82: fc:b2:8e:c1:c7:1d:dc:cf:5f:55:a6:28:77:3c:a7:4a: 75:66:05:e4:75:dc:3a:94:ba:9a:d6:45:58:2d:55:b4: b9:aa:dc:8c:62:c4:27:01:53:a5:68:33:b5:d1:27:56: 80:b4:9d:3e:17:37:f0:41:50:ae:0a:ca:4a:41:f1:8b: c2:5d:57:77:5b:1e:f5:fc:a1:ec:61:37:46:48:68:2b: 16:b7:f5:a2:3d:c9:51:35:01:15:94:41:b3:4c:f0:ac: ba:b0:0f:67:d5:94:a1:79:d2:a5:6a:39:2d:45:ec:0e: 4e:32:c9:ea:ad:16:f7:3f:55:e1:f4:eb:2a:fd:96:1a: af:c1:61:95:2b:59:0a:f3:c2:30:ce:02:57:aa:2a:18: a3:ec:16:3b:c2:de:f0:77:db:db:03:67:3c:7c:d9:6e: 98:b5:bf:84:ae:c3:69:fc:5c:37:dd:28:c9:aa:7c:a7 Fingerprint (SHA-256): C9:B8:9C:3A:A8:FE:70:6C:FB:B9:2B:D4:86:04:CE:E8:14:5C:E6:43:02:51:C7:6E:44:E9:EE:75:1C:8C:B0:53 Fingerprint (SHA1): 45:6C:FC:90:B6:71:47:5E:80:0B:AF:83:C2:AF:DC:C9:A7:28:1A:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221343 (0x1316309f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:21:01 2023 Not After : Mon Mar 20 22:21:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3b:3b:e5:8b:52:eb:01:c6:0b:a4:49:52:d2:9c:70: 25:25:3c:5a:ec:be:ce:35:23:ff:96:e3:8c:6e:13:8a: 0c:28:53:18:30:7a:d2:45:ab:35:ac:2d:27:c8:24:3a: cd:36:fe:0d:0f:04:53:4f:b5:dd:f9:2b:5e:38:76:67: 79:5e:02:1e:75:0c:48:c5:3d:11:ff:bf:f6:ac:67:54: 11:1d:11:df:ce:6a:b9:9f:f3:b0:44:95:65:35:5a:c2: 12:5f:64:dc:44:86:bc:eb:fb:e7:f8:a3:99:90:10:30: 3e:cf:8c:c6:d4:4d:de:1c:e2:fa:62:c6:4a:81:55:4b: 1a:54:ff:fc:2e:24:c5:13:83:ca:ec:89:87:87:84:0c: af:f5:1e:c6:d3:a3:33:93:47:cc:77:3e:52:27:d7:e3: a5:63:65:d4:88:50:54:a0:cb:5e:a1:c0:b7:c3:25:be: af:30:37:52:6f:95:a2:a9:9b:53:41:de:cf:9f:0e:e1: 22:0f:68:9e:d3:34:3f:85:52:48:3e:51:cc:e1:13:dd: 56:30:97:56:96:58:f3:bf:fe:92:01:3a:64:28:86:be: 0c:63:d6:b2:27:13:bc:68:9e:70:8d:7c:0f:f4:b2:a3: ee:1a:d0:5a:ef:09:85:a5:c7:9e:ff:79:da:73:61:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:41:04:25:ed:a3:95:3a:c3:14:f3:1a:23:ec:22:7d: 39:fa:41:72:20:58:a5:44:9d:71:71:4d:a8:d6:f4:e6: ab:0c:fe:34:72:ca:12:61:1a:ce:cd:95:c8:9a:36:f7: 52:f6:af:8f:29:75:12:bd:de:8c:e5:d6:5e:64:9d:7d: f1:72:47:02:d0:3a:2c:a9:0b:03:7a:e6:9b:9c:fb:93: 9b:fa:76:c6:7b:c9:9a:db:0f:6a:bd:0a:fc:74:2b:46: 55:9b:76:6a:6d:43:d7:d5:6b:23:f1:6b:70:f1:5b:14: 96:3e:87:ec:28:79:2c:a8:1e:73:1c:33:ed:57:6d:82: ae:2c:55:fc:0b:b5:df:0c:e7:2f:bf:2a:f7:7d:fb:fb: f8:20:4e:c8:1e:aa:3d:16:bb:79:19:cf:04:ab:1b:9d: 13:2e:15:bd:e5:2f:20:d8:70:3e:64:bc:44:0e:5b:33: 36:d5:05:ed:d9:03:2b:e5:12:09:35:95:16:fa:6d:e2: 03:36:d5:82:e4:1b:fd:36:aa:2d:5a:da:d3:9c:be:11: 74:d2:f4:c3:96:fa:84:73:6f:63:40:31:8f:cc:31:d0: 46:77:02:bd:a2:0c:ad:c7:e6:5a:18:e2:c4:b8:3a:98: 9e:25:33:23:46:81:dc:d3:a8:4f:85:32:34:5b:fe:6d Fingerprint (SHA-256): 16:4E:DC:3D:89:40:D4:CF:C8:A5:26:50:B2:86:D4:C3:3C:7B:27:2F:0F:A2:C7:80:1B:0B:86:C3:21:61:63:C7 Fingerprint (SHA1): DB:06:F8:69:E2:EE:A4:9F:BF:BE:D1:2F:62:14:8A:04:89:55:B0:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221343 (0x1316309f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:21:01 2023 Not After : Mon Mar 20 22:21:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3b:3b:e5:8b:52:eb:01:c6:0b:a4:49:52:d2:9c:70: 25:25:3c:5a:ec:be:ce:35:23:ff:96:e3:8c:6e:13:8a: 0c:28:53:18:30:7a:d2:45:ab:35:ac:2d:27:c8:24:3a: cd:36:fe:0d:0f:04:53:4f:b5:dd:f9:2b:5e:38:76:67: 79:5e:02:1e:75:0c:48:c5:3d:11:ff:bf:f6:ac:67:54: 11:1d:11:df:ce:6a:b9:9f:f3:b0:44:95:65:35:5a:c2: 12:5f:64:dc:44:86:bc:eb:fb:e7:f8:a3:99:90:10:30: 3e:cf:8c:c6:d4:4d:de:1c:e2:fa:62:c6:4a:81:55:4b: 1a:54:ff:fc:2e:24:c5:13:83:ca:ec:89:87:87:84:0c: af:f5:1e:c6:d3:a3:33:93:47:cc:77:3e:52:27:d7:e3: a5:63:65:d4:88:50:54:a0:cb:5e:a1:c0:b7:c3:25:be: af:30:37:52:6f:95:a2:a9:9b:53:41:de:cf:9f:0e:e1: 22:0f:68:9e:d3:34:3f:85:52:48:3e:51:cc:e1:13:dd: 56:30:97:56:96:58:f3:bf:fe:92:01:3a:64:28:86:be: 0c:63:d6:b2:27:13:bc:68:9e:70:8d:7c:0f:f4:b2:a3: ee:1a:d0:5a:ef:09:85:a5:c7:9e:ff:79:da:73:61:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:41:04:25:ed:a3:95:3a:c3:14:f3:1a:23:ec:22:7d: 39:fa:41:72:20:58:a5:44:9d:71:71:4d:a8:d6:f4:e6: ab:0c:fe:34:72:ca:12:61:1a:ce:cd:95:c8:9a:36:f7: 52:f6:af:8f:29:75:12:bd:de:8c:e5:d6:5e:64:9d:7d: f1:72:47:02:d0:3a:2c:a9:0b:03:7a:e6:9b:9c:fb:93: 9b:fa:76:c6:7b:c9:9a:db:0f:6a:bd:0a:fc:74:2b:46: 55:9b:76:6a:6d:43:d7:d5:6b:23:f1:6b:70:f1:5b:14: 96:3e:87:ec:28:79:2c:a8:1e:73:1c:33:ed:57:6d:82: ae:2c:55:fc:0b:b5:df:0c:e7:2f:bf:2a:f7:7d:fb:fb: f8:20:4e:c8:1e:aa:3d:16:bb:79:19:cf:04:ab:1b:9d: 13:2e:15:bd:e5:2f:20:d8:70:3e:64:bc:44:0e:5b:33: 36:d5:05:ed:d9:03:2b:e5:12:09:35:95:16:fa:6d:e2: 03:36:d5:82:e4:1b:fd:36:aa:2d:5a:da:d3:9c:be:11: 74:d2:f4:c3:96:fa:84:73:6f:63:40:31:8f:cc:31:d0: 46:77:02:bd:a2:0c:ad:c7:e6:5a:18:e2:c4:b8:3a:98: 9e:25:33:23:46:81:dc:d3:a8:4f:85:32:34:5b:fe:6d Fingerprint (SHA-256): 16:4E:DC:3D:89:40:D4:CF:C8:A5:26:50:B2:86:D4:C3:3C:7B:27:2F:0F:A2:C7:80:1B:0B:86:C3:21:61:63:C7 Fingerprint (SHA1): DB:06:F8:69:E2:EE:A4:9F:BF:BE:D1:2F:62:14:8A:04:89:55:B0:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221345 (0x131630a1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 20 22:21:04 2023 Not After : Mon Mar 20 22:21:04 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:02:43:b9:2c:d2:f2:90:c6:0a:0d:7d:32:94:7e:d2: c1:7d:2d:59:f3:c4:e1:26:4b:3a:4a:9f:e7:4d:87:0b: f1:67:ed:2f:ea:ed:4e:e5:cc:34:8b:c9:f1:be:5d:4f: 40:fa:53:71:d3:70:b2:b8:1e:33:27:50:7d:88:9e:28: 24:d0:f5:75:21:c2:a8:b2:58:b6:78:54:d3:4a:9b:98: 12:a8:4e:5a:e3:ef:3b:85:eb:07:0e:41:97:05:3d:0c: 8c:4f:cf:52:ce:70:20:51:ce:8d:82:50:00:a4:8d:05: 9c:04:b4:ce:39:3f:f3:16:15:0c:66:74:59:9b:a1:fb: d4:df:55:a6:97:84:02:12:4c:87:3e:2d:0e:5d:27:fb: ee:2b:91:69:90:5c:e0:34:71:99:84:81:76:17:88:6a: 17:49:3f:7c:21:2e:f7:f4:1a:7b:10:cb:57:f6:4f:39: 08:fd:4c:a1:ea:0b:1c:f2:68:34:97:60:4c:09:09:26: e4:c9:f4:db:8a:75:81:a8:35:cd:81:7e:76:0d:60:5f: 16:68:83:4b:16:c7:26:75:8d:97:cb:2b:6a:75:c5:81: 3a:33:b7:76:17:d8:37:ca:ca:87:cc:83:02:96:f7:4a: 78:33:e9:0b:3e:fc:b0:3c:51:81:e6:49:60:ca:2e:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:79:28:5d:a4:5e:ea:37:7c:78:eb:b2:d6:65:e0:25: fc:be:a9:f0:79:18:d4:31:4d:cf:c4:98:8b:58:54:3d: 5e:06:52:2f:87:4e:06:3b:aa:97:2a:bb:17:5a:cb:11: 13:51:f1:d0:fd:3d:b8:f9:69:e9:ff:a9:c1:61:5b:9e: 4a:17:46:73:a9:5a:fa:c0:99:8d:32:71:7c:c9:1b:82: fc:b2:8e:c1:c7:1d:dc:cf:5f:55:a6:28:77:3c:a7:4a: 75:66:05:e4:75:dc:3a:94:ba:9a:d6:45:58:2d:55:b4: b9:aa:dc:8c:62:c4:27:01:53:a5:68:33:b5:d1:27:56: 80:b4:9d:3e:17:37:f0:41:50:ae:0a:ca:4a:41:f1:8b: c2:5d:57:77:5b:1e:f5:fc:a1:ec:61:37:46:48:68:2b: 16:b7:f5:a2:3d:c9:51:35:01:15:94:41:b3:4c:f0:ac: ba:b0:0f:67:d5:94:a1:79:d2:a5:6a:39:2d:45:ec:0e: 4e:32:c9:ea:ad:16:f7:3f:55:e1:f4:eb:2a:fd:96:1a: af:c1:61:95:2b:59:0a:f3:c2:30:ce:02:57:aa:2a:18: a3:ec:16:3b:c2:de:f0:77:db:db:03:67:3c:7c:d9:6e: 98:b5:bf:84:ae:c3:69:fc:5c:37:dd:28:c9:aa:7c:a7 Fingerprint (SHA-256): C9:B8:9C:3A:A8:FE:70:6C:FB:B9:2B:D4:86:04:CE:E8:14:5C:E6:43:02:51:C7:6E:44:E9:EE:75:1C:8C:B0:53 Fingerprint (SHA1): 45:6C:FC:90:B6:71:47:5E:80:0B:AF:83:C2:AF:DC:C9:A7:28:1A:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221343 (0x1316309f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:21:01 2023 Not After : Mon Mar 20 22:21:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3b:3b:e5:8b:52:eb:01:c6:0b:a4:49:52:d2:9c:70: 25:25:3c:5a:ec:be:ce:35:23:ff:96:e3:8c:6e:13:8a: 0c:28:53:18:30:7a:d2:45:ab:35:ac:2d:27:c8:24:3a: cd:36:fe:0d:0f:04:53:4f:b5:dd:f9:2b:5e:38:76:67: 79:5e:02:1e:75:0c:48:c5:3d:11:ff:bf:f6:ac:67:54: 11:1d:11:df:ce:6a:b9:9f:f3:b0:44:95:65:35:5a:c2: 12:5f:64:dc:44:86:bc:eb:fb:e7:f8:a3:99:90:10:30: 3e:cf:8c:c6:d4:4d:de:1c:e2:fa:62:c6:4a:81:55:4b: 1a:54:ff:fc:2e:24:c5:13:83:ca:ec:89:87:87:84:0c: af:f5:1e:c6:d3:a3:33:93:47:cc:77:3e:52:27:d7:e3: a5:63:65:d4:88:50:54:a0:cb:5e:a1:c0:b7:c3:25:be: af:30:37:52:6f:95:a2:a9:9b:53:41:de:cf:9f:0e:e1: 22:0f:68:9e:d3:34:3f:85:52:48:3e:51:cc:e1:13:dd: 56:30:97:56:96:58:f3:bf:fe:92:01:3a:64:28:86:be: 0c:63:d6:b2:27:13:bc:68:9e:70:8d:7c:0f:f4:b2:a3: ee:1a:d0:5a:ef:09:85:a5:c7:9e:ff:79:da:73:61:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:41:04:25:ed:a3:95:3a:c3:14:f3:1a:23:ec:22:7d: 39:fa:41:72:20:58:a5:44:9d:71:71:4d:a8:d6:f4:e6: ab:0c:fe:34:72:ca:12:61:1a:ce:cd:95:c8:9a:36:f7: 52:f6:af:8f:29:75:12:bd:de:8c:e5:d6:5e:64:9d:7d: f1:72:47:02:d0:3a:2c:a9:0b:03:7a:e6:9b:9c:fb:93: 9b:fa:76:c6:7b:c9:9a:db:0f:6a:bd:0a:fc:74:2b:46: 55:9b:76:6a:6d:43:d7:d5:6b:23:f1:6b:70:f1:5b:14: 96:3e:87:ec:28:79:2c:a8:1e:73:1c:33:ed:57:6d:82: ae:2c:55:fc:0b:b5:df:0c:e7:2f:bf:2a:f7:7d:fb:fb: f8:20:4e:c8:1e:aa:3d:16:bb:79:19:cf:04:ab:1b:9d: 13:2e:15:bd:e5:2f:20:d8:70:3e:64:bc:44:0e:5b:33: 36:d5:05:ed:d9:03:2b:e5:12:09:35:95:16:fa:6d:e2: 03:36:d5:82:e4:1b:fd:36:aa:2d:5a:da:d3:9c:be:11: 74:d2:f4:c3:96:fa:84:73:6f:63:40:31:8f:cc:31:d0: 46:77:02:bd:a2:0c:ad:c7:e6:5a:18:e2:c4:b8:3a:98: 9e:25:33:23:46:81:dc:d3:a8:4f:85:32:34:5b:fe:6d Fingerprint (SHA-256): 16:4E:DC:3D:89:40:D4:CF:C8:A5:26:50:B2:86:D4:C3:3C:7B:27:2F:0F:A2:C7:80:1B:0B:86:C3:21:61:63:C7 Fingerprint (SHA1): DB:06:F8:69:E2:EE:A4:9F:BF:BE:D1:2F:62:14:8A:04:89:55:B0:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221347 (0x131630a3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 22:21:07 2023 Not After : Mon Mar 20 22:21:07 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:67:45:76:1a:ed:66:92:45:88:c2:76:9c:9c:8e:eb: 95:ef:bf:87:5c:14:1d:d3:a1:55:da:06:7c:e1:d3:58: 5e:c4:8f:73:ac:d7:e0:f0:56:af:85:28:cb:d1:d9:fa: 60:94:aa:5f:99:ad:2e:66:d0:7e:99:fe:2c:ba:e6:b4: af:5a:37:eb:b9:a7:90:e0:d0:1c:56:08:1a:f6:d6:1d: 90:ca:03:1e:c9:86:5c:6c:95:df:8e:81:93:c9:06:8b: 2a:0d:70:ac:31:85:f1:c6:24:80:82:21:14:e2:d3:db: 37:e8:43:9e:74:8d:23:5f:c9:58:d3:64:0d:4e:50:84: 7c:43:f1:d4:57:19:73:b6:8d:3d:b3:fa:28:92:17:6e: 3b:81:35:79:81:fb:1c:6e:f1:80:03:02:61:75:26:e8: 4c:81:b9:4c:44:b0:30:ed:47:d7:a1:e6:10:56:24:5c: f2:73:4d:33:2d:5b:75:10:f9:de:44:b5:10:44:b7:d6: db:39:1a:d2:33:ab:d6:db:6a:9c:15:05:2c:8f:6f:50: bb:aa:77:9e:ac:84:f6:cd:b7:57:02:ad:f2:23:2b:ca: fd:c0:87:1d:2b:39:14:5f:a8:da:4f:60:9e:f9:13:4f: 80:a5:a8:f5:53:9a:54:46:a4:8b:82:eb:49:1c:77:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:a2:97:27:ba:e7:2e:b0:c0:f1:7a:b5:6f:ea:ce:11: 6c:b4:10:27:e8:84:07:c7:fb:fa:d7:cd:fd:5a:8e:f7: 01:a9:1b:05:06:a1:e1:b8:60:9d:5f:4d:ef:23:58:4f: 4e:12:b6:ac:a5:b4:81:b0:0f:d6:fc:f3:8a:72:14:e8: 20:e4:b8:8b:fe:ee:c0:da:2a:94:12:c2:72:cd:e9:a2: d1:32:cc:53:7b:c3:29:d9:24:b2:41:72:6b:d1:4f:c9: 72:a5:67:4f:fa:e1:00:3a:f9:cd:c5:71:e7:1e:dd:c4: f1:49:18:38:90:00:62:68:7c:b8:da:17:5f:3e:27:62: 79:06:5b:cc:e5:f1:4d:26:c6:e6:12:65:1a:c2:23:70: 81:b1:da:80:25:81:cb:1f:b7:6f:af:87:50:1f:25:e1: b9:4b:f2:9c:d8:2c:c5:e9:8e:1a:c4:39:22:17:a8:e2: 46:dc:ce:44:07:f6:9f:8b:5d:eb:b4:69:ff:da:89:44: 9d:80:18:c7:ca:eb:71:e2:d2:c3:70:f9:bf:db:f5:52: 89:97:07:3c:74:68:50:8d:38:c4:8d:c2:31:da:08:0b: e9:9b:94:65:c5:7f:d3:97:a4:9b:56:d4:59:d1:d4:63: 07:21:97:f6:1f:2d:97:c3:21:b0:d7:49:a6:85:dd:95 Fingerprint (SHA-256): 3E:08:6E:DE:18:E2:49:17:B4:53:ED:CE:E5:6F:82:AF:43:49:12:20:B3:3D:43:D4:5F:E4:9B:87:B5:AB:B3:5F Fingerprint (SHA1): 93:A4:A6:C9:AA:4D:46:9D:D5:E2:BE:06:77:0A:83:2D:B6:76:49:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221343 (0x1316309f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 20 22:21:01 2023 Not After : Mon Mar 20 22:21:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3b:3b:e5:8b:52:eb:01:c6:0b:a4:49:52:d2:9c:70: 25:25:3c:5a:ec:be:ce:35:23:ff:96:e3:8c:6e:13:8a: 0c:28:53:18:30:7a:d2:45:ab:35:ac:2d:27:c8:24:3a: cd:36:fe:0d:0f:04:53:4f:b5:dd:f9:2b:5e:38:76:67: 79:5e:02:1e:75:0c:48:c5:3d:11:ff:bf:f6:ac:67:54: 11:1d:11:df:ce:6a:b9:9f:f3:b0:44:95:65:35:5a:c2: 12:5f:64:dc:44:86:bc:eb:fb:e7:f8:a3:99:90:10:30: 3e:cf:8c:c6:d4:4d:de:1c:e2:fa:62:c6:4a:81:55:4b: 1a:54:ff:fc:2e:24:c5:13:83:ca:ec:89:87:87:84:0c: af:f5:1e:c6:d3:a3:33:93:47:cc:77:3e:52:27:d7:e3: a5:63:65:d4:88:50:54:a0:cb:5e:a1:c0:b7:c3:25:be: af:30:37:52:6f:95:a2:a9:9b:53:41:de:cf:9f:0e:e1: 22:0f:68:9e:d3:34:3f:85:52:48:3e:51:cc:e1:13:dd: 56:30:97:56:96:58:f3:bf:fe:92:01:3a:64:28:86:be: 0c:63:d6:b2:27:13:bc:68:9e:70:8d:7c:0f:f4:b2:a3: ee:1a:d0:5a:ef:09:85:a5:c7:9e:ff:79:da:73:61:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:41:04:25:ed:a3:95:3a:c3:14:f3:1a:23:ec:22:7d: 39:fa:41:72:20:58:a5:44:9d:71:71:4d:a8:d6:f4:e6: ab:0c:fe:34:72:ca:12:61:1a:ce:cd:95:c8:9a:36:f7: 52:f6:af:8f:29:75:12:bd:de:8c:e5:d6:5e:64:9d:7d: f1:72:47:02:d0:3a:2c:a9:0b:03:7a:e6:9b:9c:fb:93: 9b:fa:76:c6:7b:c9:9a:db:0f:6a:bd:0a:fc:74:2b:46: 55:9b:76:6a:6d:43:d7:d5:6b:23:f1:6b:70:f1:5b:14: 96:3e:87:ec:28:79:2c:a8:1e:73:1c:33:ed:57:6d:82: ae:2c:55:fc:0b:b5:df:0c:e7:2f:bf:2a:f7:7d:fb:fb: f8:20:4e:c8:1e:aa:3d:16:bb:79:19:cf:04:ab:1b:9d: 13:2e:15:bd:e5:2f:20:d8:70:3e:64:bc:44:0e:5b:33: 36:d5:05:ed:d9:03:2b:e5:12:09:35:95:16:fa:6d:e2: 03:36:d5:82:e4:1b:fd:36:aa:2d:5a:da:d3:9c:be:11: 74:d2:f4:c3:96:fa:84:73:6f:63:40:31:8f:cc:31:d0: 46:77:02:bd:a2:0c:ad:c7:e6:5a:18:e2:c4:b8:3a:98: 9e:25:33:23:46:81:dc:d3:a8:4f:85:32:34:5b:fe:6d Fingerprint (SHA-256): 16:4E:DC:3D:89:40:D4:CF:C8:A5:26:50:B2:86:D4:C3:3C:7B:27:2F:0F:A2:C7:80:1B:0B:86:C3:21:61:63:C7 Fingerprint (SHA1): DB:06:F8:69:E2:EE:A4:9F:BF:BE:D1:2F:62:14:8A:04:89:55:B0:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 320221348 (0x131630a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Mar 20 22:21:09 2023 Not After : Mon Mar 20 22:21:09 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:d2:d2:1e:49:96:fe:d7:0d:3a:2c:c6:31:db:57:9b: 37:59:38:87:c3:39:52:09:d3:b3:39:a6:09:81:34:13: 99:51:16:88:01:9b:36:54:dd:44:16:72:b5:0b:e8:08: 1a:d1:b6:94:d7:e4:a5:17:6b:bf:fc:c1:f7:9e:1a:56: b8:89:79:07:3e:9c:89:86:f7:3a:f1:69:8b:f3:eb:02: fd:f9:9e:98:5e:57:6b:1e:fd:3d:83:7c:fc:93:cb:30: c3:f3:d2:80:09:5a:9b:e4:90:ec:c7:67:0b:1e:08:2d: 30:9d:aa:d1:e2:5e:f7:5d:34:fe:94:a0:38:f5:d2:93: 09:0f:4c:a5:7e:0b:66:79:4d:b2:bf:b6:55:90:f7:02: 50:69:c2:51:92:13:68:18:b2:ff:d2:6f:da:9e:8b:cd: c9:c1:46:98:59:ec:69:c3:a0:ae:98:8c:a0:83:16:e2: ac:ba:ef:eb:8a:34:5f:d8:1c:ef:6f:a6:4d:4f:d8:52: 21:15:1f:18:37:5b:e8:66:ab:f7:e5:18:b5:db:91:c5: 52:fb:1e:de:b5:d3:60:7f:0c:89:aa:f6:da:a5:7e:1e: 7a:5b:88:18:17:d4:0c:3f:fe:9d:91:56:d4:80:8f:a5: fd:c2:8b:e6:4b:9c:f4:f4:ae:8d:3b:43:4f:e2:ad:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:13:1b:4d:c8:24:ed:41:82:70:76:24:42:f1:03:91: 68:49:47:80:f1:eb:46:db:5d:1f:64:99:0e:99:06:3b: 22:b6:88:1e:d8:da:8b:de:ee:7f:c9:05:16:ff:50:76: d8:8f:d6:bb:9d:19:6c:54:40:56:d3:7e:74:6b:9f:d3: 48:3a:fc:d6:4b:b4:d3:7c:23:98:dc:d3:e2:67:70:d4: 97:1e:b6:30:c6:f8:8e:7c:b9:98:99:94:e2:0c:72:9c: 9f:20:9a:5e:7a:cf:11:99:e4:21:a5:10:bb:ce:70:6f: 0e:25:79:d8:78:2a:cf:6e:36:0b:09:c2:cf:ba:07:f3: ad:8e:02:27:da:93:bf:45:ba:38:5c:1d:06:1c:3d:8d: d6:c3:41:79:65:55:d7:5f:57:ad:eb:b1:07:19:1f:c3: 23:9f:3b:a8:83:61:68:e9:cc:4a:91:37:1a:d8:a5:c4: 8f:47:13:32:1c:58:97:75:57:fc:71:2f:01:50:61:47: d8:22:34:f2:28:3b:ea:07:bc:0a:3a:1a:89:23:9e:fb: cb:b2:d7:42:fa:76:d0:2d:98:22:6e:c3:72:24:fe:7f: c1:26:34:4e:5c:d1:e0:f7:f3:c1:74:44:02:c9:fc:1d: 64:9a:54:bc:bf:06:8b:59:d5:3a:4a:fc:12:a4:e3:61 Fingerprint (SHA-256): 09:EA:7B:AF:38:E6:6A:D2:AD:EB:AB:4A:38:14:81:1E:BF:37:17:B3:28:C6:AB:20:6F:E8:D4:96:F4:EE:A8:20 Fingerprint (SHA1): FA:64:91:BC:CA:56:38:3D:57:5D:60:DE:4B:B8:16:9F:A6:44:40:4A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 27976 at Mon Mar 20 22:21:20 UTC 2023 kill -USR1 27976 httpserv: normal termination httpserv -b -p 9897 2>/dev/null; httpserv with PID 27976 killed at Mon Mar 20 22:21:20 UTC 2023 TIMESTAMP chains END: Mon Mar 20 22:21:20 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Mon Mar 20 22:21:20 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Mon Mar 20 22:21:20 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Mon Mar 20 22:21:20 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Mon Mar 20 22:21:20 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Mon Mar 20 22:21:22 UTC 2023 TIMESTAMP ec END: Mon Mar 20 22:21:22 UTC 2023 ec.sh: Testing with non-threadsafe softoken =============================== Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 20 22:21:22 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #87: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #111: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 789604665093e8fd5fac07f11e6b1e62a80d5cd9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k c20b19780a919f927772a56dfae721d56a320d2d -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:a2:c7:3a:da:ed:fe:e8:9f:6a:36:6f:fa:19:0e:bf: 78:d7:56:ec:c6:02:5e:c3:3a:1e:58:fd:e7:43:2a:5e: a7:5c:16:15:0e:52:7c:96:d0:a6:bb:a5:3a:46:8a:9c: c7:17:30:3f:68:fe:46:3b:26:a3:38:95:1e:bd:cb:c3: 21:4f:94:3d:ea:c5:38:cc:3e:32:6a:0a:e9:61:49:dd: 16:04:a3:23:12:1b:5f:1c:ce:99:df:78:73:77:a9:f9: 17:bb:36:6a:29:b3:75:4d:cb:bd:25:a6:6e:65:d1:1f: d3:e1:60:c4:24:44:20:7d:8e:03:eb:e3:60:5d:80:b9: df:f6:a8:73:bf:2a:e7:38:4f:21:36:f0:9e:6a:25:49: 7c:18:71:50:b8:6c:9f:02:7a:26:e6:74:b3:63:b6:16: 46:42:2d:7f:67:56:c5:4e:ec:00:e1:8d:5f:9a:0c:d3: 69:fc:1f:bb:66:c3:27:c4:14:71:92:1f:88:35:0a:e5: 87:8c:81:c8:fa:a7:d4:98:a6:be:5a:f0:46:b7:6b:a1: eb:c0:ab:b9:05:a0:cc:25:c8:fc:2c:f8:30:3b:98:64: 1a:c3:18:6a:4b:bc:e0:58:5e:39:d6:2d:3b:7c:16:32: 28:c4:e0:ea:7a:3f:5f:02:7c:cb:38:88:60:d8:da:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e1:bc:16:4f:3b:f4:dc:ed:30:c6:b0:f1:e6:3c:32: cb:30:29:5d:3e:31:62:be:ab:e5:93:9f:a7:21:6f:27: 36:f3:57:ed:04:25:bf:98:30:a9:81:d8:26:f1:75:24: 5b:11:5e:33:6b:f7:cc:61:66:12:8d:1f:f2:30:a6:c0: c6:37:00:37:d1:b1:4f:cd:f5:10:99:2d:8a:b4:89:21: 2c:1e:fb:0d:33:d9:d4:76:45:32:8e:20:35:15:82:b0: 45:80:1c:0a:bb:82:b2:b6:97:05:30:24:df:06:5d:be: f9:a0:b0:35:e5:dc:6f:3a:19:93:fd:32:45:7f:b2:d9: 10:1f:d4:e0:f8:ee:13:44:18:0f:77:3e:5f:a5:57:03: fa:e5:9b:dc:05:37:cb:be:d3:e6:e2:f4:a5:0a:ed:3d: da:1f:35:d6:39:e6:d0:bf:73:6c:8f:e8:58:15:8d:39: d4:ab:bb:90:8e:e4:eb:09:29:2c:d8:e8:89:c5:4c:ba: 7f:5f:ed:c2:3f:c5:d2:4c:56:8e:d0:68:13:f1:f1:cd: b9:7c:a5:aa:c9:5f:65:b6:8d:f5:30:86:f4:74:50:4d: 11:7d:e9:b3:d8:73:4f:33:1b:b4:b3:09:b1:67:0a:a6: a7:42:01:c5:b4:df:fb:ec:8a:a6:54:d5:c3:c0:6b:cf Fingerprint (SHA-256): F3:F7:46:18:FA:58:25:44:C1:71:F9:28:BC:C0:20:95:96:D6:21:BE:FA:0F:F6:26:6C:7D:6B:60:0D:FC:08:3C Fingerprint (SHA1): 6A:A0:2C:2E:96:C8:38:F6:DA:60:93:95:78:70:53:75:1A:67:3A:D1 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:6c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:06 2023 Not After : Tue Jun 20 22:22:06 2023 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:fd:ef:6d:56:c9:20:47:7a:24:30:51:95:79:28:a5: e5:e8:67:a1:83:b0:79:3e:ac:8e:46:37:25:d2:db:32: 32:69:d9:d1:ae:25:04:a1:56:71:3b:35:f6:d6:1f:c5: 45:07:30:66:03:bc:c0:eb:b5:42:5a:67:56:a3:1f:0b: 50:00:04:33:bd:2e:09:86:6b:50:ca:56:38:93:c2:1a: 6c:79:8f:c5:8e:83:30:bf:da:53:c9:22:6a:36:fc:14: e6:ad:6e:d2:00:1e:24:fa:7d:4d:ca:2d:76:f9:98:7b: 34:8a:1e:0f:c5:58:93:69:b7:6c:c1:8a:70:f2:6d:83: 22:72:69:25:0c:1d:cd:d8:d2:0d:99:c3:32:94:91:f3: 04:92:cd:2a:3f:22:80:4e:fb:34:70:54:03:0d:24:23: 31:56:d1:ff:bc:1e:fb:8d:b4:d8:35:38:31:a2:92:ad: 6e:d5:e2:89:08:0e:48:17:bd:a4:9a:27:7c:a3:f3:97: 54:d5:f1:6c:f7:b6:3b:3a:5c:50:2a:e3:ad:18:b1:82: d6:e6:ff:5f:94:f6:98:0f:b4:d3:a2:a8:2f:9a:75:7c: b5:ef:0e:1c:ad:f9:3f:57:41:88:ad:83:eb:37:d2:80: ef:de:12:82:d2:fa:2c:0b:41:b8:7f:ab:e5:eb:96:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cc:29:eb:c6:70:f5:36:56:36:81:20:a5:af:e2:0f:1d: 35:7c:88:1f:d8:8c:d6:6c:4a:41:41:e8:07:0a:f1:f9: 8d:59:cc:46:c1:d3:40:d8:23:92:95:17:a4:6a:0c:14: 5b:ca:85:89:97:79:95:67:1f:99:b0:fe:69:34:17:2f: ea:f4:4c:2d:3d:e9:9b:f1:7d:b4:38:9c:03:ca:19:d9: 3d:16:ca:85:ff:3a:79:00:9a:04:fb:bc:84:f8:a3:5c: c5:2d:c4:11:57:32:d2:be:f0:67:94:9f:6a:8f:40:f6: 60:97:f4:c3:10:4a:6e:bd:c8:ae:6e:9a:76:33:3b:a7: e7:bc:bb:3a:97:f5:e1:f8:7b:d8:8a:d1:f3:2d:5e:bc: a7:14:96:a9:f8:d3:59:e3:ec:55:e4:6c:e5:85:a7:79: db:15:c5:82:ea:07:30:90:46:eb:cc:da:8c:4e:c7:09: ea:51:3c:fc:cf:e5:4f:70:39:38:dd:c7:c5:d3:b2:f4: 50:e5:ff:cb:4a:22:b0:e9:f9:10:96:7d:11:21:a0:16: ce:73:5e:3e:4a:c3:05:d2:78:b2:9f:87:1f:d2:1a:ea: 6d:d4:e6:f7:be:d0:0d:44:74:a9:93:cc:7c:ef:49:57: fc:1a:e0:a8:27:37:54:f0:38:b8:85:05:dd:e1:56:d4 Fingerprint (SHA-256): 1D:C7:2E:A5:1B:F7:AF:C8:80:21:CD:54:83:90:CE:4F:FB:2C:5C:12:BB:2C:7C:49:CB:BC:11:26:F5:66:D1:AB Fingerprint (SHA1): AF:CB:AB:A9:77:05:3E:DB:E5:D5:72:62:B9:2C:30:54:89:45:43:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:6d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:06 2023 Not After : Tue Jun 20 22:22:06 2023 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:32:7f:1e:1f:e7:28:c0:e3:d7:51:ed:32:9b:86:07: 04:f9:7e:6b:30:32:62:73:9a:95:3e:b6:99:d4:38:49: 42:47:5c:26:42:ca:f3:3f:23:5c:14:01:db:b7:47:af: c0:41:b6:65:d6:2a:a2:4c:9e:83:73:fd:b5:0f:74:04: b4:f1:54:08:4d:3e:b3:92:88:f3:07:24:0d:eb:f0:f4: 2f:3c:c2:f2:34:a8:b2:95:b9:f2:49:0b:4d:a5:0e:5a: 14:32:db:e1:6a:39:d8:e1:68:18:e3:94:b9:37:66:25: bc:d7:4b:83:1b:ed:72:73:eb:65:a6:29:89:b1:3e:c6: 04:e9:90:75:b0:31:a5:dc:3f:12:45:88:03:e6:3f:c8: 4d:11:0f:26:df:83:5f:34:d1:26:83:6b:6f:5f:95:0d: 2e:f9:4a:d4:db:78:75:5e:13:d5:cb:98:b1:9e:f1:ea: 46:0c:6f:a5:63:0d:dc:c5:9e:48:1d:35:fb:6a:52:b3: 57:02:05:cf:0c:33:2b:7c:65:0e:02:14:56:5b:30:39: b1:38:c0:a3:7b:bb:5b:24:d1:c9:aa:f7:46:26:48:f1: ac:ad:f2:0a:9d:0e:63:35:8f:71:da:cb:ec:61:74:c7: 10:05:4c:5b:c6:fe:ff:45:67:f9:d4:a7:cc:5b:0c:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:e4:dc:0b:96:df:d3:f2:56:03:72:1d:9f:ae:c1:8e: 3c:a4:ac:59:e9:90:51:55:06:88:08:15:fa:e5:d3:4d: a1:24:19:08:51:90:84:a5:88:6c:b6:fc:2e:83:06:a4: 5c:7b:a8:ce:85:29:8d:6d:84:1a:d7:ec:0d:d5:00:f4: ed:4d:56:a7:ce:ca:10:50:63:85:76:58:92:dd:28:0c: 44:1f:ec:88:b6:95:5b:58:03:9c:da:68:8b:6a:b5:eb: 65:0c:e7:6b:d7:f4:ef:5f:ca:ce:f7:da:34:41:e3:9a: f5:b5:79:13:0b:26:cb:ee:2b:8c:c8:14:90:df:90:36: be:a7:0d:ed:33:67:a2:10:af:9e:11:43:bb:fe:d0:7d: 54:04:9e:2b:ed:a6:61:81:e3:20:7a:b1:e1:13:85:81: ba:d2:bd:6f:6d:f1:7e:e2:8a:30:59:da:61:5b:2f:69: 9f:dd:5e:dd:48:99:75:e3:c6:d8:dd:e4:6d:ba:27:14: 1b:22:ff:b6:a3:d1:9a:38:94:9a:17:6d:09:60:bf:5b: 72:3a:41:9b:98:11:a4:0b:66:e4:b7:08:72:c5:a8:7a: 9a:2b:c7:26:d2:22:2c:c7:91:39:11:f0:66:56:ba:0b: 39:1b:e9:2a:d6:6f:9d:a7:4e:5b:a7:8d:9e:08:e3:b6 Fingerprint (SHA-256): 8C:24:BD:F4:16:C2:94:0B:39:79:1B:9A:F8:7A:A7:7A:7E:A0:19:D6:19:08:CE:BD:BE:34:CD:B9:6A:2D:ED:87 Fingerprint (SHA1): 76:BF:DE:5C:B4:0B:19:FE:67:2E:80:80:0D:EB:70:25:38:98:59:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:6e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:07 2023 Not After : Tue Jun 20 22:22:07 2023 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:59:55:d9:8c:42:10:11:76:3d:d3:43:25:df:d3:b2: 15:a8:6d:ea:a9:26:41:3a:18:58:72:a2:ef:f7:80:fc: 24:2c:b4:68:61:21:81:11:9d:3c:73:a2:e6:eb:ce:fd: be:4f:2b:16:0a:96:fd:01:0f:78:1d:9e:03:6c:48:11: c4:f6:3a:bb:7c:ba:44:c2:38:27:0d:b7:04:b2:31:7d: 1c:a1:9c:5f:a9:6c:81:d9:07:c5:86:19:8f:39:2a:97: 9a:eb:08:72:88:db:7a:ac:2a:55:2f:f8:39:01:e8:7b: 7e:ea:87:aa:f4:3d:58:e7:2a:4a:f4:68:99:71:1b:0e: 83:2f:0a:5d:8e:42:e5:2f:71:10:b5:4e:f5:aa:a0:b5: 48:ba:e2:87:54:74:23:82:f4:5d:bd:95:37:93:e8:1d: a6:be:8b:01:77:9d:fe:66:a2:15:56:d9:f9:90:29:1e: 2d:5b:24:97:93:be:a8:56:e1:2c:f7:ad:05:45:a4:44: e0:47:5f:f3:06:13:46:41:90:15:fd:e0:6f:78:71:0d: c5:e4:11:04:50:6d:db:85:cf:d9:08:68:f7:f2:bd:9c: 95:12:b1:f4:7f:88:81:e7:de:93:53:89:58:d9:88:0a: 4b:75:18:05:51:f4:65:ef:bb:ce:52:f7:8c:2c:39:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:16:63:b2:b7:36:13:ad:78:61:a5:89:bd:7b:10:42: db:50:83:a2:7f:cb:bc:fc:9b:e3:fd:9c:d3:f5:62:ca: 49:f7:10:58:86:28:0d:ee:01:0f:ec:61:a9:a5:33:eb: c5:35:ff:2b:81:94:24:aa:25:11:5b:59:9c:e7:41:67: e0:e6:fe:40:f5:fa:a5:50:4f:c3:da:17:89:b5:61:55: e5:ec:e5:fc:bc:d2:cf:93:36:22:c6:70:68:ba:66:9a: 13:a1:d5:0e:77:c5:33:26:f2:ae:e8:a3:f6:09:86:6a: 00:d4:9b:76:e3:be:5f:60:07:ed:90:a0:01:35:1a:07: 6d:4a:64:a8:11:cf:4b:ed:7f:ba:76:a8:49:38:b7:f1: fe:e8:fd:69:6a:55:f5:05:fc:70:a2:24:a2:25:d1:b6: 6b:8e:77:24:df:d9:d3:6c:68:35:9c:a4:8b:fc:1b:1d: 35:8d:6a:a5:e9:bb:2a:21:a0:e8:d0:13:1a:31:f3:ca: e0:12:62:90:aa:ff:c7:6c:d6:e1:9e:1e:ec:92:90:5d: 8f:f7:3b:98:4c:2b:75:86:ae:66:ca:e2:22:23:7f:22: 8e:04:16:95:51:13:33:20:ae:9f:db:5e:29:3c:0e:40: 28:f8:d2:fd:65:00:54:87:93:d8:b0:ea:c0:21:bf:2a Fingerprint (SHA-256): 45:1D:9F:8B:BD:FD:60:F8:AF:9B:AD:45:A0:46:79:7D:32:39:FF:6A:AC:0A:D5:60:CA:66:AD:1F:A9:E5:5D:D1 Fingerprint (SHA1): 57:40:7E:53:17:00:4F:45:87:D1:E8:68:8C:FF:2D:90:14:42:D8:1D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:6f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:08 2023 Not After : Tue Jun 20 22:22:08 2023 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:50:60:f5:c3:fb:29:fe:16:27:a2:cd:da:c1:e8:77: 4a:d6:de:86:79:b1:6f:43:7b:6f:d2:54:0f:53:bf:27: 40:7d:25:7b:10:f1:e5:d3:0d:cb:70:3a:8f:36:c8:25: fa:2a:ed:19:34:00:0f:69:98:98:4c:f1:9e:4f:c7:ec: 70:b7:a0:83:70:4d:26:32:0f:b0:8c:20:d2:48:1e:59: 17:27:3a:23:05:eb:fa:10:10:0a:df:00:14:7b:ce:94: a1:22:45:44:6e:5d:b5:43:0b:1c:90:e2:5c:cd:8c:30: 0a:d7:e6:18:69:24:fc:6a:e2:a0:a7:84:fa:37:a7:db: 0e:b6:a9:1f:97:d2:2b:5f:16:b2:bd:e0:e5:c7:a5:8f: 29:74:11:e1:b1:b4:86:b5:a3:b6:2b:d4:cb:f7:fc:57: 89:c6:95:0b:47:14:ea:cb:d0:84:1c:13:a7:cd:6d:ff: 22:e1:03:bf:a6:10:4a:03:9e:be:95:7b:a1:07:ad:68: 70:5e:b8:08:03:65:23:e8:31:6d:30:8f:a8:c4:a1:59: c3:97:41:ce:34:28:4f:f4:8b:2c:93:4b:e7:b7:88:6f: de:72:d5:51:3b:42:69:6b:1a:43:60:2c:ca:3a:4f:10: d3:5c:6e:4b:7e:dd:1a:09:9e:b3:a9:42:4c:53:e8:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:e4:50:8f:05:ca:6d:97:41:53:59:46:4d:fb:ff:1b: 1d:00:74:3d:37:f4:d3:e9:11:fa:1c:9b:74:a9:2f:49: 6c:7d:92:28:c1:6b:19:c8:ee:52:88:6e:bf:8b:b2:e6: 7e:6d:b9:30:b9:5b:db:2f:2c:8c:a1:09:8c:5f:68:80: 1b:9b:a5:07:c8:f0:f2:f5:25:e6:e9:69:c4:11:92:79: 22:9a:a2:85:fc:77:08:b5:3d:13:34:01:ba:3a:28:f4: 2d:e3:cf:14:15:1f:ae:03:38:26:f7:66:7a:bd:a1:f2: 03:e5:96:40:f0:c8:65:de:59:68:22:44:a9:a7:a1:1f: cc:ae:6d:f5:27:4b:b6:89:6f:06:3a:2c:c2:74:51:b9: f2:2d:6d:21:4c:09:16:de:0c:47:ba:8a:82:c5:71:80: dd:34:db:86:c0:c0:a2:80:dc:05:e7:05:e5:04:fb:f1: 62:af:4b:2f:9f:ef:ed:23:c9:08:2f:0e:fa:5d:1a:fa: 6f:b0:75:0f:56:08:e8:ba:a1:5d:5b:b9:a0:ba:83:1a: f0:be:a0:96:d1:3e:f8:ac:5e:4a:8b:47:bf:18:b0:aa: 89:bf:e3:af:88:8e:e3:16:39:c1:5a:46:d7:85:7d:d9: 62:2e:09:ce:e8:15:33:6a:d1:f3:d7:af:ae:b5:ed:b2 Fingerprint (SHA-256): A5:2E:7B:54:36:E8:3D:00:57:2B:A9:BB:FE:D8:F6:99:9F:26:F0:FA:58:B4:8C:93:54:0A:0C:98:B8:B2:B2:FC Fingerprint (SHA1): E5:40:DA:CC:4D:CC:59:4A:2C:19:4E:AF:3C:DF:A3:A6:69:C7:7F:E4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:71 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:08 2023 Not After : Tue Jun 20 22:22:08 2023 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:fc:bc:92:73:37:6f:e5:37:c2:f4:5e:d8:aa:a8:dc: 29:a5:8e:85:04:81:a0:12:4e:0c:49:e3:cb:ba:1a:be: 50:b0:26:d7:c0:82:a6:82:f8:8e:7d:bf:0a:36:55:45: 1c:8f:7d:04:90:d8:c2:8f:21:7a:be:17:04:1a:c3:21: 84:09:89:56:fd:1d:4a:f7:8a:51:63:43:a5:20:a7:9e: 8a:1f:25:9c:42:0f:4a:80:af:83:ba:d7:b7:84:a0:84: d3:56:52:d0:21:fb:38:ae:77:b4:41:c0:fa:98:31:8a: a9:92:3f:d3:c7:c2:9b:34:7f:9e:e6:b8:67:40:3d:17: 34:d3:3f:04:21:5e:72:40:3e:1d:18:2d:c9:a8:f4:84: e2:dd:bf:fa:a6:71:f3:4b:73:56:2a:bc:a9:db:9d:6a: cc:93:6a:38:1a:e3:b2:3a:5f:6e:c0:f7:e7:1e:f0:dd: ce:d6:41:f6:bd:25:23:0b:0c:0d:95:bf:2c:80:c5:10: 71:cd:1a:15:3f:f4:42:6e:3a:da:19:b8:9c:26:7d:0a: c5:6b:42:4b:92:63:48:90:d7:31:f9:25:c4:20:79:ab: a0:15:89:0b:6f:98:34:85:8c:22:6a:a4:7d:53:02:23: 8e:62:be:f6:8c:d9:13:e1:65:99:30:e5:83:b1:7e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:d5:51:a0:c4:4b:6e:e3:13:bd:81:7e:7c:83:40:6a: b8:c0:31:f9:02:fe:a3:41:47:66:98:50:aa:6b:4d:f6: 00:38:5f:95:2d:4f:a2:78:91:9f:cd:17:db:51:4a:e4: cb:9b:22:ec:82:4e:4d:a1:99:d1:73:55:e0:89:a7:f4: f8:5e:12:89:8d:77:93:05:63:8c:c2:82:12:73:05:72: b2:2a:a3:6b:b8:6f:0f:7f:f6:85:3b:66:8c:49:7c:8b: 9f:03:bb:fc:e3:a7:d8:10:83:8e:df:a3:4a:c3:26:31: 80:00:2e:55:35:3a:ba:e9:f9:63:5d:d6:8d:74:c1:c5: 63:1f:62:b6:a1:53:e4:d7:40:33:97:1e:d6:1d:58:c2: cd:54:3c:e9:00:b4:73:fb:18:c6:ac:99:3f:14:69:a4: 67:97:4e:a5:9c:95:51:74:f6:cc:c8:29:76:a5:d2:1a: b3:f5:02:51:32:57:51:f3:f6:d5:ec:aa:88:7d:36:ff: 28:0d:34:6b:f1:bc:e4:84:0c:c7:a1:ee:3b:10:9f:ee: 6d:ca:39:c6:2c:1f:b0:c3:f1:1b:c0:3a:ac:bb:88:1e: 07:91:18:7c:ee:f2:9b:1f:38:f7:95:83:4f:a8:8e:08: 6a:ce:54:aa:f6:f8:f5:10:a3:9c:c2:85:69:fc:06:d5 Fingerprint (SHA-256): 18:19:90:45:51:DB:DF:88:62:00:E7:AD:D3:6E:F5:67:02:32:B1:2D:2F:BF:EC:71:62:2B:00:E3:BD:1C:01:9E Fingerprint (SHA1): 93:C8:93:2B:2E:D7:BE:C6:B6:70:4F:5C:28:CC:7F:64:F2:22:45:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:72 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:09 2023 Not After : Tue Jun 20 22:22:09 2023 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:aa:49:e7:d2:6c:45:8c:73:b9:83:c0:51:91:c8:f0: 94:ac:f6:d1:4c:3b:3f:6b:9a:37:22:64:4c:98:bf:6d: 58:23:f8:77:25:13:77:05:40:b9:d8:7c:20:70:6d:3f: 41:f7:49:dc:c0:aa:33:f4:0a:8d:73:93:df:c5:a8:25: 0f:64:6d:d4:98:e5:49:86:55:1c:56:73:8e:41:94:1f: 19:f2:6c:6c:6f:fe:00:39:8d:d2:3a:f0:7d:af:05:77: 22:26:19:fb:bf:d9:15:9e:1b:8f:53:c5:73:41:c2:a0: 29:10:55:fb:4b:6f:6f:bf:fa:95:f6:6b:58:f8:ab:46: 6a:82:00:48:d6:d2:4b:5f:ad:40:fe:1a:10:3e:60:03: f6:ed:a9:3f:96:a2:11:d4:33:1b:39:83:65:af:a1:a7: b6:ff:c6:00:f3:2f:5d:d1:1d:e9:a1:9f:bb:99:a2:eb: d3:9d:08:56:f9:d0:d7:91:00:b3:3d:df:14:06:aa:d6: 39:ed:7d:04:4e:0c:f6:4f:25:c9:a2:17:a2:f3:7a:8c: 28:e9:c4:50:86:e8:3d:35:df:fc:61:63:87:a9:b5:78: 42:53:6d:f3:07:81:b1:47:cc:1e:9d:78:bc:d0:75:70: e4:4a:f7:e9:66:4a:cb:01:11:9d:6d:c9:92:b7:01:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:59:2f:ca:e7:7b:02:a8:fa:27:62:a6:b6:22:dd:bd: 4a:71:ae:ca:81:a6:04:40:8e:d6:1a:d8:bd:38:9c:c2: 4f:32:da:e2:6b:04:66:73:df:db:34:31:ff:6f:b8:89: 99:d4:d5:66:72:79:bb:ff:cd:ac:c2:64:07:1d:65:8e: e6:56:28:73:ba:9e:75:06:1f:ad:8a:f5:db:e9:c6:1e: 21:3e:df:e8:3c:ed:6f:d2:63:e6:c5:6e:60:d1:3f:c8: df:7e:02:4f:87:c2:ce:9e:cf:36:73:bc:89:a6:81:7f: bb:5a:2c:3f:98:63:9b:b0:5f:07:28:fd:ef:f0:f9:bb: de:14:5d:fb:c4:31:e7:37:ce:f6:27:6f:57:54:1d:ac: 8c:1d:8a:16:5e:58:06:cd:15:57:fd:ec:8d:04:d6:69: 3c:a9:52:25:8d:de:a1:66:f4:7d:87:56:1b:f3:17:32: 4f:a2:d8:95:cd:e1:e1:af:43:c1:21:f7:dd:e6:c6:75: 8a:66:d5:95:c1:3d:b5:50:45:79:31:57:e2:4c:06:02: 43:f5:e0:e6:ba:69:f7:64:c6:c9:63:0c:1a:f8:89:65: 3b:0c:02:5e:0b:a5:c0:67:64:1f:11:ac:7f:5f:51:36: c4:08:00:00:de:0b:aa:ce:60:a8:58:5e:ae:78:39:ea Fingerprint (SHA-256): 1C:FE:7A:96:8D:F6:44:D4:CC:B3:0F:8A:6D:D5:31:1A:27:57:37:11:62:ED:0B:B8:33:40:D8:F9:52:FF:D7:C8 Fingerprint (SHA1): CE:9E:7D:F8:1E:CF:F5:7E:5C:F9:F9:FD:D7:FC:0D:77:51:AF:D7:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:73 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:09 2023 Not After : Tue Jun 20 22:22:09 2023 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:a3:c4:e0:fc:0a:03:23:16:67:e8:31:d0:c5:0a:b1: 17:98:a7:9d:01:69:fc:c9:6a:81:4e:fc:47:b9:d5:1a: aa:be:6c:87:ca:fe:36:5b:5f:f8:d9:db:ea:68:6f:59: 42:8f:53:d7:00:49:db:2f:40:ca:c6:10:93:44:7a:d5: dc:cb:38:ff:aa:74:a9:87:7a:b0:12:51:5d:31:72:0f: 98:d8:8d:26:f0:3d:1f:f5:f8:c9:15:52:7f:0b:95:83: 4e:0a:e3:26:e9:0b:9f:d9:15:fb:f6:03:39:9f:32:ba: fa:8d:5d:21:72:e5:7e:01:79:f9:40:5b:89:6e:d8:d9: 31:f0:ea:6a:cf:7d:83:04:fc:45:c4:e6:d0:b0:2b:bb: 17:21:16:45:6d:2b:b3:19:82:c2:79:9c:03:cd:39:6f: 09:19:22:78:e3:7a:29:40:0e:94:69:c7:1f:4d:97:37: 7c:36:fb:d9:a6:d8:f1:99:05:f2:c8:4a:8b:70:7f:81: cb:93:0e:5b:13:b7:39:71:13:30:c0:6f:43:39:2b:18: f6:1b:75:b0:77:c4:95:3f:72:1d:ef:31:cd:ea:ed:ca: 07:9e:72:09:f7:2a:01:0f:1c:08:a2:b4:12:18:39:1b: 6b:dc:82:f2:9e:cf:5c:4a:fe:54:a3:f7:2e:4d:11:8d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c2:96:0e:6f:49:45:5a:bf:8f:c9:3b:e5:cb:85:b3: 59:dd:17:6a:3f:50:db:28:73:8c:c4:bd:f3:50:57:d8: 1f:37:3a:0a:af:b4:b4:7c:1e:fb:5c:ef:94:9a:ca:b6: 50:ff:0a:3f:5e:44:c6:0c:dd:52:f7:f4:23:49:e8:64: 20:cd:aa:7c:ba:3f:21:bb:84:50:cd:d4:9f:fb:53:02: a0:b5:4e:c4:0b:19:1c:75:1a:0e:65:d4:4b:5a:e1:77: 5c:a5:50:cc:ee:37:f9:f6:5d:92:3c:0b:f5:37:26:0e: 6e:5b:8a:b3:21:a9:21:26:2d:85:ad:62:f8:80:47:ba: bd:2d:e7:8c:0d:0f:fa:f2:84:32:39:95:5c:84:b8:a7: bf:90:19:35:c7:f6:5b:4f:b1:35:cc:2d:b0:f0:d3:85: 15:4b:4c:4e:d9:d5:21:8e:49:12:82:f0:8d:60:ba:c5: 80:09:84:93:5e:3b:58:b4:13:da:c4:c2:1e:06:01:cd: 68:d8:70:ae:db:25:50:02:63:13:55:aa:be:15:9b:9c: 6c:f7:e2:ab:22:2f:17:41:4a:86:48:ea:41:d7:ad:93: 00:15:d6:7e:4a:02:6b:55:d6:51:5d:13:dd:7d:f9:33: 7f:1b:cb:f1:c9:d8:84:85:cd:35:57:0f:d7:de:72:73 Fingerprint (SHA-256): A9:B4:B8:4D:30:FB:AB:2F:02:9B:5F:1D:31:EA:26:19:A5:A8:85:5E:FC:93:0A:E4:29:74:96:C7:92:B6:89:D7 Fingerprint (SHA1): FC:9E:5F:CC:F4:1F:F1:9D:06:0E:B4:F0:B2:63:8A:98:62:B7:DA:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:74 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:10 2023 Not After : Tue Jun 20 22:22:10 2023 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:e6:6f:f9:af:88:80:38:31:85:8b:22:82:a9:97:31: 98:35:02:de:67:00:c8:46:b7:12:86:09:b6:28:f3:98: 30:bd:bc:0d:37:94:29:7b:ea:52:04:df:5a:35:5c:d2: 75:75:c6:fd:6d:94:8b:7a:c2:6b:cc:39:5d:eb:22:f9: 90:52:4b:a4:61:9c:29:27:3a:7e:e2:b3:b2:ff:a3:fc: 6f:84:f1:2d:9b:cb:c9:30:ea:68:97:20:02:89:8a:17: 73:69:13:8b:05:d7:21:d5:dc:63:58:72:d3:de:83:13: 93:5b:f2:28:f9:3c:dc:69:db:a0:af:06:b7:22:d9:b3: a6:ae:83:f2:33:05:db:50:e3:db:61:ca:d5:f8:13:57: 58:6a:fd:0e:28:28:20:14:70:d3:18:5a:8d:ac:1c:3a: 53:0b:6d:1b:75:c9:d1:43:93:53:a0:60:6a:5f:82:e8: a1:45:50:76:e4:6f:a0:87:88:a6:54:c0:21:7f:fb:2a: d2:cd:e5:fc:89:89:f6:75:dd:f3:8e:8c:e1:a8:ff:2f: eb:ec:d5:58:23:42:c2:c6:5e:45:18:10:76:55:80:f6: 07:8c:44:9f:d2:1d:32:7e:76:11:09:17:49:f1:89:5e: 20:e8:ff:44:84:ed:5b:36:79:9c:c4:91:6c:eb:6e:db Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:d7:be:33:af:7d:4c:83:3e:8d:f4:34:7f:a3:a9:90: b1:f4:73:44:8e:28:d4:de:bd:55:28:44:2c:e7:ea:6f: 25:a4:3a:aa:a3:11:27:ee:b1:eb:8c:44:23:78:ba:8a: b5:32:9f:c6:5f:ef:2e:e0:4e:f0:d3:0a:3e:9a:42:95: d2:ad:08:f0:53:93:b8:06:b8:20:58:7b:e6:8d:73:a0: 7b:f5:bf:b5:bf:a9:10:fc:c3:6a:53:c9:b0:1c:e7:71: 60:5e:90:25:36:3a:57:99:bd:2c:26:61:ff:e0:bc:98: 29:1b:b3:2a:3d:17:27:68:99:81:e4:37:0e:fa:25:4b: ea:d1:c9:f8:e5:49:32:02:f2:38:a9:e3:5d:a1:03:f5: f0:7d:05:89:80:30:96:12:e6:25:fd:f2:e6:2e:e1:2b: a0:e6:c9:38:5e:d3:b3:90:db:45:ac:81:00:de:80:70: 77:63:2d:2f:28:1b:44:d0:21:ef:e7:6b:8d:ae:70:09: ae:7e:7f:f9:21:3f:f8:a3:2c:1c:06:0c:a3:fa:49:28: e9:5c:99:a4:2a:fa:d0:7a:1c:20:d8:84:56:55:0b:66: 45:dd:e6:72:4d:e1:4b:10:95:92:ea:e4:0f:54:a4:41: f3:5e:b9:0e:e4:ba:f2:6d:d8:41:cf:99:e9:57:76:66 Fingerprint (SHA-256): 7E:9D:9E:AF:79:8C:71:90:1A:D2:D9:D2:75:31:8E:04:FB:E0:AD:B2:7C:63:DA:FA:F5:10:E5:D5:09:51:68:8B Fingerprint (SHA1): 54:14:E4:14:BA:4B:E2:08:73:A5:95:FF:DB:85:43:23:42:6E:78:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:75 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:11 2023 Not After : Tue Jun 20 22:22:11 2023 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:db:57:1d:2b:9e:eb:dd:0f:0b:49:a1:2a:b2:90:2b: 34:15:0d:ad:12:5a:ae:b4:b7:66:93:1f:41:41:73:73: 9e:ac:59:ba:94:77:8e:64:7c:bd:36:8b:62:1a:d4:1e: 98:cc:7a:5a:15:1a:20:15:a6:0c:0f:93:4a:48:71:ad: d0:8f:ab:b4:a7:e9:df:f3:64:ce:6c:83:0c:00:d5:da: 77:17:7f:ae:28:6d:98:ef:c8:fc:a1:1d:83:19:ee:5f: 16:23:02:62:e9:e1:a5:b5:c8:db:8f:2f:3a:d5:45:06: 9f:92:12:75:3c:f5:ea:ae:f1:99:f1:62:24:02:4c:a8: 43:db:bc:b2:3a:76:c2:4a:46:cd:9d:03:bc:cf:dc:3f: 64:f7:32:33:c9:17:38:ed:b9:7f:9b:34:01:53:df:24: 77:3a:ee:37:be:88:a4:eb:b0:2d:18:da:fa:ad:f6:47: 47:d5:7b:16:71:f4:5a:b7:87:ed:e4:e5:be:22:72:60: 60:0d:a5:e1:6e:d7:b8:af:c5:60:2e:a1:7f:1b:78:e1: 5f:a8:1e:6b:a9:59:48:78:d9:b8:a6:96:3d:c7:df:5b: 36:02:47:4f:bc:58:ec:43:9a:07:38:ed:e1:63:2a:12: 55:51:62:be:74:d6:c8:45:a3:02:15:ba:09:bd:f8:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:39:e5:ce:85:61:8d:d6:cb:87:c1:7a:fc:3e:50:b0: 8a:33:11:7f:cf:dc:2b:64:97:05:95:38:30:d0:64:80: 7a:b6:74:c1:56:9d:a0:d6:75:c6:cc:cb:18:51:17:45: e9:2c:d4:95:2e:e4:79:54:a8:ea:10:b1:98:c7:3b:7d: 75:bb:78:56:65:90:28:a9:25:28:32:25:b6:6a:71:0a: 70:56:5a:8b:8f:2d:dd:7a:99:74:e4:98:00:fb:79:ab: 12:d3:a6:17:4d:07:fe:be:36:1c:bc:13:a4:86:2a:3a: ce:98:17:58:3d:40:a7:b8:c6:55:8a:9b:d0:a9:4b:16: 50:60:52:74:d4:0f:ab:90:b0:22:ff:9c:ba:ba:36:f4: f3:85:e3:a6:ad:9d:f3:ca:35:bf:18:08:46:04:68:79: 54:e5:c0:6d:3f:2b:5a:81:d7:ca:78:20:93:0f:65:e0: dc:e1:d0:44:8d:c6:57:5c:0f:0a:27:60:e1:f9:43:3d: 74:57:f5:e0:2f:49:e6:41:46:12:ca:b5:51:01:c5:e3: 31:a0:b8:8d:7a:fb:52:64:59:5f:8e:44:be:3f:d9:36: df:20:a4:ef:c7:a3:d3:eb:00:83:30:37:76:c8:06:de: ff:61:1f:8a:2a:64:0f:95:01:57:02:fe:ee:42:b0:82 Fingerprint (SHA-256): DF:7F:E6:56:77:B7:1E:70:54:4B:C5:A2:28:EE:41:61:90:80:E1:D3:28:B1:92:29:14:7F:26:DA:72:81:01:72 Fingerprint (SHA1): A5:1C:9F:C3:AD:EA:CB:31:F3:A0:45:3B:F8:C4:D9:35:39:25:59:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:76 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:11 2023 Not After : Tue Jun 20 22:22:11 2023 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:73:7a:d2:89:61:d6:28:69:fc:36:a6:4e:20:b5:08: 4e:ca:f5:6c:73:40:b2:38:38:b7:27:6b:0d:2e:dd:b3: dd:22:ea:b6:86:cd:fc:f3:ee:16:77:a9:10:fa:db:b2: 33:3b:f0:2c:29:d9:52:92:a1:30:01:03:2b:83:3e:49: 1a:48:49:ef:28:9e:c1:a0:b9:86:cb:1f:5e:35:96:a9: 78:ad:86:cf:c0:a2:34:69:76:d2:36:2c:5d:1d:af:ad: 0b:8c:25:89:d2:e4:f9:46:18:4a:36:b6:70:42:02:fd: a2:25:ce:b5:a6:d3:a2:02:72:2e:fd:5d:b5:43:79:7f: 5d:13:36:6a:5e:8a:79:a9:4e:1a:3d:93:36:23:10:64: df:14:7c:8c:c9:28:52:c3:5d:80:6b:0e:f0:d7:8b:02: 92:b5:96:a4:c9:f4:c2:81:d7:30:6f:24:10:d7:40:2d: c6:23:63:8f:99:99:66:16:02:75:c8:55:a2:ee:6b:3c: 1f:c8:c7:77:e2:3b:9f:22:fd:2b:dd:bb:08:aa:4b:66: 94:c9:4c:ae:13:82:0e:f1:6a:ea:c9:9a:66:fc:ad:e1: 9b:58:0b:1e:f7:e4:ba:01:31:2a:a3:54:42:40:99:96: 81:1d:c6:fe:d7:51:02:98:83:d5:bb:7b:b6:3b:69:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:f9:1c:fb:b6:8f:ce:c0:1f:29:c3:cd:cd:ed:07:e2: 2c:c2:50:5b:41:4b:d0:43:61:45:8d:2c:04:40:5e:91: 08:ee:ee:ee:11:ca:9b:0c:d7:42:fd:c7:a5:27:ce:cb: 95:ed:25:4a:b3:fb:11:3a:0c:7b:8f:03:23:1b:20:d2: 31:b3:cd:22:47:9c:11:d3:65:3d:95:0d:8f:2a:8e:f5: c5:69:78:cc:fa:c0:72:c4:1b:b1:78:08:28:40:00:8b: ea:ea:b8:9b:20:73:3d:1d:ac:2a:1d:ab:7f:42:21:37: 17:8b:d2:e5:9d:e6:25:cf:e0:f2:70:54:9f:bc:7e:28: 54:1c:d6:34:fc:5c:81:f6:63:c3:c8:75:0e:98:76:e7: 76:86:03:15:3a:41:95:67:ae:0b:07:37:66:fa:bd:05: 8b:ba:a1:33:98:e8:ba:5c:fc:23:2c:df:48:9c:f1:09: 85:f0:90:12:79:5d:77:d4:1a:76:09:78:76:39:0a:7d: 31:ff:97:9d:3a:e9:54:3e:38:16:95:3f:ba:bf:7f:b3: 4b:c3:fd:72:8c:10:e8:18:be:09:0b:d4:a0:b8:3e:b6: 78:d7:2f:8b:ed:e8:b1:47:6b:b8:d7:17:d1:4a:55:79: 7a:e9:e6:88:e7:a1:44:3c:f3:41:46:a7:53:56:8c:e4 Fingerprint (SHA-256): 30:B9:EA:0B:55:9A:37:62:23:06:6B:3F:25:BB:95:AE:79:30:9E:77:65:C8:62:5D:1C:A7:E6:44:42:A2:88:AA Fingerprint (SHA1): A0:A2:F1:F1:35:D0:B3:F6:76:82:D2:D1:ED:16:C6:B8:B8:FE:A3:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:77 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Mon Mar 20 22:22:12 2023 Not After : Tue Jun 20 22:22:12 2023 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:1b:f5:7a:d9:18:1d:37:c6:87:6e:ae:84:16:53:76: 36:fa:d1:65:57:97:58:1d:40:7a:58:f4:a3:11:c8:cf: a2:2e:dd:93:8c:ba:35:82:3a:84:56:06:d8:61:cb:82: 42:13:0f:64:55:9d:13:c6:ed:b8:95:a2:33:c3:65:02: 57:6e:a4:aa:03:c3:18:1a:78:fd:d1:10:b1:86:7e:73: 21:52:de:93:41:89:df:d5:6b:93:2e:90:9b:61:48:54: 3b:3c:5e:f3:8a:54:97:dd:38:51:5c:79:6e:e2:62:86: e8:b3:44:1e:57:72:6e:14:1d:b4:ec:b8:3b:f7:d3:24: 5e:ea:bf:90:bf:10:5f:7c:cc:60:42:ba:83:46:b5:5d: f9:f9:b9:2e:e7:fd:75:cf:71:06:1f:05:6e:15:e5:0f: 2b:eb:87:6a:1b:86:5a:f6:42:52:f1:6e:ae:d1:62:58: 6f:de:70:ef:e7:a9:bb:3d:f9:f5:e5:29:98:8d:ea:90: 0d:26:c0:40:5e:4c:98:2f:69:d5:a2:82:87:07:23:c1: 93:f3:2e:e5:d7:78:ce:df:d4:ae:c3:f3:7c:48:5e:26: b7:14:7b:5e:23:33:74:c1:55:d3:7f:3e:c2:62:85:81: e0:e5:f9:01:3d:fb:75:f4:98:59:76:46:0e:03:4f:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:38:31:e9:c9:c5:39:8a:16:26:1d:16:43:78:65:b6: 17:01:d9:11:b6:89:a1:69:2c:9e:11:02:4a:90:4d:e4: c2:8d:4a:87:01:e3:47:b2:3b:a2:d7:30:85:87:54:58: 64:c8:53:81:b5:ce:5a:bf:24:30:a1:d7:bf:42:99:2a: 00:5e:f3:f7:1c:f9:4a:80:ae:48:30:e3:c9:33:a8:cf: f5:6c:fc:3d:74:5c:56:b0:6c:46:93:00:2a:27:c8:8c: 42:1d:23:52:ee:c9:5d:49:73:20:6d:65:1e:0a:2f:30: 64:95:b1:67:00:0c:61:54:63:fa:d4:59:04:f7:ac:92: 93:da:f7:19:45:8e:d7:07:2d:15:3f:55:0d:58:23:ee: fb:64:8c:40:5a:4c:51:71:3a:1d:3b:56:88:88:fa:76: b4:c1:45:94:75:e5:82:49:00:26:89:8f:74:83:82:16: e7:0c:4c:c5:3f:85:59:9d:a6:4a:36:91:82:19:cf:78: 3f:61:fb:22:ad:53:d3:b3:65:67:42:cd:c3:0b:88:7e: 11:83:37:bb:e9:4b:47:4b:36:f2:af:4c:12:9b:aa:f9: ba:5a:d5:6c:12:bb:bb:10:da:90:6b:f8:36:bb:dd:60: fe:72:1c:0c:d7:14:1b:d8:98:e2:02:20:db:83:7d:ba Fingerprint (SHA-256): BC:F6:EB:8A:82:BB:4B:FE:B5:F7:6C:FF:FC:06:16:25:E3:95:E0:5B:66:4B:6F:23:49:3F:FA:D1:FA:A0:B3:61 Fingerprint (SHA1): 22:13:7C:F9:67:DA:C1:AF:00:17:8B:F1:B1:A7:81:E7:EB:61:93:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:7a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 22:22:13 2023 Not After : Tue Jun 20 22:22:13 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:7d:e5:15:dc:52:be:cb:0b:7f:dc:d5:79:6b:61:f2: 62:36:46:5d:b2:22:94:60:21:5a:25:10:ad:9d:22:7e: 28:15:28:c5:c8:00:9a:8a:93:d0:83:d2:8a:a2:18:e9: ea:c9:f7:13:37:69:03:22:f8:83:9c:13:b2:9e:50:cd: 12:80:9c:4c:e4:ec:52:ec:d8:2f:8b:9c:fe:38:f8:42: d2:68:03:f3:41:a8:d1:1c:01:d2:64:ca:3b:28:18:26: 6d:5a:54:66:17:87:fe:a3:1c:64:78:bf:e2:73:09:47: d8:02:9c:e8:26:a4:75:49:80:37:97:c3:ca:f5:38:ff: 50:67:90:44:a8:7d:4c:a7:fc:cd:b2:ab:a2:40:a9:da: 7b:fe:69:81:67:50:74:13:14:79:ee:7a:90:7d:df:24: c2:3b:3d:ab:bf:e1:7f:77:50:f9:4c:92:52:ce:6d:f0: fa:69:ff:08:69:40:1e:f9:5c:87:ab:57:72:d9:bc:9c: e2:8e:c9:e2:ff:0d:54:c6:50:b4:50:9b:5a:89:d6:cf: 30:b8:a3:27:ba:63:66:ad:bb:10:17:28:df:e6:9b:e6: c6:a6:f4:48:4b:83:38:c7:e5:5b:73:31:15:8a:9e:a4: 49:7f:31:67:05:5f:c7:85:5c:c4:b3:05:49:81:8a:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:7a:d8:ba:39:b0:d7:f9:00:46:23:21:21:86:35:5d: e0:2f:93:d2:78:8d:e1:e7:91:98:27:ac:d7:8e:64:c2: 0c:ff:d8:0f:e9:c6:41:65:61:ab:39:22:64:e1:8e:9f: 02:3a:12:1c:e9:db:21:a1:f8:98:64:d3:51:17:ad:77: 83:42:9b:74:a7:e6:d9:e2:96:44:d3:c8:1d:2c:fc:e5: c0:fc:3f:90:d6:47:02:fb:2e:a4:4f:5e:56:b3:b3:29: 5c:07:1a:6e:bf:53:11:10:de:c5:57:ed:4c:4e:c3:80: 35:48:c6:08:10:d2:21:32:87:1e:50:f4:63:62:2c:ce: 93:ba:69:15:2c:51:8a:26:e4:b9:22:11:3b:9a:8e:73: 9a:cc:6b:86:83:7f:fe:79:c9:9f:9d:ad:b6:0c:32:e6: dd:aa:7b:91:b0:a2:d6:9b:f1:9e:9d:51:d3:13:44:29: 1a:c2:9a:55:9f:9c:a3:20:51:1d:a3:7f:0b:81:c2:71: 03:22:31:bd:dc:bf:3b:79:af:66:c1:77:33:be:a5:1f: 9d:5e:c8:91:5d:94:41:f7:c5:2a:71:5a:27:99:65:88: 5a:ef:8c:03:5f:df:e1:c9:c2:e8:ed:e6:b5:87:f9:4c: 37:32:0d:f0:0b:e7:39:75:17:17:24:26:23:98:8b:8c Fingerprint (SHA-256): E7:36:72:13:40:71:49:28:8F:CB:58:6E:AB:38:1D:57:56:2E:F9:0C:68:10:1C:3C:D8:68:B0:CD:DF:68:CD:9D Fingerprint (SHA1): 85:F1:0E:DD:64:CA:C5:96:83:48:17:EB:53:76:EA:60:44:1B:DB:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:be:eb:8b:7f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Mar 20 22:22:16 2023 Not After : Tue Jun 20 22:22:16 2023 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:61:c2:13:2f:5f:41:22:59:cd:53:96:66:3c:9b:80: bb:9d:a9:13:83:5e:79:1f:3b:0e:d9:ea:98:e9:44:96: 14:05:42:fe:fb:ae:af:16:1d:25:51:f8:80:45:33:e0: dc:5a:79:b4:b4:5e:43:36:3d:dc:3c:fe:ca:b2:5a:b5: f7:61:57:21:9d:67:ab:22:05:f9:96:c3:98:03:4c:58: 54:3b:0f:53:df:3a:d0:6b:16:3a:b0:71:05:b1:5d:71: f1:6c:9d:4d:17:06:52:72:d1:d5:a4:a5:60:43:97:84: 4f:4d:dc:3b:0a:0e:f9:64:3c:ba:da:36:bd:d2:0e:06: 95:e1:93:2a:83:8b:cb:84:8f:b9:fe:92:2b:c2:c5:18: 3d:36:f9:8e:1c:b9:c5:43:a3:9b:a6:42:0c:01:6a:9c: 7e:5e:70:7d:bf:05:22:ce:48:53:0c:81:7f:8f:ee:cc: 88:23:2f:22:36:97:6d:e8:fa:fc:f0:1f:65:2b:55:93: 00:9c:15:f3:1f:6b:1c:f2:17:fb:1e:3b:55:23:3b:d9: f3:e6:d4:0c:1a:01:67:62:d9:71:eb:80:a0:8b:cf:2e: 0c:ff:59:b1:f6:e9:72:a5:d8:9c:23:34:9e:df:93:4e: 1f:c5:95:d6:89:50:c3:04:d8:89:f6:44:9e:72:45:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:e5:5f:3b:19:c6:41:4c:bc:76:90:73:02:e8:39:5d: 9b:14:fc:c0:c8:42:2b:9a:e9:60:77:98:44:fa:b4:b4: ad:ef:28:bb:e3:57:e4:c8:69:25:7b:77:5c:ae:c4:d3: e8:5d:71:cb:5e:57:52:b7:e9:61:28:22:b7:b1:25:8f: c7:f2:c6:8a:eb:8c:1f:40:29:63:90:b5:62:7c:3c:77: 66:a8:d5:b0:1b:73:8f:93:8e:d5:9d:d6:01:dc:db:f2: ed:49:32:ea:9c:dd:bc:93:0d:89:da:e1:32:3e:f0:40: 4b:e2:a3:c2:62:d3:d4:7b:ad:ce:3f:d7:69:ec:9c:bd: 71:23:66:01:a3:a3:57:2a:0a:39:4e:85:b8:79:a8:6c: 23:83:a4:7d:2e:fd:42:f8:15:bd:60:87:0d:d2:c1:e9: 8e:9d:fa:ab:92:ba:87:d2:28:45:a7:c8:d0:b4:93:1c: d5:d6:7b:3a:32:1b:06:b2:a3:0d:87:e1:c1:09:bb:65: 67:11:33:c0:93:26:40:35:9d:55:df:29:13:13:3d:2c: 7a:5e:27:fe:02:9c:75:bd:ea:9c:58:f5:1e:44:dc:19: 13:c6:c3:18:f7:99:f0:2d:e9:3b:3f:62:8a:6c:ea:d0: fe:ed:4f:9a:af:e7:f9:fd:db:c4:24:36:d4:23:fe:a1 Fingerprint (SHA-256): 4C:12:E8:06:44:24:1E:7C:E3:DD:0D:EE:5E:3F:94:F0:E3:99:98:23:98:63:55:3C:E9:A2:7F:5F:48:AD:C4:5E Fingerprint (SHA1): 5D:80:E9:6E:92:86:E8:D6:4A:44:2E:E8:8E:0D:8D:D7:B9:B0:CA:23 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux3.10_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> ec c50f42a240663e472ae070bdc909a2883577c52a NSS Certificate DB:localhost.localdomain-ecmixed < 1> dsa dfbd434a284969b6b082767c90b255d3c135b075 NSS Certificate DB:localhost-sni.localdomain-dsa < 2> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 3> rsa 5305c1f586019a577855f83b84ef53240e644012 NSS Certificate DB:localhost.localdomain < 4> ec b97c6a10d46692658077f714ef429cd07e694ab4 NSS Certificate DB:localhost.localdomain-ec < 5> rsa 3709ed3243a26cae1e769dac805705ec0463782b NSS Certificate DB:localhost-sni.localdomain < 6> ec 4047ced1af3d17c39f1be07a86cdabac3aa37d5b NSS Certificate DB:localhost-sni.localdomain-ec < 7> ec a8c31cb0d3881247c586af37f5228f7316031955 NSS Certificate DB:localhost-sni.localdomain-ecmixed < 8> dsa 3c2c5dd2d4e0947bee2eba48fdde4c855fe1098f NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> dsa 151cb1e7f1533058e24a088dac3f539ef6053ad4 NSS Certificate DB:localhost.localdomain-dsa <10> dsa 235c5a678f1124b91cce406691719f3146a443a3 NSS Certificate DB:localhost.localdomain-dsamixed <11> rsa c20b19780a919f927772a56dfae721d56a320d2d (orphan) cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5487 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5487 found at Mon Mar 20 22:23:15 UTC 2023 selfserv_9887 with PID 5487 started at Mon Mar 20 22:23:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #717: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5487 at Mon Mar 20 22:23:16 UTC 2023 kill -USR1 5487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5487 killed at Mon Mar 20 22:23:16 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5539 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5539 found at Mon Mar 20 22:23:16 UTC 2023 selfserv_9887 with PID 5539 started at Mon Mar 20 22:23:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #718: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5539 at Mon Mar 20 22:23:16 UTC 2023 kill -USR1 5539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5539 killed at Mon Mar 20 22:23:16 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5591 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5591 found at Mon Mar 20 22:23:17 UTC 2023 selfserv_9887 with PID 5591 started at Mon Mar 20 22:23:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #719: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5591 at Mon Mar 20 22:23:17 UTC 2023 kill -USR1 5591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5591 killed at Mon Mar 20 22:23:17 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5658 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5658 found at Mon Mar 20 22:23:17 UTC 2023 selfserv_9887 with PID 5658 started at Mon Mar 20 22:23:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #720: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5658 at Mon Mar 20 22:23:18 UTC 2023 kill -USR1 5658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5658 killed at Mon Mar 20 22:23:18 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5710 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5710 found at Mon Mar 20 22:23:18 UTC 2023 selfserv_9887 with PID 5710 started at Mon Mar 20 22:23:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #721: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5710 at Mon Mar 20 22:23:18 UTC 2023 kill -USR1 5710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5710 killed at Mon Mar 20 22:23:18 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5762 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5762 found at Mon Mar 20 22:23:19 UTC 2023 selfserv_9887 with PID 5762 started at Mon Mar 20 22:23:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #722: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5762 at Mon Mar 20 22:23:19 UTC 2023 kill -USR1 5762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5762 killed at Mon Mar 20 22:23:19 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5828 found at Mon Mar 20 22:23:19 UTC 2023 selfserv_9887 with PID 5828 started at Mon Mar 20 22:23:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #723: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 5828 at Mon Mar 20 22:23:20 UTC 2023 kill -USR1 5828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5828 killed at Mon Mar 20 22:23:20 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5880 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5880 found at Mon Mar 20 22:23:20 UTC 2023 selfserv_9887 with PID 5880 started at Mon Mar 20 22:23:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #724: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5880 at Mon Mar 20 22:23:20 UTC 2023 kill -USR1 5880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5880 killed at Mon Mar 20 22:23:20 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5932 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5932 found at Mon Mar 20 22:23:20 UTC 2023 selfserv_9887 with PID 5932 started at Mon Mar 20 22:23:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #725: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 5932 at Mon Mar 20 22:23:21 UTC 2023 kill -USR1 5932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5932 killed at Mon Mar 20 22:23:21 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5998 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5998 found at Mon Mar 20 22:23:21 UTC 2023 selfserv_9887 with PID 5998 started at Mon Mar 20 22:23:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #726: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 5998 at Mon Mar 20 22:23:21 UTC 2023 kill -USR1 5998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5998 killed at Mon Mar 20 22:23:21 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6050 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6050 found at Mon Mar 20 22:23:22 UTC 2023 selfserv_9887 with PID 6050 started at Mon Mar 20 22:23:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #727: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6050 at Mon Mar 20 22:23:22 UTC 2023 kill -USR1 6050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6050 killed at Mon Mar 20 22:23:22 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6102 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6102 found at Mon Mar 20 22:23:22 UTC 2023 selfserv_9887 with PID 6102 started at Mon Mar 20 22:23:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #728: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6102 at Mon Mar 20 22:23:23 UTC 2023 kill -USR1 6102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6102 killed at Mon Mar 20 22:23:23 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6168 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6168 found at Mon Mar 20 22:23:23 UTC 2023 selfserv_9887 with PID 6168 started at Mon Mar 20 22:23:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #729: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6168 at Mon Mar 20 22:23:23 UTC 2023 kill -USR1 6168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6168 killed at Mon Mar 20 22:23:23 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6221 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6221 found at Mon Mar 20 22:23:23 UTC 2023 selfserv_9887 with PID 6221 started at Mon Mar 20 22:23:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #730: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6221 at Mon Mar 20 22:23:24 UTC 2023 kill -USR1 6221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6221 killed at Mon Mar 20 22:23:24 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6284 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6284 found at Mon Mar 20 22:23:24 UTC 2023 selfserv_9887 with PID 6284 started at Mon Mar 20 22:23:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #731: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6284 at Mon Mar 20 22:23:24 UTC 2023 kill -USR1 6284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6284 killed at Mon Mar 20 22:23:24 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6352 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6352 found at Mon Mar 20 22:23:24 UTC 2023 selfserv_9887 with PID 6352 started at Mon Mar 20 22:23:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #732: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6352 at Mon Mar 20 22:23:25 UTC 2023 kill -USR1 6352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6352 killed at Mon Mar 20 22:23:25 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6406 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6406 found at Mon Mar 20 22:23:25 UTC 2023 selfserv_9887 with PID 6406 started at Mon Mar 20 22:23:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #733: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6406 at Mon Mar 20 22:23:25 UTC 2023 kill -USR1 6406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6406 killed at Mon Mar 20 22:23:25 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6463 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6463 found at Mon Mar 20 22:23:26 UTC 2023 selfserv_9887 with PID 6463 started at Mon Mar 20 22:23:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #734: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6463 at Mon Mar 20 22:23:26 UTC 2023 kill -USR1 6463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6463 killed at Mon Mar 20 22:23:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6534 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6534 found at Mon Mar 20 22:23:26 UTC 2023 selfserv_9887 with PID 6534 started at Mon Mar 20 22:23:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #735: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6534 at Mon Mar 20 22:23:26 UTC 2023 kill -USR1 6534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6534 killed at Mon Mar 20 22:23:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6588 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6588 found at Mon Mar 20 22:23:27 UTC 2023 selfserv_9887 with PID 6588 started at Mon Mar 20 22:23:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #736: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6588 at Mon Mar 20 22:23:27 UTC 2023 kill -USR1 6588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6588 killed at Mon Mar 20 22:23:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6651 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6651 found at Mon Mar 20 22:23:27 UTC 2023 selfserv_9887 with PID 6651 started at Mon Mar 20 22:23:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #737: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6651 at Mon Mar 20 22:23:27 UTC 2023 kill -USR1 6651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6651 killed at Mon Mar 20 22:23:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6721 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6721 found at Mon Mar 20 22:23:28 UTC 2023 selfserv_9887 with PID 6721 started at Mon Mar 20 22:23:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #738: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6721 at Mon Mar 20 22:23:28 UTC 2023 kill -USR1 6721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6721 killed at Mon Mar 20 22:23:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6774 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6774 found at Mon Mar 20 22:23:28 UTC 2023 selfserv_9887 with PID 6774 started at Mon Mar 20 22:23:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #739: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6774 at Mon Mar 20 22:23:28 UTC 2023 kill -USR1 6774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6774 killed at Mon Mar 20 22:23:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6827 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6827 found at Mon Mar 20 22:23:29 UTC 2023 selfserv_9887 with PID 6827 started at Mon Mar 20 22:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #740: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6827 at Mon Mar 20 22:23:29 UTC 2023 kill -USR1 6827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6827 killed at Mon Mar 20 22:23:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6894 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6894 found at Mon Mar 20 22:23:29 UTC 2023 selfserv_9887 with PID 6894 started at Mon Mar 20 22:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #741: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6894 at Mon Mar 20 22:23:29 UTC 2023 kill -USR1 6894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6894 killed at Mon Mar 20 22:23:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6947 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6947 found at Mon Mar 20 22:23:29 UTC 2023 selfserv_9887 with PID 6947 started at Mon Mar 20 22:23:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #742: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6947 at Mon Mar 20 22:23:30 UTC 2023 kill -USR1 6947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6947 killed at Mon Mar 20 22:23:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7001 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7001 found at Mon Mar 20 22:23:30 UTC 2023 selfserv_9887 with PID 7001 started at Mon Mar 20 22:23:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #743: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7001 at Mon Mar 20 22:23:30 UTC 2023 kill -USR1 7001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7001 killed at Mon Mar 20 22:23:30 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7069 found at Mon Mar 20 22:23:30 UTC 2023 selfserv_9887 with PID 7069 started at Mon Mar 20 22:23:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #744: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7069 at Mon Mar 20 22:23:31 UTC 2023 kill -USR1 7069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7069 killed at Mon Mar 20 22:23:31 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7121 found at Mon Mar 20 22:23:31 UTC 2023 selfserv_9887 with PID 7121 started at Mon Mar 20 22:23:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #745: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7121 at Mon Mar 20 22:23:31 UTC 2023 kill -USR1 7121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7121 killed at Mon Mar 20 22:23:31 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7173 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7173 found at Mon Mar 20 22:23:31 UTC 2023 selfserv_9887 with PID 7173 started at Mon Mar 20 22:23:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #746: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7173 at Mon Mar 20 22:23:31 UTC 2023 kill -USR1 7173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7173 killed at Mon Mar 20 22:23:32 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7239 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7239 found at Mon Mar 20 22:23:32 UTC 2023 selfserv_9887 with PID 7239 started at Mon Mar 20 22:23:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #747: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7239 at Mon Mar 20 22:23:32 UTC 2023 kill -USR1 7239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7239 killed at Mon Mar 20 22:23:32 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7291 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7291 found at Mon Mar 20 22:23:32 UTC 2023 selfserv_9887 with PID 7291 started at Mon Mar 20 22:23:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #748: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7291 at Mon Mar 20 22:23:32 UTC 2023 kill -USR1 7291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7291 killed at Mon Mar 20 22:23:32 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7343 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7343 found at Mon Mar 20 22:23:33 UTC 2023 selfserv_9887 with PID 7343 started at Mon Mar 20 22:23:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #749: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7343 at Mon Mar 20 22:23:33 UTC 2023 kill -USR1 7343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7343 killed at Mon Mar 20 22:23:33 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7409 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7409 found at Mon Mar 20 22:23:33 UTC 2023 selfserv_9887 with PID 7409 started at Mon Mar 20 22:23:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #750: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7409 at Mon Mar 20 22:23:33 UTC 2023 kill -USR1 7409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7409 killed at Mon Mar 20 22:23:33 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7462 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7462 found at Mon Mar 20 22:23:33 UTC 2023 selfserv_9887 with PID 7462 started at Mon Mar 20 22:23:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #751: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7462 at Mon Mar 20 22:23:34 UTC 2023 kill -USR1 7462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7462 killed at Mon Mar 20 22:23:34 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7514 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7514 found at Mon Mar 20 22:23:34 UTC 2023 selfserv_9887 with PID 7514 started at Mon Mar 20 22:23:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #752: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 7514 at Mon Mar 20 22:23:34 UTC 2023 kill -USR1 7514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7514 killed at Mon Mar 20 22:23:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7582 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7582 found at Mon Mar 20 22:23:34 UTC 2023 selfserv_9887 with PID 7582 started at Mon Mar 20 22:23:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #753: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7582 at Mon Mar 20 22:23:35 UTC 2023 kill -USR1 7582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7582 killed at Mon Mar 20 22:23:35 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7635 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7635 found at Mon Mar 20 22:23:35 UTC 2023 selfserv_9887 with PID 7635 started at Mon Mar 20 22:23:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #754: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7635 at Mon Mar 20 22:23:36 UTC 2023 kill -USR1 7635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7635 killed at Mon Mar 20 22:23:36 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7687 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7687 found at Mon Mar 20 22:23:36 UTC 2023 selfserv_9887 with PID 7687 started at Mon Mar 20 22:23:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #755: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7687 at Mon Mar 20 22:23:37 UTC 2023 kill -USR1 7687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7687 killed at Mon Mar 20 22:23:37 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7755 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7755 found at Mon Mar 20 22:23:37 UTC 2023 selfserv_9887 with PID 7755 started at Mon Mar 20 22:23:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #756: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7755 at Mon Mar 20 22:23:37 UTC 2023 kill -USR1 7755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7755 killed at Mon Mar 20 22:23:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7809 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7809 found at Mon Mar 20 22:23:38 UTC 2023 selfserv_9887 with PID 7809 started at Mon Mar 20 22:23:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #757: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7809 at Mon Mar 20 22:23:38 UTC 2023 kill -USR1 7809 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7809 killed at Mon Mar 20 22:23:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7862 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7862 found at Mon Mar 20 22:23:39 UTC 2023 selfserv_9887 with PID 7862 started at Mon Mar 20 22:23:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #758: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7862 at Mon Mar 20 22:23:39 UTC 2023 kill -USR1 7862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7862 killed at Mon Mar 20 22:23:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7931 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7931 found at Mon Mar 20 22:23:39 UTC 2023 selfserv_9887 with PID 7931 started at Mon Mar 20 22:23:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #759: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 7931 at Mon Mar 20 22:23:40 UTC 2023 kill -USR1 7931 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7931 killed at Mon Mar 20 22:23:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7986 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7986 found at Mon Mar 20 22:23:40 UTC 2023 selfserv_9887 with PID 7986 started at Mon Mar 20 22:23:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #760: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7986 at Mon Mar 20 22:23:41 UTC 2023 kill -USR1 7986 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7986 killed at Mon Mar 20 22:23:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8043 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8043 found at Mon Mar 20 22:23:41 UTC 2023 selfserv_9887 with PID 8043 started at Mon Mar 20 22:23:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #761: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8043 at Mon Mar 20 22:23:42 UTC 2023 kill -USR1 8043 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8043 killed at Mon Mar 20 22:23:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8112 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8112 found at Mon Mar 20 22:23:42 UTC 2023 selfserv_9887 with PID 8112 started at Mon Mar 20 22:23:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #762: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8112 at Mon Mar 20 22:23:43 UTC 2023 kill -USR1 8112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8112 killed at Mon Mar 20 22:23:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8164 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8164 found at Mon Mar 20 22:23:43 UTC 2023 selfserv_9887 with PID 8164 started at Mon Mar 20 22:23:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #763: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8164 at Mon Mar 20 22:23:43 UTC 2023 kill -USR1 8164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8164 killed at Mon Mar 20 22:23:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8224 found at Mon Mar 20 22:23:44 UTC 2023 selfserv_9887 with PID 8224 started at Mon Mar 20 22:23:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #764: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8224 at Mon Mar 20 22:23:44 UTC 2023 kill -USR1 8224 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8224 killed at Mon Mar 20 22:23:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8290 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8290 found at Mon Mar 20 22:23:45 UTC 2023 selfserv_9887 with PID 8290 started at Mon Mar 20 22:23:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #765: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8290 at Mon Mar 20 22:23:45 UTC 2023 kill -USR1 8290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8290 killed at Mon Mar 20 22:23:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8344 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8344 found at Mon Mar 20 22:23:45 UTC 2023 selfserv_9887 with PID 8344 started at Mon Mar 20 22:23:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #766: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8344 at Mon Mar 20 22:23:46 UTC 2023 kill -USR1 8344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8344 killed at Mon Mar 20 22:23:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8396 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8396 found at Mon Mar 20 22:23:46 UTC 2023 selfserv_9887 with PID 8396 started at Mon Mar 20 22:23:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #767: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8396 at Mon Mar 20 22:23:47 UTC 2023 kill -USR1 8396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8396 killed at Mon Mar 20 22:23:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8462 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8462 found at Mon Mar 20 22:23:47 UTC 2023 selfserv_9887 with PID 8462 started at Mon Mar 20 22:23:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #768: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8462 at Mon Mar 20 22:23:47 UTC 2023 kill -USR1 8462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8462 killed at Mon Mar 20 22:23:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8514 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8514 found at Mon Mar 20 22:23:48 UTC 2023 selfserv_9887 with PID 8514 started at Mon Mar 20 22:23:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #769: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8514 at Mon Mar 20 22:23:48 UTC 2023 kill -USR1 8514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8514 killed at Mon Mar 20 22:23:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8566 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8566 found at Mon Mar 20 22:23:49 UTC 2023 selfserv_9887 with PID 8566 started at Mon Mar 20 22:23:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #770: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8566 at Mon Mar 20 22:23:49 UTC 2023 kill -USR1 8566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8566 killed at Mon Mar 20 22:23:49 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8632 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8632 found at Mon Mar 20 22:23:49 UTC 2023 selfserv_9887 with PID 8632 started at Mon Mar 20 22:23:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #771: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8632 at Mon Mar 20 22:23:50 UTC 2023 kill -USR1 8632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8632 killed at Mon Mar 20 22:23:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8684 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8684 found at Mon Mar 20 22:23:50 UTC 2023 selfserv_9887 with PID 8684 started at Mon Mar 20 22:23:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #772: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8684 at Mon Mar 20 22:23:51 UTC 2023 kill -USR1 8684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8684 killed at Mon Mar 20 22:23:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8736 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8736 found at Mon Mar 20 22:23:51 UTC 2023 selfserv_9887 with PID 8736 started at Mon Mar 20 22:23:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #773: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8736 at Mon Mar 20 22:23:52 UTC 2023 kill -USR1 8736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8736 killed at Mon Mar 20 22:23:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8802 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8802 found at Mon Mar 20 22:23:52 UTC 2023 selfserv_9887 with PID 8802 started at Mon Mar 20 22:23:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #774: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8802 at Mon Mar 20 22:23:53 UTC 2023 kill -USR1 8802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8802 killed at Mon Mar 20 22:23:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8854 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8854 found at Mon Mar 20 22:23:53 UTC 2023 selfserv_9887 with PID 8854 started at Mon Mar 20 22:23:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #775: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8854 at Mon Mar 20 22:23:53 UTC 2023 kill -USR1 8854 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8854 killed at Mon Mar 20 22:23:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:23:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8906 found at Mon Mar 20 22:23:54 UTC 2023 selfserv_9887 with PID 8906 started at Mon Mar 20 22:23:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #776: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8906 at Mon Mar 20 22:23:54 UTC 2023 kill -USR1 8906 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8906 killed at Mon Mar 20 22:23:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8973 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8973 found at Mon Mar 20 22:23:55 UTC 2023 selfserv_9887 with PID 8973 started at Mon Mar 20 22:23:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #777: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8973 at Mon Mar 20 22:23:55 UTC 2023 kill -USR1 8973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8973 killed at Mon Mar 20 22:23:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9025 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9025 found at Mon Mar 20 22:23:55 UTC 2023 selfserv_9887 with PID 9025 started at Mon Mar 20 22:23:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #778: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9025 at Mon Mar 20 22:23:56 UTC 2023 kill -USR1 9025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9025 killed at Mon Mar 20 22:23:56 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9077 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9077 found at Mon Mar 20 22:23:56 UTC 2023 selfserv_9887 with PID 9077 started at Mon Mar 20 22:23:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #779: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9077 at Mon Mar 20 22:23:57 UTC 2023 kill -USR1 9077 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9077 killed at Mon Mar 20 22:23:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9143 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9143 found at Mon Mar 20 22:23:57 UTC 2023 selfserv_9887 with PID 9143 started at Mon Mar 20 22:23:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #780: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9143 at Mon Mar 20 22:23:58 UTC 2023 kill -USR1 9143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9143 killed at Mon Mar 20 22:23:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9195 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9195 found at Mon Mar 20 22:23:58 UTC 2023 selfserv_9887 with PID 9195 started at Mon Mar 20 22:23:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #781: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9195 at Mon Mar 20 22:23:59 UTC 2023 kill -USR1 9195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9195 killed at Mon Mar 20 22:23:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:23:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:23:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9247 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9247 found at Mon Mar 20 22:23:59 UTC 2023 selfserv_9887 with PID 9247 started at Mon Mar 20 22:23:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #782: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9247 at Mon Mar 20 22:23:59 UTC 2023 kill -USR1 9247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9247 killed at Mon Mar 20 22:24:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9313 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9313 found at Mon Mar 20 22:24:00 UTC 2023 selfserv_9887 with PID 9313 started at Mon Mar 20 22:24:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #783: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9313 at Mon Mar 20 22:24:00 UTC 2023 kill -USR1 9313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9313 killed at Mon Mar 20 22:24:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9366 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9366 found at Mon Mar 20 22:24:01 UTC 2023 selfserv_9887 with PID 9366 started at Mon Mar 20 22:24:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #784: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9366 at Mon Mar 20 22:24:01 UTC 2023 kill -USR1 9366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9366 killed at Mon Mar 20 22:24:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9418 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9418 found at Mon Mar 20 22:24:01 UTC 2023 selfserv_9887 with PID 9418 started at Mon Mar 20 22:24:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #785: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9418 at Mon Mar 20 22:24:02 UTC 2023 kill -USR1 9418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9418 killed at Mon Mar 20 22:24:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9484 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9484 found at Mon Mar 20 22:24:02 UTC 2023 selfserv_9887 with PID 9484 started at Mon Mar 20 22:24:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #786: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9484 at Mon Mar 20 22:24:03 UTC 2023 kill -USR1 9484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9484 killed at Mon Mar 20 22:24:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9536 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9536 found at Mon Mar 20 22:24:03 UTC 2023 selfserv_9887 with PID 9536 started at Mon Mar 20 22:24:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #787: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9536 at Mon Mar 20 22:24:04 UTC 2023 kill -USR1 9536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9536 killed at Mon Mar 20 22:24:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9588 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9588 found at Mon Mar 20 22:24:04 UTC 2023 selfserv_9887 with PID 9588 started at Mon Mar 20 22:24:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #788: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9588 at Mon Mar 20 22:24:04 UTC 2023 kill -USR1 9588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9588 killed at Mon Mar 20 22:24:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9654 found at Mon Mar 20 22:24:05 UTC 2023 selfserv_9887 with PID 9654 started at Mon Mar 20 22:24:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9654 at Mon Mar 20 22:24:05 UTC 2023 kill -USR1 9654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9654 killed at Mon Mar 20 22:24:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9706 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9706 found at Mon Mar 20 22:24:05 UTC 2023 selfserv_9887 with PID 9706 started at Mon Mar 20 22:24:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9706 at Mon Mar 20 22:24:05 UTC 2023 kill -USR1 9706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9706 killed at Mon Mar 20 22:24:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9758 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9758 found at Mon Mar 20 22:24:06 UTC 2023 selfserv_9887 with PID 9758 started at Mon Mar 20 22:24:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9758 at Mon Mar 20 22:24:06 UTC 2023 kill -USR1 9758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9758 killed at Mon Mar 20 22:24:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9825 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9825 found at Mon Mar 20 22:24:06 UTC 2023 selfserv_9887 with PID 9825 started at Mon Mar 20 22:24:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9825 at Mon Mar 20 22:24:06 UTC 2023 kill -USR1 9825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9825 killed at Mon Mar 20 22:24:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9877 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9877 found at Mon Mar 20 22:24:07 UTC 2023 selfserv_9887 with PID 9877 started at Mon Mar 20 22:24:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9877 at Mon Mar 20 22:24:07 UTC 2023 kill -USR1 9877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9877 killed at Mon Mar 20 22:24:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9929 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9929 found at Mon Mar 20 22:24:07 UTC 2023 selfserv_9887 with PID 9929 started at Mon Mar 20 22:24:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #794: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9929 at Mon Mar 20 22:24:07 UTC 2023 kill -USR1 9929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9929 killed at Mon Mar 20 22:24:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9995 found at Mon Mar 20 22:24:08 UTC 2023 selfserv_9887 with PID 9995 started at Mon Mar 20 22:24:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #795: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9995 at Mon Mar 20 22:24:08 UTC 2023 kill -USR1 9995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9995 killed at Mon Mar 20 22:24:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10047 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10047 found at Mon Mar 20 22:24:08 UTC 2023 selfserv_9887 with PID 10047 started at Mon Mar 20 22:24:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10047 at Mon Mar 20 22:24:08 UTC 2023 kill -USR1 10047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10047 killed at Mon Mar 20 22:24:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10100 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10100 found at Mon Mar 20 22:24:09 UTC 2023 selfserv_9887 with PID 10100 started at Mon Mar 20 22:24:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #797: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10100 at Mon Mar 20 22:24:09 UTC 2023 kill -USR1 10100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10100 killed at Mon Mar 20 22:24:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10166 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10166 found at Mon Mar 20 22:24:09 UTC 2023 selfserv_9887 with PID 10166 started at Mon Mar 20 22:24:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #798: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10166 at Mon Mar 20 22:24:09 UTC 2023 kill -USR1 10166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10166 killed at Mon Mar 20 22:24:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10218 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10218 found at Mon Mar 20 22:24:10 UTC 2023 selfserv_9887 with PID 10218 started at Mon Mar 20 22:24:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10218 at Mon Mar 20 22:24:10 UTC 2023 kill -USR1 10218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10218 killed at Mon Mar 20 22:24:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10270 found at Mon Mar 20 22:24:10 UTC 2023 selfserv_9887 with PID 10270 started at Mon Mar 20 22:24:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10270 at Mon Mar 20 22:24:10 UTC 2023 kill -USR1 10270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10270 killed at Mon Mar 20 22:24:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10336 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10336 found at Mon Mar 20 22:24:11 UTC 2023 selfserv_9887 with PID 10336 started at Mon Mar 20 22:24:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #801: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10336 at Mon Mar 20 22:24:11 UTC 2023 kill -USR1 10336 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10336 killed at Mon Mar 20 22:24:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10388 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10388 found at Mon Mar 20 22:24:11 UTC 2023 selfserv_9887 with PID 10388 started at Mon Mar 20 22:24:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #802: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10388 at Mon Mar 20 22:24:11 UTC 2023 kill -USR1 10388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10388 killed at Mon Mar 20 22:24:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10440 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10440 found at Mon Mar 20 22:24:12 UTC 2023 selfserv_9887 with PID 10440 started at Mon Mar 20 22:24:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #803: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10440 at Mon Mar 20 22:24:12 UTC 2023 kill -USR1 10440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10440 killed at Mon Mar 20 22:24:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10506 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10506 found at Mon Mar 20 22:24:12 UTC 2023 selfserv_9887 with PID 10506 started at Mon Mar 20 22:24:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #804: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10506 at Mon Mar 20 22:24:12 UTC 2023 kill -USR1 10506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10506 killed at Mon Mar 20 22:24:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10558 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10558 found at Mon Mar 20 22:24:13 UTC 2023 selfserv_9887 with PID 10558 started at Mon Mar 20 22:24:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10558 at Mon Mar 20 22:24:13 UTC 2023 kill -USR1 10558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10558 killed at Mon Mar 20 22:24:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10610 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10610 found at Mon Mar 20 22:24:13 UTC 2023 selfserv_9887 with PID 10610 started at Mon Mar 20 22:24:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #806: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10610 at Mon Mar 20 22:24:13 UTC 2023 kill -USR1 10610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10610 killed at Mon Mar 20 22:24:13 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10677 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10677 found at Mon Mar 20 22:24:13 UTC 2023 selfserv_9887 with PID 10677 started at Mon Mar 20 22:24:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #807: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10677 at Mon Mar 20 22:24:14 UTC 2023 kill -USR1 10677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10677 killed at Mon Mar 20 22:24:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10729 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10729 found at Mon Mar 20 22:24:14 UTC 2023 selfserv_9887 with PID 10729 started at Mon Mar 20 22:24:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10729 at Mon Mar 20 22:24:14 UTC 2023 kill -USR1 10729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10729 killed at Mon Mar 20 22:24:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10781 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10781 found at Mon Mar 20 22:24:14 UTC 2023 selfserv_9887 with PID 10781 started at Mon Mar 20 22:24:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #809: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10781 at Mon Mar 20 22:24:15 UTC 2023 kill -USR1 10781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10781 killed at Mon Mar 20 22:24:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10847 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10847 found at Mon Mar 20 22:24:15 UTC 2023 selfserv_9887 with PID 10847 started at Mon Mar 20 22:24:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #810: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10847 at Mon Mar 20 22:24:15 UTC 2023 kill -USR1 10847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10847 killed at Mon Mar 20 22:24:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10899 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10899 found at Mon Mar 20 22:24:15 UTC 2023 selfserv_9887 with PID 10899 started at Mon Mar 20 22:24:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #811: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10899 at Mon Mar 20 22:24:15 UTC 2023 kill -USR1 10899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10899 killed at Mon Mar 20 22:24:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10951 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10951 found at Mon Mar 20 22:24:16 UTC 2023 selfserv_9887 with PID 10951 started at Mon Mar 20 22:24:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #812: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10951 at Mon Mar 20 22:24:16 UTC 2023 kill -USR1 10951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10951 killed at Mon Mar 20 22:24:16 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11017 found at Mon Mar 20 22:24:16 UTC 2023 selfserv_9887 with PID 11017 started at Mon Mar 20 22:24:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11017 at Mon Mar 20 22:24:16 UTC 2023 kill -USR1 11017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11017 killed at Mon Mar 20 22:24:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11069 found at Mon Mar 20 22:24:17 UTC 2023 selfserv_9887 with PID 11069 started at Mon Mar 20 22:24:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11069 at Mon Mar 20 22:24:17 UTC 2023 kill -USR1 11069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11069 killed at Mon Mar 20 22:24:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11121 found at Mon Mar 20 22:24:17 UTC 2023 selfserv_9887 with PID 11121 started at Mon Mar 20 22:24:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11121 at Mon Mar 20 22:24:17 UTC 2023 kill -USR1 11121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11121 killed at Mon Mar 20 22:24:17 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11188 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11188 found at Mon Mar 20 22:24:18 UTC 2023 selfserv_9887 with PID 11188 started at Mon Mar 20 22:24:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #816: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11188 at Mon Mar 20 22:24:18 UTC 2023 kill -USR1 11188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11188 killed at Mon Mar 20 22:24:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11240 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11240 found at Mon Mar 20 22:24:18 UTC 2023 selfserv_9887 with PID 11240 started at Mon Mar 20 22:24:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11240 at Mon Mar 20 22:24:18 UTC 2023 kill -USR1 11240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11240 killed at Mon Mar 20 22:24:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11292 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11292 found at Mon Mar 20 22:24:19 UTC 2023 selfserv_9887 with PID 11292 started at Mon Mar 20 22:24:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #818: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11292 at Mon Mar 20 22:24:19 UTC 2023 kill -USR1 11292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11292 killed at Mon Mar 20 22:24:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11358 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11358 found at Mon Mar 20 22:24:19 UTC 2023 selfserv_9887 with PID 11358 started at Mon Mar 20 22:24:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #819: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11358 at Mon Mar 20 22:24:19 UTC 2023 kill -USR1 11358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11358 killed at Mon Mar 20 22:24:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11410 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11410 found at Mon Mar 20 22:24:20 UTC 2023 selfserv_9887 with PID 11410 started at Mon Mar 20 22:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11410 at Mon Mar 20 22:24:20 UTC 2023 kill -USR1 11410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11410 killed at Mon Mar 20 22:24:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11462 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11462 found at Mon Mar 20 22:24:20 UTC 2023 selfserv_9887 with PID 11462 started at Mon Mar 20 22:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #821: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11462 at Mon Mar 20 22:24:20 UTC 2023 kill -USR1 11462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11462 killed at Mon Mar 20 22:24:20 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11529 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11529 found at Mon Mar 20 22:24:20 UTC 2023 selfserv_9887 with PID 11529 started at Mon Mar 20 22:24:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11529 at Mon Mar 20 22:24:21 UTC 2023 kill -USR1 11529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11529 killed at Mon Mar 20 22:24:21 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11581 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11581 found at Mon Mar 20 22:24:21 UTC 2023 selfserv_9887 with PID 11581 started at Mon Mar 20 22:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11581 at Mon Mar 20 22:24:21 UTC 2023 kill -USR1 11581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11581 killed at Mon Mar 20 22:24:21 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11634 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11634 found at Mon Mar 20 22:24:21 UTC 2023 selfserv_9887 with PID 11634 started at Mon Mar 20 22:24:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11634 at Mon Mar 20 22:24:22 UTC 2023 kill -USR1 11634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11634 killed at Mon Mar 20 22:24:22 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11700 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11700 found at Mon Mar 20 22:24:22 UTC 2023 selfserv_9887 with PID 11700 started at Mon Mar 20 22:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11700 at Mon Mar 20 22:24:22 UTC 2023 kill -USR1 11700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11700 killed at Mon Mar 20 22:24:22 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11753 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11753 found at Mon Mar 20 22:24:22 UTC 2023 selfserv_9887 with PID 11753 started at Mon Mar 20 22:24:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11753 at Mon Mar 20 22:24:23 UTC 2023 kill -USR1 11753 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11753 killed at Mon Mar 20 22:24:23 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11805 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11805 found at Mon Mar 20 22:24:23 UTC 2023 selfserv_9887 with PID 11805 started at Mon Mar 20 22:24:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11805 at Mon Mar 20 22:24:23 UTC 2023 kill -USR1 11805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11805 killed at Mon Mar 20 22:24:24 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11871 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11871 found at Mon Mar 20 22:24:24 UTC 2023 selfserv_9887 with PID 11871 started at Mon Mar 20 22:24:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #828: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 11871 at Mon Mar 20 22:24:24 UTC 2023 kill -USR1 11871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11871 killed at Mon Mar 20 22:24:24 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11923 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11923 found at Mon Mar 20 22:24:24 UTC 2023 selfserv_9887 with PID 11923 started at Mon Mar 20 22:24:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11923 at Mon Mar 20 22:24:25 UTC 2023 kill -USR1 11923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11923 killed at Mon Mar 20 22:24:25 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11975 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11975 found at Mon Mar 20 22:24:25 UTC 2023 selfserv_9887 with PID 11975 started at Mon Mar 20 22:24:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #830: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 11975 at Mon Mar 20 22:24:25 UTC 2023 kill -USR1 11975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11975 killed at Mon Mar 20 22:24:25 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12041 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12041 found at Mon Mar 20 22:24:26 UTC 2023 selfserv_9887 with PID 12041 started at Mon Mar 20 22:24:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #831: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12041 at Mon Mar 20 22:24:26 UTC 2023 kill -USR1 12041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12041 killed at Mon Mar 20 22:24:26 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12093 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12093 found at Mon Mar 20 22:24:26 UTC 2023 selfserv_9887 with PID 12093 started at Mon Mar 20 22:24:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12093 at Mon Mar 20 22:24:26 UTC 2023 kill -USR1 12093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12093 killed at Mon Mar 20 22:24:26 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12145 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12145 found at Mon Mar 20 22:24:27 UTC 2023 selfserv_9887 with PID 12145 started at Mon Mar 20 22:24:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12145 at Mon Mar 20 22:24:27 UTC 2023 kill -USR1 12145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12145 killed at Mon Mar 20 22:24:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12211 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12211 found at Mon Mar 20 22:24:27 UTC 2023 selfserv_9887 with PID 12211 started at Mon Mar 20 22:24:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #834: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12211 at Mon Mar 20 22:24:28 UTC 2023 kill -USR1 12211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12211 killed at Mon Mar 20 22:24:28 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12263 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12263 found at Mon Mar 20 22:24:28 UTC 2023 selfserv_9887 with PID 12263 started at Mon Mar 20 22:24:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12263 at Mon Mar 20 22:24:28 UTC 2023 kill -USR1 12263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12263 killed at Mon Mar 20 22:24:28 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12315 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12315 found at Mon Mar 20 22:24:29 UTC 2023 selfserv_9887 with PID 12315 started at Mon Mar 20 22:24:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #836: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12315 at Mon Mar 20 22:24:29 UTC 2023 kill -USR1 12315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12315 killed at Mon Mar 20 22:24:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12381 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12381 found at Mon Mar 20 22:24:29 UTC 2023 selfserv_9887 with PID 12381 started at Mon Mar 20 22:24:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12381 at Mon Mar 20 22:24:29 UTC 2023 kill -USR1 12381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12381 killed at Mon Mar 20 22:24:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12433 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12433 found at Mon Mar 20 22:24:30 UTC 2023 selfserv_9887 with PID 12433 started at Mon Mar 20 22:24:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12433 at Mon Mar 20 22:24:30 UTC 2023 kill -USR1 12433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12433 killed at Mon Mar 20 22:24:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12485 found at Mon Mar 20 22:24:30 UTC 2023 selfserv_9887 with PID 12485 started at Mon Mar 20 22:24:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12485 at Mon Mar 20 22:24:30 UTC 2023 kill -USR1 12485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12485 killed at Mon Mar 20 22:24:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12553 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12553 found at Mon Mar 20 22:24:30 UTC 2023 selfserv_9887 with PID 12553 started at Mon Mar 20 22:24:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #840: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12553 at Mon Mar 20 22:24:31 UTC 2023 kill -USR1 12553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12553 killed at Mon Mar 20 22:24:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12605 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12605 found at Mon Mar 20 22:24:31 UTC 2023 selfserv_9887 with PID 12605 started at Mon Mar 20 22:24:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12605 at Mon Mar 20 22:24:31 UTC 2023 kill -USR1 12605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12605 killed at Mon Mar 20 22:24:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12659 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12659 found at Mon Mar 20 22:24:31 UTC 2023 selfserv_9887 with PID 12659 started at Mon Mar 20 22:24:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #842: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12659 at Mon Mar 20 22:24:31 UTC 2023 kill -USR1 12659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12659 killed at Mon Mar 20 22:24:32 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12729 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12729 found at Mon Mar 20 22:24:32 UTC 2023 selfserv_9887 with PID 12729 started at Mon Mar 20 22:24:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #843: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12729 at Mon Mar 20 22:24:32 UTC 2023 kill -USR1 12729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12729 killed at Mon Mar 20 22:24:32 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12784 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12784 found at Mon Mar 20 22:24:32 UTC 2023 selfserv_9887 with PID 12784 started at Mon Mar 20 22:24:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12784 at Mon Mar 20 22:24:32 UTC 2023 kill -USR1 12784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12784 killed at Mon Mar 20 22:24:32 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12838 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12838 found at Mon Mar 20 22:24:33 UTC 2023 selfserv_9887 with PID 12838 started at Mon Mar 20 22:24:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #845: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12838 at Mon Mar 20 22:24:33 UTC 2023 kill -USR1 12838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12838 killed at Mon Mar 20 22:24:33 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12906 found at Mon Mar 20 22:24:33 UTC 2023 selfserv_9887 with PID 12906 started at Mon Mar 20 22:24:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #846: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12906 at Mon Mar 20 22:24:33 UTC 2023 kill -USR1 12906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12906 killed at Mon Mar 20 22:24:33 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12958 found at Mon Mar 20 22:24:33 UTC 2023 selfserv_9887 with PID 12958 started at Mon Mar 20 22:24:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12958 at Mon Mar 20 22:24:34 UTC 2023 kill -USR1 12958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12958 killed at Mon Mar 20 22:24:34 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13010 found at Mon Mar 20 22:24:34 UTC 2023 selfserv_9887 with PID 13010 started at Mon Mar 20 22:24:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #848: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 13010 at Mon Mar 20 22:24:34 UTC 2023 kill -USR1 13010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13010 killed at Mon Mar 20 22:24:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13076 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13076 found at Mon Mar 20 22:24:34 UTC 2023 selfserv_9887 with PID 13076 started at Mon Mar 20 22:24:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13076 at Mon Mar 20 22:24:35 UTC 2023 kill -USR1 13076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13076 killed at Mon Mar 20 22:24:35 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13128 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13128 found at Mon Mar 20 22:24:35 UTC 2023 selfserv_9887 with PID 13128 started at Mon Mar 20 22:24:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #850: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13128 at Mon Mar 20 22:24:36 UTC 2023 kill -USR1 13128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13128 killed at Mon Mar 20 22:24:36 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13180 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13180 found at Mon Mar 20 22:24:36 UTC 2023 selfserv_9887 with PID 13180 started at Mon Mar 20 22:24:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13180 at Mon Mar 20 22:24:37 UTC 2023 kill -USR1 13180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13180 killed at Mon Mar 20 22:24:37 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13246 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13246 found at Mon Mar 20 22:24:37 UTC 2023 selfserv_9887 with PID 13246 started at Mon Mar 20 22:24:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #852: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13246 at Mon Mar 20 22:24:37 UTC 2023 kill -USR1 13246 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13246 killed at Mon Mar 20 22:24:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13298 found at Mon Mar 20 22:24:38 UTC 2023 selfserv_9887 with PID 13298 started at Mon Mar 20 22:24:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13298 at Mon Mar 20 22:24:38 UTC 2023 kill -USR1 13298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13298 killed at Mon Mar 20 22:24:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13350 found at Mon Mar 20 22:24:39 UTC 2023 selfserv_9887 with PID 13350 started at Mon Mar 20 22:24:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #854: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13350 at Mon Mar 20 22:24:39 UTC 2023 kill -USR1 13350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13350 killed at Mon Mar 20 22:24:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13416 found at Mon Mar 20 22:24:39 UTC 2023 selfserv_9887 with PID 13416 started at Mon Mar 20 22:24:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #855: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13416 at Mon Mar 20 22:24:40 UTC 2023 kill -USR1 13416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13416 killed at Mon Mar 20 22:24:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13471 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13471 found at Mon Mar 20 22:24:40 UTC 2023 selfserv_9887 with PID 13471 started at Mon Mar 20 22:24:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #856: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13471 at Mon Mar 20 22:24:41 UTC 2023 kill -USR1 13471 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13471 killed at Mon Mar 20 22:24:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13527 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13527 found at Mon Mar 20 22:24:41 UTC 2023 selfserv_9887 with PID 13527 started at Mon Mar 20 22:24:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #857: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13527 at Mon Mar 20 22:24:42 UTC 2023 kill -USR1 13527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13527 killed at Mon Mar 20 22:24:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13593 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13593 found at Mon Mar 20 22:24:42 UTC 2023 selfserv_9887 with PID 13593 started at Mon Mar 20 22:24:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #858: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13593 at Mon Mar 20 22:24:42 UTC 2023 kill -USR1 13593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13593 killed at Mon Mar 20 22:24:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13646 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13646 found at Mon Mar 20 22:24:43 UTC 2023 selfserv_9887 with PID 13646 started at Mon Mar 20 22:24:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #859: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13646 at Mon Mar 20 22:24:43 UTC 2023 kill -USR1 13646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13646 killed at Mon Mar 20 22:24:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13705 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13705 found at Mon Mar 20 22:24:44 UTC 2023 selfserv_9887 with PID 13705 started at Mon Mar 20 22:24:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #860: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13705 at Mon Mar 20 22:24:44 UTC 2023 kill -USR1 13705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13705 killed at Mon Mar 20 22:24:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13771 found at Mon Mar 20 22:24:44 UTC 2023 selfserv_9887 with PID 13771 started at Mon Mar 20 22:24:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #861: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13771 at Mon Mar 20 22:24:45 UTC 2023 kill -USR1 13771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13771 killed at Mon Mar 20 22:24:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13823 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13823 found at Mon Mar 20 22:24:45 UTC 2023 selfserv_9887 with PID 13823 started at Mon Mar 20 22:24:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #862: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13823 at Mon Mar 20 22:24:46 UTC 2023 kill -USR1 13823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13823 killed at Mon Mar 20 22:24:46 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13875 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13875 found at Mon Mar 20 22:24:46 UTC 2023 selfserv_9887 with PID 13875 started at Mon Mar 20 22:24:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #863: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13875 at Mon Mar 20 22:24:47 UTC 2023 kill -USR1 13875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13875 killed at Mon Mar 20 22:24:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13941 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13941 found at Mon Mar 20 22:24:47 UTC 2023 selfserv_9887 with PID 13941 started at Mon Mar 20 22:24:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #864: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 13941 at Mon Mar 20 22:24:48 UTC 2023 kill -USR1 13941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13941 killed at Mon Mar 20 22:24:48 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13993 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13993 found at Mon Mar 20 22:24:48 UTC 2023 selfserv_9887 with PID 13993 started at Mon Mar 20 22:24:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #865: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13993 at Mon Mar 20 22:24:48 UTC 2023 kill -USR1 13993 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13993 killed at Mon Mar 20 22:24:48 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14046 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14046 found at Mon Mar 20 22:24:49 UTC 2023 selfserv_9887 with PID 14046 started at Mon Mar 20 22:24:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #866: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14046 at Mon Mar 20 22:24:49 UTC 2023 kill -USR1 14046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14046 killed at Mon Mar 20 22:24:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14112 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14112 found at Mon Mar 20 22:24:50 UTC 2023 selfserv_9887 with PID 14112 started at Mon Mar 20 22:24:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #867: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14112 at Mon Mar 20 22:24:50 UTC 2023 kill -USR1 14112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14112 killed at Mon Mar 20 22:24:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14164 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14164 found at Mon Mar 20 22:24:50 UTC 2023 selfserv_9887 with PID 14164 started at Mon Mar 20 22:24:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #868: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14164 at Mon Mar 20 22:24:51 UTC 2023 kill -USR1 14164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14164 killed at Mon Mar 20 22:24:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14216 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14216 found at Mon Mar 20 22:24:51 UTC 2023 selfserv_9887 with PID 14216 started at Mon Mar 20 22:24:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #869: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14216 at Mon Mar 20 22:24:52 UTC 2023 kill -USR1 14216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14216 killed at Mon Mar 20 22:24:52 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14283 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14283 found at Mon Mar 20 22:24:52 UTC 2023 selfserv_9887 with PID 14283 started at Mon Mar 20 22:24:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #870: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14283 at Mon Mar 20 22:24:52 UTC 2023 kill -USR1 14283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14283 killed at Mon Mar 20 22:24:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14335 found at Mon Mar 20 22:24:53 UTC 2023 selfserv_9887 with PID 14335 started at Mon Mar 20 22:24:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #871: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14335 at Mon Mar 20 22:24:53 UTC 2023 kill -USR1 14335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14335 killed at Mon Mar 20 22:24:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14387 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14387 found at Mon Mar 20 22:24:54 UTC 2023 selfserv_9887 with PID 14387 started at Mon Mar 20 22:24:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #872: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14387 at Mon Mar 20 22:24:54 UTC 2023 kill -USR1 14387 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14387 killed at Mon Mar 20 22:24:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14453 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14453 found at Mon Mar 20 22:24:54 UTC 2023 selfserv_9887 with PID 14453 started at Mon Mar 20 22:24:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #873: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14453 at Mon Mar 20 22:24:55 UTC 2023 kill -USR1 14453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14453 killed at Mon Mar 20 22:24:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14505 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14505 found at Mon Mar 20 22:24:55 UTC 2023 selfserv_9887 with PID 14505 started at Mon Mar 20 22:24:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #874: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14505 at Mon Mar 20 22:24:55 UTC 2023 kill -USR1 14505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14505 killed at Mon Mar 20 22:24:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14557 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14557 found at Mon Mar 20 22:24:55 UTC 2023 selfserv_9887 with PID 14557 started at Mon Mar 20 22:24:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #875: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14557 at Mon Mar 20 22:24:56 UTC 2023 kill -USR1 14557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14557 killed at Mon Mar 20 22:24:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14623 found at Mon Mar 20 22:24:56 UTC 2023 selfserv_9887 with PID 14623 started at Mon Mar 20 22:24:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #876: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14623 at Mon Mar 20 22:24:56 UTC 2023 kill -USR1 14623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14623 killed at Mon Mar 20 22:24:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14675 found at Mon Mar 20 22:24:56 UTC 2023 selfserv_9887 with PID 14675 started at Mon Mar 20 22:24:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #877: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14675 at Mon Mar 20 22:24:57 UTC 2023 kill -USR1 14675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14675 killed at Mon Mar 20 22:24:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14727 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14727 found at Mon Mar 20 22:24:57 UTC 2023 selfserv_9887 with PID 14727 started at Mon Mar 20 22:24:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #878: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14727 at Mon Mar 20 22:24:57 UTC 2023 kill -USR1 14727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14727 killed at Mon Mar 20 22:24:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14793 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14793 found at Mon Mar 20 22:24:57 UTC 2023 selfserv_9887 with PID 14793 started at Mon Mar 20 22:24:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #879: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14793 at Mon Mar 20 22:24:58 UTC 2023 kill -USR1 14793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14793 killed at Mon Mar 20 22:24:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14846 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14846 found at Mon Mar 20 22:24:58 UTC 2023 selfserv_9887 with PID 14846 started at Mon Mar 20 22:24:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #880: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14846 at Mon Mar 20 22:24:58 UTC 2023 kill -USR1 14846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14846 killed at Mon Mar 20 22:24:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:24:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14898 found at Mon Mar 20 22:24:58 UTC 2023 selfserv_9887 with PID 14898 started at Mon Mar 20 22:24:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #881: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14898 at Mon Mar 20 22:24:59 UTC 2023 kill -USR1 14898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14898 killed at Mon Mar 20 22:24:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14964 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14964 found at Mon Mar 20 22:24:59 UTC 2023 selfserv_9887 with PID 14964 started at Mon Mar 20 22:24:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #882: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14964 at Mon Mar 20 22:24:59 UTC 2023 kill -USR1 14964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14964 killed at Mon Mar 20 22:24:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:24:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:24:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15016 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15016 found at Mon Mar 20 22:24:59 UTC 2023 selfserv_9887 with PID 15016 started at Mon Mar 20 22:24:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #883: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15016 at Mon Mar 20 22:25:00 UTC 2023 kill -USR1 15016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15016 killed at Mon Mar 20 22:25:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15068 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15068 found at Mon Mar 20 22:25:00 UTC 2023 selfserv_9887 with PID 15068 started at Mon Mar 20 22:25:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #884: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15068 at Mon Mar 20 22:25:00 UTC 2023 kill -USR1 15068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15068 killed at Mon Mar 20 22:25:00 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15134 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15134 found at Mon Mar 20 22:25:00 UTC 2023 selfserv_9887 with PID 15134 started at Mon Mar 20 22:25:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #885: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15134 at Mon Mar 20 22:25:01 UTC 2023 kill -USR1 15134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15134 killed at Mon Mar 20 22:25:01 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15186 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15186 found at Mon Mar 20 22:25:01 UTC 2023 selfserv_9887 with PID 15186 started at Mon Mar 20 22:25:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #886: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15186 at Mon Mar 20 22:25:02 UTC 2023 kill -USR1 15186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15186 killed at Mon Mar 20 22:25:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15238 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15238 found at Mon Mar 20 22:25:02 UTC 2023 selfserv_9887 with PID 15238 started at Mon Mar 20 22:25:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #887: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15238 at Mon Mar 20 22:25:02 UTC 2023 kill -USR1 15238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15238 killed at Mon Mar 20 22:25:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15304 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15304 found at Mon Mar 20 22:25:03 UTC 2023 selfserv_9887 with PID 15304 started at Mon Mar 20 22:25:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #888: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15304 at Mon Mar 20 22:25:03 UTC 2023 kill -USR1 15304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15304 killed at Mon Mar 20 22:25:03 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15356 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15356 found at Mon Mar 20 22:25:03 UTC 2023 selfserv_9887 with PID 15356 started at Mon Mar 20 22:25:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #889: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15356 at Mon Mar 20 22:25:03 UTC 2023 kill -USR1 15356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15356 killed at Mon Mar 20 22:25:03 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15408 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15408 found at Mon Mar 20 22:25:04 UTC 2023 selfserv_9887 with PID 15408 started at Mon Mar 20 22:25:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #890: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15408 at Mon Mar 20 22:25:04 UTC 2023 kill -USR1 15408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15408 killed at Mon Mar 20 22:25:04 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/authin.tl.tmp 0 selfserv_9887 starting at Mon Mar 20 22:25:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:04 UTC 2023 selfserv_9887 with PID 15479 started at Mon Mar 20 22:25:04 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:04 UTC 2023 ssl.sh: #717: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:05 UTC 2023 ssl.sh: #718: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:05 UTC 2023 ssl.sh: #719: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:05 UTC 2023 ssl.sh: #720: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:06 UTC 2023 ssl.sh: #721: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:06 UTC 2023 ssl.sh: #722: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:06 UTC 2023 ssl.sh: #723: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:07 UTC 2023 ssl.sh: #724: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:07 UTC 2023 ssl.sh: #725: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:07 UTC 2023 ssl.sh: #726: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:08 UTC 2023 ssl.sh: #727: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:08 UTC 2023 ssl.sh: #728: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:08 UTC 2023 ssl.sh: #729: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #730: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:09 UTC 2023 ssl.sh: #731: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:09 UTC 2023 ssl.sh: #732: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:10 UTC 2023 ssl.sh: #733: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:10 UTC 2023 ssl.sh: #734: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:10 UTC 2023 ssl.sh: #735: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:10 UTC 2023 ssl.sh: #736: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:11 UTC 2023 ssl.sh: #737: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:11 UTC 2023 ssl.sh: #738: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:11 UTC 2023 ssl.sh: #739: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:12 UTC 2023 ssl.sh: #740: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:12 UTC 2023 ssl.sh: #741: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:12 UTC 2023 ssl.sh: #742: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:13 UTC 2023 ssl.sh: #743: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #744: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:13 UTC 2023 ssl.sh: #745: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:14 UTC 2023 ssl.sh: #746: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:14 UTC 2023 ssl.sh: #747: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:14 UTC 2023 ssl.sh: #748: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:14 UTC 2023 ssl.sh: #749: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:15 UTC 2023 ssl.sh: #750: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:15 UTC 2023 ssl.sh: #751: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:15 UTC 2023 ssl.sh: #752: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:16 UTC 2023 ssl.sh: #753: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:16 UTC 2023 ssl.sh: #754: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:16 UTC 2023 ssl.sh: #755: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:16 UTC 2023 ssl.sh: #756: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15479 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15479 found at Mon Mar 20 22:25:17 UTC 2023 ssl.sh: #757: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 15479 at Mon Mar 20 22:25:17 UTC 2023 kill -USR1 15479 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15479 killed at Mon Mar 20 22:25:17 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:17 UTC 2023 selfserv_9887 with PID 16740 started at Mon Mar 20 22:25:17 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:17 UTC 2023 ssl.sh: #758: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:17 UTC 2023 ssl.sh: #759: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:17 UTC 2023 ssl.sh: #760: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:18 UTC 2023 ssl.sh: #761: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:18 UTC 2023 ssl.sh: #762: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:18 UTC 2023 ssl.sh: #763: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:18 UTC 2023 ssl.sh: #764: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:18 UTC 2023 ssl.sh: #765: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:19 UTC 2023 ssl.sh: #766: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:19 UTC 2023 ssl.sh: #767: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:19 UTC 2023 ssl.sh: #768: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:19 UTC 2023 ssl.sh: #769: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:19 UTC 2023 ssl.sh: #770: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #771: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:20 UTC 2023 ssl.sh: #772: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:20 UTC 2023 ssl.sh: #773: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:20 UTC 2023 ssl.sh: #774: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:20 UTC 2023 ssl.sh: #775: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:20 UTC 2023 ssl.sh: #776: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:21 UTC 2023 ssl.sh: #777: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:21 UTC 2023 ssl.sh: #778: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:21 UTC 2023 ssl.sh: #779: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:21 UTC 2023 ssl.sh: #780: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:21 UTC 2023 ssl.sh: #781: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:21 UTC 2023 ssl.sh: #782: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:22 UTC 2023 ssl.sh: #783: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:22 UTC 2023 ssl.sh: #784: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #785: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:22 UTC 2023 ssl.sh: #786: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:22 UTC 2023 ssl.sh: #787: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #788: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #789: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #790: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #791: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #792: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #793: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:23 UTC 2023 ssl.sh: #794: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:24 UTC 2023 ssl.sh: #795: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:24 UTC 2023 ssl.sh: #796: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:24 UTC 2023 ssl.sh: #797: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16740 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16740 found at Mon Mar 20 22:25:24 UTC 2023 ssl.sh: #798: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 16740 at Mon Mar 20 22:25:24 UTC 2023 kill -USR1 16740 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16740 killed at Mon Mar 20 22:25:24 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:24 UTC 2023 selfserv_9887 with PID 18009 started at Mon Mar 20 22:25:24 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:25 UTC 2023 ssl.sh: #799: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:25 UTC 2023 ssl.sh: #800: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:25 UTC 2023 ssl.sh: #801: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:26 UTC 2023 ssl.sh: #802: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:26 UTC 2023 ssl.sh: #803: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:26 UTC 2023 ssl.sh: #804: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:27 UTC 2023 ssl.sh: #805: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:27 UTC 2023 ssl.sh: #806: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:27 UTC 2023 ssl.sh: #807: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:28 UTC 2023 ssl.sh: #808: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:28 UTC 2023 ssl.sh: #809: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:29 UTC 2023 ssl.sh: #810: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:29 UTC 2023 ssl.sh: #811: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #812: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:30 UTC 2023 ssl.sh: #813: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:30 UTC 2023 ssl.sh: #814: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:30 UTC 2023 ssl.sh: #815: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:31 UTC 2023 ssl.sh: #816: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:31 UTC 2023 ssl.sh: #817: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:31 UTC 2023 ssl.sh: #818: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:31 UTC 2023 ssl.sh: #819: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:32 UTC 2023 ssl.sh: #820: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:32 UTC 2023 ssl.sh: #821: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:32 UTC 2023 ssl.sh: #822: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:33 UTC 2023 ssl.sh: #823: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:33 UTC 2023 ssl.sh: #824: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:33 UTC 2023 ssl.sh: #825: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #826: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:34 UTC 2023 ssl.sh: #827: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:34 UTC 2023 ssl.sh: #828: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:35 UTC 2023 ssl.sh: #829: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:35 UTC 2023 ssl.sh: #830: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:35 UTC 2023 ssl.sh: #831: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:36 UTC 2023 ssl.sh: #832: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:36 UTC 2023 ssl.sh: #833: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:36 UTC 2023 ssl.sh: #834: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:37 UTC 2023 ssl.sh: #835: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:37 UTC 2023 ssl.sh: #836: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:37 UTC 2023 ssl.sh: #837: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:38 UTC 2023 ssl.sh: #838: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18009 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18009 found at Mon Mar 20 22:25:38 UTC 2023 ssl.sh: #839: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 18009 at Mon Mar 20 22:25:38 UTC 2023 kill -USR1 18009 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18009 killed at Mon Mar 20 22:25:38 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:38 UTC 2023 selfserv_9887 with PID 19270 started at Mon Mar 20 22:25:38 UTC 2023 Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:38 UTC 2023 ssl.sh: #840: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:38 UTC 2023 ssl.sh: #841: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:39 UTC 2023 ssl.sh: #842: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:39 UTC 2023 ssl.sh: #843: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:39 UTC 2023 ssl.sh: #844: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:39 UTC 2023 ssl.sh: #845: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:39 UTC 2023 ssl.sh: #846: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:39 UTC 2023 ssl.sh: #847: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:40 UTC 2023 ssl.sh: #848: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:40 UTC 2023 ssl.sh: #849: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:40 UTC 2023 ssl.sh: #850: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:40 UTC 2023 ssl.sh: #851: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:40 UTC 2023 ssl.sh: #852: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #853: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:41 UTC 2023 ssl.sh: #854: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:41 UTC 2023 ssl.sh: #855: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:41 UTC 2023 ssl.sh: #856: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:41 UTC 2023 ssl.sh: #857: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:42 UTC 2023 ssl.sh: #858: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:42 UTC 2023 ssl.sh: #859: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:42 UTC 2023 ssl.sh: #860: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:42 UTC 2023 ssl.sh: #861: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:42 UTC 2023 ssl.sh: #862: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:42 UTC 2023 ssl.sh: #863: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:43 UTC 2023 ssl.sh: #864: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:43 UTC 2023 ssl.sh: #865: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:43 UTC 2023 ssl.sh: #866: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #867: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:43 UTC 2023 ssl.sh: #868: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #869: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #870: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #871: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #872: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #873: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #874: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:44 UTC 2023 ssl.sh: #875: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:45 UTC 2023 ssl.sh: #876: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:45 UTC 2023 ssl.sh: #877: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:45 UTC 2023 ssl.sh: #878: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:45 UTC 2023 ssl.sh: #879: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19270 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19270 found at Mon Mar 20 22:25:45 UTC 2023 ssl.sh: #880: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 19270 at Mon Mar 20 22:25:45 UTC 2023 kill -USR1 19270 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19270 killed at Mon Mar 20 22:25:45 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:25:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20550 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20550 found at Mon Mar 20 22:25:46 UTC 2023 selfserv_9887 with PID 20550 started at Mon Mar 20 22:25:46 UTC 2023 trying to kill selfserv_9887 with PID 20550 at Mon Mar 20 22:25:46 UTC 2023 kill -USR1 20550 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20550 killed at Mon Mar 20 22:25:46 UTC 2023 selfserv_9887 starting at Mon Mar 20 22:25:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:25:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:46 UTC 2023 selfserv_9887 with PID 20592 started at Mon Mar 20 22:25:46 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:46 UTC 2023 ssl.sh: #881: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:47 UTC 2023 ssl.sh: #882: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:47 UTC 2023 ssl.sh: #883: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:48 UTC 2023 ssl.sh: #884: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:48 UTC 2023 ssl.sh: #885: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:49 UTC 2023 ssl.sh: #886: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:49 UTC 2023 ssl.sh: #887: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:50 UTC 2023 ssl.sh: #888: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:50 UTC 2023 ssl.sh: #889: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:51 UTC 2023 ssl.sh: #890: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:51 UTC 2023 ssl.sh: #891: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:52 UTC 2023 ssl.sh: #892: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:52 UTC 2023 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #894: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:53 UTC 2023 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:54 UTC 2023 ssl.sh: #896: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:54 UTC 2023 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:55 UTC 2023 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:55 UTC 2023 ssl.sh: #899: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:56 UTC 2023 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:56 UTC 2023 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:57 UTC 2023 ssl.sh: #902: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:57 UTC 2023 ssl.sh: #903: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:58 UTC 2023 ssl.sh: #904: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:58 UTC 2023 ssl.sh: #905: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:59 UTC 2023 ssl.sh: #906: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:25:59 UTC 2023 ssl.sh: #907: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #908: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:00 UTC 2023 ssl.sh: #909: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:01 UTC 2023 ssl.sh: #910: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:01 UTC 2023 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:02 UTC 2023 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:02 UTC 2023 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:03 UTC 2023 ssl.sh: #914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:03 UTC 2023 ssl.sh: #915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:04 UTC 2023 ssl.sh: #916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:04 UTC 2023 ssl.sh: #917: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:05 UTC 2023 ssl.sh: #918: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:05 UTC 2023 ssl.sh: #919: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:06 UTC 2023 ssl.sh: #920: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20592 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20592 found at Mon Mar 20 22:26:06 UTC 2023 ssl.sh: #921: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20592 at Mon Mar 20 22:26:06 UTC 2023 kill -USR1 20592 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20592 killed at Mon Mar 20 22:26:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:26:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:26:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:06 UTC 2023 selfserv_9887 with PID 21852 started at Mon Mar 20 22:26:06 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:07 UTC 2023 ssl.sh: #922: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:07 UTC 2023 ssl.sh: #923: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:08 UTC 2023 ssl.sh: #924: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:08 UTC 2023 ssl.sh: #925: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:09 UTC 2023 ssl.sh: #926: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:10 UTC 2023 ssl.sh: #927: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:10 UTC 2023 ssl.sh: #928: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:11 UTC 2023 ssl.sh: #929: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:11 UTC 2023 ssl.sh: #930: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:12 UTC 2023 ssl.sh: #931: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:12 UTC 2023 ssl.sh: #932: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:13 UTC 2023 ssl.sh: #933: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:13 UTC 2023 ssl.sh: #934: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #935: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:14 UTC 2023 ssl.sh: #936: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:15 UTC 2023 ssl.sh: #937: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:15 UTC 2023 ssl.sh: #938: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:16 UTC 2023 ssl.sh: #939: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:16 UTC 2023 ssl.sh: #940: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:17 UTC 2023 ssl.sh: #941: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:18 UTC 2023 ssl.sh: #942: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:18 UTC 2023 ssl.sh: #943: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:19 UTC 2023 ssl.sh: #944: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:19 UTC 2023 ssl.sh: #945: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:20 UTC 2023 ssl.sh: #946: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:20 UTC 2023 ssl.sh: #947: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:21 UTC 2023 ssl.sh: #948: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #949: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:22 UTC 2023 ssl.sh: #950: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:22 UTC 2023 ssl.sh: #951: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:23 UTC 2023 ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:23 UTC 2023 ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:24 UTC 2023 ssl.sh: #954: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:24 UTC 2023 ssl.sh: #955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:25 UTC 2023 ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:25 UTC 2023 ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:26 UTC 2023 ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:27 UTC 2023 ssl.sh: #959: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:27 UTC 2023 ssl.sh: #960: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:28 UTC 2023 ssl.sh: #961: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21852 found at Mon Mar 20 22:26:28 UTC 2023 ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21852 at Mon Mar 20 22:26:28 UTC 2023 kill -USR1 21852 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21852 killed at Mon Mar 20 22:26:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:26:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:26:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:28 UTC 2023 selfserv_9887 with PID 23114 started at Mon Mar 20 22:26:28 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:29 UTC 2023 ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:29 UTC 2023 ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:29 UTC 2023 ssl.sh: #965: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:29 UTC 2023 ssl.sh: #966: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:29 UTC 2023 ssl.sh: #967: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:30 UTC 2023 ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:30 UTC 2023 ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:30 UTC 2023 ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:30 UTC 2023 ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:30 UTC 2023 ssl.sh: #972: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:31 UTC 2023 ssl.sh: #973: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:31 UTC 2023 ssl.sh: #974: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:31 UTC 2023 ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #976: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:32 UTC 2023 ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:32 UTC 2023 ssl.sh: #978: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:32 UTC 2023 ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:32 UTC 2023 ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:33 UTC 2023 ssl.sh: #981: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:33 UTC 2023 ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:33 UTC 2023 ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:33 UTC 2023 ssl.sh: #984: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:34 UTC 2023 ssl.sh: #985: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:34 UTC 2023 ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:34 UTC 2023 ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:34 UTC 2023 ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:34 UTC 2023 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #990: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:35 UTC 2023 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:35 UTC 2023 ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:35 UTC 2023 ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:36 UTC 2023 ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:36 UTC 2023 ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:36 UTC 2023 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:36 UTC 2023 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:36 UTC 2023 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:37 UTC 2023 ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:37 UTC 2023 ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:37 UTC 2023 ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:37 UTC 2023 ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23114 found at Mon Mar 20 22:26:38 UTC 2023 ssl.sh: #1003: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 23114 at Mon Mar 20 22:26:38 UTC 2023 kill -USR1 23114 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23114 killed at Mon Mar 20 22:26:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:26:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:26:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:38 UTC 2023 selfserv_9887 with PID 24379 started at Mon Mar 20 22:26:38 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:38 UTC 2023 ssl.sh: #1004: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:39 UTC 2023 ssl.sh: #1005: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:39 UTC 2023 ssl.sh: #1006: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:40 UTC 2023 ssl.sh: #1007: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:40 UTC 2023 ssl.sh: #1008: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:41 UTC 2023 ssl.sh: #1009: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:42 UTC 2023 ssl.sh: #1010: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:42 UTC 2023 ssl.sh: #1011: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:43 UTC 2023 ssl.sh: #1012: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:43 UTC 2023 ssl.sh: #1013: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:44 UTC 2023 ssl.sh: #1014: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:44 UTC 2023 ssl.sh: #1015: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:45 UTC 2023 ssl.sh: #1016: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:45 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1017: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:46 UTC 2023 ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:46 UTC 2023 ssl.sh: #1019: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:47 UTC 2023 ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:47 UTC 2023 ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:48 UTC 2023 ssl.sh: #1022: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:48 UTC 2023 ssl.sh: #1023: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:49 UTC 2023 ssl.sh: #1024: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:49 UTC 2023 ssl.sh: #1025: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:50 UTC 2023 ssl.sh: #1026: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:50 UTC 2023 ssl.sh: #1027: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:51 UTC 2023 ssl.sh: #1028: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:51 UTC 2023 ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:52 UTC 2023 ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1031: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:53 UTC 2023 ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:54 UTC 2023 ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:54 UTC 2023 ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:54 UTC 2023 ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:55 UTC 2023 ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:55 UTC 2023 ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:56 UTC 2023 ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:56 UTC 2023 ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:57 UTC 2023 ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:57 UTC 2023 ssl.sh: #1041: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:58 UTC 2023 ssl.sh: #1042: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:58 UTC 2023 ssl.sh: #1043: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24379 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24379 found at Mon Mar 20 22:26:59 UTC 2023 ssl.sh: #1044: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24379 at Mon Mar 20 22:26:59 UTC 2023 kill -USR1 24379 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24379 killed at Mon Mar 20 22:26:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:26:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:26:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:26:59 UTC 2023 selfserv_9887 with PID 25654 started at Mon Mar 20 22:26:59 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:00 UTC 2023 ssl.sh: #1045: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:00 UTC 2023 ssl.sh: #1046: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:01 UTC 2023 ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:01 UTC 2023 ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:02 UTC 2023 ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:03 UTC 2023 ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:03 UTC 2023 ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:04 UTC 2023 ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:04 UTC 2023 ssl.sh: #1053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:05 UTC 2023 ssl.sh: #1054: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:05 UTC 2023 ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:06 UTC 2023 ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:07 UTC 2023 ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1058: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:08 UTC 2023 ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:08 UTC 2023 ssl.sh: #1060: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:09 UTC 2023 ssl.sh: #1061: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:09 UTC 2023 ssl.sh: #1062: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:10 UTC 2023 ssl.sh: #1063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:10 UTC 2023 ssl.sh: #1064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:11 UTC 2023 ssl.sh: #1065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:11 UTC 2023 ssl.sh: #1066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:12 UTC 2023 ssl.sh: #1067: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:12 UTC 2023 ssl.sh: #1068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:13 UTC 2023 ssl.sh: #1069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:14 UTC 2023 ssl.sh: #1070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:14 UTC 2023 ssl.sh: #1071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1072: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:15 UTC 2023 ssl.sh: #1073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:16 UTC 2023 ssl.sh: #1074: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:16 UTC 2023 ssl.sh: #1075: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:17 UTC 2023 ssl.sh: #1076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:17 UTC 2023 ssl.sh: #1077: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:18 UTC 2023 ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:19 UTC 2023 ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:19 UTC 2023 ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:20 UTC 2023 ssl.sh: #1081: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:20 UTC 2023 ssl.sh: #1082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:21 UTC 2023 ssl.sh: #1083: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:21 UTC 2023 ssl.sh: #1084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25654 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25654 found at Mon Mar 20 22:27:22 UTC 2023 ssl.sh: #1085: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25654 at Mon Mar 20 22:27:22 UTC 2023 kill -USR1 25654 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25654 killed at Mon Mar 20 22:27:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:27:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:27:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:22 UTC 2023 selfserv_9887 with PID 26917 started at Mon Mar 20 22:27:22 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:22 UTC 2023 ssl.sh: #1086: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:23 UTC 2023 ssl.sh: #1087: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:23 UTC 2023 ssl.sh: #1088: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:23 UTC 2023 ssl.sh: #1089: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:23 UTC 2023 ssl.sh: #1090: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:23 UTC 2023 ssl.sh: #1091: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:24 UTC 2023 ssl.sh: #1092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:24 UTC 2023 ssl.sh: #1093: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:24 UTC 2023 ssl.sh: #1094: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:24 UTC 2023 ssl.sh: #1095: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:25 UTC 2023 ssl.sh: #1096: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:25 UTC 2023 ssl.sh: #1097: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:25 UTC 2023 ssl.sh: #1098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:26 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1099: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:26 UTC 2023 ssl.sh: #1100: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:26 UTC 2023 ssl.sh: #1101: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:26 UTC 2023 ssl.sh: #1102: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:27 UTC 2023 ssl.sh: #1103: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:27 UTC 2023 ssl.sh: #1104: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:27 UTC 2023 ssl.sh: #1105: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:27 UTC 2023 ssl.sh: #1106: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:27 UTC 2023 ssl.sh: #1107: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:28 UTC 2023 ssl.sh: #1108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:28 UTC 2023 ssl.sh: #1109: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:28 UTC 2023 ssl.sh: #1110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:28 UTC 2023 ssl.sh: #1111: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:29 UTC 2023 ssl.sh: #1112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1113: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:29 UTC 2023 ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:30 UTC 2023 ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:30 UTC 2023 ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:30 UTC 2023 ssl.sh: #1117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:30 UTC 2023 ssl.sh: #1118: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:31 UTC 2023 ssl.sh: #1119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:31 UTC 2023 ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:31 UTC 2023 ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:31 UTC 2023 ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:31 UTC 2023 ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:32 UTC 2023 ssl.sh: #1124: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:32 UTC 2023 ssl.sh: #1125: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26917 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26917 found at Mon Mar 20 22:27:32 UTC 2023 ssl.sh: #1126: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26917 at Mon Mar 20 22:27:32 UTC 2023 kill -USR1 26917 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26917 killed at Mon Mar 20 22:27:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:27:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:27:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28181 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28181 found at Mon Mar 20 22:27:32 UTC 2023 selfserv_9887 with PID 28181 started at Mon Mar 20 22:27:32 UTC 2023 trying to kill selfserv_9887 with PID 28181 at Mon Mar 20 22:27:32 UTC 2023 kill -USR1 28181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28181 killed at Mon Mar 20 22:27:32 UTC 2023 selfserv_9887 starting at Mon Mar 20 22:27:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:27:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:33 UTC 2023 selfserv_9887 with PID 28224 started at Mon Mar 20 22:27:33 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:33 UTC 2023 ssl.sh: #1127: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:34 UTC 2023 ssl.sh: #1128: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:34 UTC 2023 ssl.sh: #1129: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:35 UTC 2023 ssl.sh: #1130: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:35 UTC 2023 ssl.sh: #1131: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:36 UTC 2023 ssl.sh: #1132: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:36 UTC 2023 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:37 UTC 2023 ssl.sh: #1134: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:37 UTC 2023 ssl.sh: #1135: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:38 UTC 2023 ssl.sh: #1136: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:38 UTC 2023 ssl.sh: #1137: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:39 UTC 2023 ssl.sh: #1138: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:39 UTC 2023 ssl.sh: #1139: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1140: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:40 UTC 2023 ssl.sh: #1141: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:41 UTC 2023 ssl.sh: #1142: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:41 UTC 2023 ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:42 UTC 2023 ssl.sh: #1144: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:42 UTC 2023 ssl.sh: #1145: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:43 UTC 2023 ssl.sh: #1146: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:43 UTC 2023 ssl.sh: #1147: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:44 UTC 2023 ssl.sh: #1148: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:44 UTC 2023 ssl.sh: #1149: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:45 UTC 2023 ssl.sh: #1150: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:45 UTC 2023 ssl.sh: #1151: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:46 UTC 2023 ssl.sh: #1152: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:46 UTC 2023 ssl.sh: #1153: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1154: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:47 UTC 2023 ssl.sh: #1155: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:48 UTC 2023 ssl.sh: #1156: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:48 UTC 2023 ssl.sh: #1157: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:48 UTC 2023 ssl.sh: #1158: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:49 UTC 2023 ssl.sh: #1159: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:49 UTC 2023 ssl.sh: #1160: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:50 UTC 2023 ssl.sh: #1161: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:50 UTC 2023 ssl.sh: #1162: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:51 UTC 2023 ssl.sh: #1163: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:51 UTC 2023 ssl.sh: #1164: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:52 UTC 2023 ssl.sh: #1165: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:52 UTC 2023 ssl.sh: #1166: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 28224 found at Mon Mar 20 22:27:53 UTC 2023 ssl.sh: #1167: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 28224 at Mon Mar 20 22:27:53 UTC 2023 kill -USR1 28224 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 28224 killed at Mon Mar 20 22:27:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:27:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:27:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:53 UTC 2023 selfserv_9887 with PID 29502 started at Mon Mar 20 22:27:53 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:54 UTC 2023 ssl.sh: #1168: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:54 UTC 2023 ssl.sh: #1169: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:55 UTC 2023 ssl.sh: #1170: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:55 UTC 2023 ssl.sh: #1171: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:56 UTC 2023 ssl.sh: #1172: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:56 UTC 2023 ssl.sh: #1173: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:57 UTC 2023 ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:57 UTC 2023 ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:58 UTC 2023 ssl.sh: #1176: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:59 UTC 2023 ssl.sh: #1177: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:27:59 UTC 2023 ssl.sh: #1178: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:00 UTC 2023 ssl.sh: #1179: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:00 UTC 2023 ssl.sh: #1180: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1181: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:01 UTC 2023 ssl.sh: #1182: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:02 UTC 2023 ssl.sh: #1183: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:02 UTC 2023 ssl.sh: #1184: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:03 UTC 2023 ssl.sh: #1185: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:03 UTC 2023 ssl.sh: #1186: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:04 UTC 2023 ssl.sh: #1187: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:04 UTC 2023 ssl.sh: #1188: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:05 UTC 2023 ssl.sh: #1189: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:05 UTC 2023 ssl.sh: #1190: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:06 UTC 2023 ssl.sh: #1191: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:07 UTC 2023 ssl.sh: #1192: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:07 UTC 2023 ssl.sh: #1193: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:08 UTC 2023 ssl.sh: #1194: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1195: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:09 UTC 2023 ssl.sh: #1196: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:09 UTC 2023 ssl.sh: #1197: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:10 UTC 2023 ssl.sh: #1198: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:10 UTC 2023 ssl.sh: #1199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:11 UTC 2023 ssl.sh: #1200: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:11 UTC 2023 ssl.sh: #1201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:12 UTC 2023 ssl.sh: #1202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:12 UTC 2023 ssl.sh: #1203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:13 UTC 2023 ssl.sh: #1204: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:13 UTC 2023 ssl.sh: #1205: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:14 UTC 2023 ssl.sh: #1206: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:14 UTC 2023 ssl.sh: #1207: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 29502 found at Mon Mar 20 22:28:15 UTC 2023 ssl.sh: #1208: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 29502 at Mon Mar 20 22:28:15 UTC 2023 kill -USR1 29502 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 29502 killed at Mon Mar 20 22:28:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:28:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:28:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:15 UTC 2023 selfserv_9887 with PID 30771 started at Mon Mar 20 22:28:15 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:15 UTC 2023 ssl.sh: #1209: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:16 UTC 2023 ssl.sh: #1210: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:16 UTC 2023 ssl.sh: #1211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:16 UTC 2023 ssl.sh: #1212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:16 UTC 2023 ssl.sh: #1213: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:16 UTC 2023 ssl.sh: #1214: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:17 UTC 2023 ssl.sh: #1215: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:17 UTC 2023 ssl.sh: #1216: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:17 UTC 2023 ssl.sh: #1217: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:17 UTC 2023 ssl.sh: #1218: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:17 UTC 2023 ssl.sh: #1219: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:18 UTC 2023 ssl.sh: #1220: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:18 UTC 2023 ssl.sh: #1221: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1222: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:19 UTC 2023 ssl.sh: #1223: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:19 UTC 2023 ssl.sh: #1224: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:19 UTC 2023 ssl.sh: #1225: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:19 UTC 2023 ssl.sh: #1226: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:20 UTC 2023 ssl.sh: #1227: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:20 UTC 2023 ssl.sh: #1228: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:20 UTC 2023 ssl.sh: #1229: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:20 UTC 2023 ssl.sh: #1230: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:20 UTC 2023 ssl.sh: #1231: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:21 UTC 2023 ssl.sh: #1232: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:21 UTC 2023 ssl.sh: #1233: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:21 UTC 2023 ssl.sh: #1234: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:21 UTC 2023 ssl.sh: #1235: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1236: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:22 UTC 2023 ssl.sh: #1237: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:22 UTC 2023 ssl.sh: #1238: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:22 UTC 2023 ssl.sh: #1239: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:23 UTC 2023 ssl.sh: #1240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:23 UTC 2023 ssl.sh: #1241: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:23 UTC 2023 ssl.sh: #1242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:23 UTC 2023 ssl.sh: #1243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:23 UTC 2023 ssl.sh: #1244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:24 UTC 2023 ssl.sh: #1245: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:24 UTC 2023 ssl.sh: #1246: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:24 UTC 2023 ssl.sh: #1247: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:24 UTC 2023 ssl.sh: #1248: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 30771 found at Mon Mar 20 22:28:24 UTC 2023 ssl.sh: #1249: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 30771 at Mon Mar 20 22:28:24 UTC 2023 kill -USR1 30771 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 30771 killed at Mon Mar 20 22:28:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:28:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:28:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:25 UTC 2023 selfserv_9887 with PID 32031 started at Mon Mar 20 22:28:25 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:25 UTC 2023 ssl.sh: #1250: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:26 UTC 2023 ssl.sh: #1251: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:26 UTC 2023 ssl.sh: #1252: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:27 UTC 2023 ssl.sh: #1253: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:27 UTC 2023 ssl.sh: #1254: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:28 UTC 2023 ssl.sh: #1255: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:28 UTC 2023 ssl.sh: #1256: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:29 UTC 2023 ssl.sh: #1257: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:30 UTC 2023 ssl.sh: #1258: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:30 UTC 2023 ssl.sh: #1259: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:31 UTC 2023 ssl.sh: #1260: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:31 UTC 2023 ssl.sh: #1261: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:32 UTC 2023 ssl.sh: #1262: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1263: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:33 UTC 2023 ssl.sh: #1264: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:33 UTC 2023 ssl.sh: #1265: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:34 UTC 2023 ssl.sh: #1266: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:34 UTC 2023 ssl.sh: #1267: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:35 UTC 2023 ssl.sh: #1268: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:35 UTC 2023 ssl.sh: #1269: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:36 UTC 2023 ssl.sh: #1270: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:36 UTC 2023 ssl.sh: #1271: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:37 UTC 2023 ssl.sh: #1272: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:37 UTC 2023 ssl.sh: #1273: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:38 UTC 2023 ssl.sh: #1274: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:38 UTC 2023 ssl.sh: #1275: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:39 UTC 2023 ssl.sh: #1276: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1277: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:40 UTC 2023 ssl.sh: #1278: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:41 UTC 2023 ssl.sh: #1279: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:41 UTC 2023 ssl.sh: #1280: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:42 UTC 2023 ssl.sh: #1281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:42 UTC 2023 ssl.sh: #1282: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:43 UTC 2023 ssl.sh: #1283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:43 UTC 2023 ssl.sh: #1284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:44 UTC 2023 ssl.sh: #1285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:44 UTC 2023 ssl.sh: #1286: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:45 UTC 2023 ssl.sh: #1287: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:45 UTC 2023 ssl.sh: #1288: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:46 UTC 2023 ssl.sh: #1289: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32031 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 32031 found at Mon Mar 20 22:28:46 UTC 2023 ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 32031 at Mon Mar 20 22:28:46 UTC 2023 kill -USR1 32031 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 32031 killed at Mon Mar 20 22:28:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:28:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:28:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:46 UTC 2023 selfserv_9887 with PID 33314 started at Mon Mar 20 22:28:46 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:47 UTC 2023 ssl.sh: #1291: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:48 UTC 2023 ssl.sh: #1292: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:48 UTC 2023 ssl.sh: #1293: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:49 UTC 2023 ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:49 UTC 2023 ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:50 UTC 2023 ssl.sh: #1296: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:50 UTC 2023 ssl.sh: #1297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:51 UTC 2023 ssl.sh: #1298: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:52 UTC 2023 ssl.sh: #1299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:52 UTC 2023 ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:53 UTC 2023 ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:53 UTC 2023 ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:54 UTC 2023 ssl.sh: #1303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1304: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:55 UTC 2023 ssl.sh: #1305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:55 UTC 2023 ssl.sh: #1306: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:56 UTC 2023 ssl.sh: #1307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:57 UTC 2023 ssl.sh: #1308: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:57 UTC 2023 ssl.sh: #1309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:58 UTC 2023 ssl.sh: #1310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:58 UTC 2023 ssl.sh: #1311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:59 UTC 2023 ssl.sh: #1312: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:28:59 UTC 2023 ssl.sh: #1313: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:00 UTC 2023 ssl.sh: #1314: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:00 UTC 2023 ssl.sh: #1315: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:01 UTC 2023 ssl.sh: #1316: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:02 UTC 2023 ssl.sh: #1317: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1318: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:03 UTC 2023 ssl.sh: #1319: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:03 UTC 2023 ssl.sh: #1320: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:04 UTC 2023 ssl.sh: #1321: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:04 UTC 2023 ssl.sh: #1322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:05 UTC 2023 ssl.sh: #1323: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:05 UTC 2023 ssl.sh: #1324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:06 UTC 2023 ssl.sh: #1325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:06 UTC 2023 ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:07 UTC 2023 ssl.sh: #1327: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:07 UTC 2023 ssl.sh: #1328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:08 UTC 2023 ssl.sh: #1329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:09 UTC 2023 ssl.sh: #1330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33314 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 33314 found at Mon Mar 20 22:29:09 UTC 2023 ssl.sh: #1331: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 33314 at Mon Mar 20 22:29:09 UTC 2023 kill -USR1 33314 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 33314 killed at Mon Mar 20 22:29:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:09 UTC 2023 selfserv_9887 with PID 34574 started at Mon Mar 20 22:29:09 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:10 UTC 2023 ssl.sh: #1332: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:10 UTC 2023 ssl.sh: #1333: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:10 UTC 2023 ssl.sh: #1334: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:10 UTC 2023 ssl.sh: #1335: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:11 UTC 2023 ssl.sh: #1336: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:11 UTC 2023 ssl.sh: #1337: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:11 UTC 2023 ssl.sh: #1338: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:11 UTC 2023 ssl.sh: #1339: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:11 UTC 2023 ssl.sh: #1340: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:12 UTC 2023 ssl.sh: #1341: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:12 UTC 2023 ssl.sh: #1342: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:12 UTC 2023 ssl.sh: #1343: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:12 UTC 2023 ssl.sh: #1344: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1345: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:13 UTC 2023 ssl.sh: #1346: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:14 UTC 2023 ssl.sh: #1347: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:14 UTC 2023 ssl.sh: #1348: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:14 UTC 2023 ssl.sh: #1349: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:14 UTC 2023 ssl.sh: #1350: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:14 UTC 2023 ssl.sh: #1351: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:15 UTC 2023 ssl.sh: #1352: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:15 UTC 2023 ssl.sh: #1353: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:15 UTC 2023 ssl.sh: #1354: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:15 UTC 2023 ssl.sh: #1355: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:16 UTC 2023 ssl.sh: #1356: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:16 UTC 2023 ssl.sh: #1357: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:16 UTC 2023 ssl.sh: #1358: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1359: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:17 UTC 2023 ssl.sh: #1360: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:17 UTC 2023 ssl.sh: #1361: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:17 UTC 2023 ssl.sh: #1362: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:17 UTC 2023 ssl.sh: #1363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:18 UTC 2023 ssl.sh: #1364: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:18 UTC 2023 ssl.sh: #1365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:18 UTC 2023 ssl.sh: #1366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:18 UTC 2023 ssl.sh: #1367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:19 UTC 2023 ssl.sh: #1368: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:19 UTC 2023 ssl.sh: #1369: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:19 UTC 2023 ssl.sh: #1370: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:19 UTC 2023 ssl.sh: #1371: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34574 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 34574 found at Mon Mar 20 22:29:19 UTC 2023 ssl.sh: #1372: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 34574 at Mon Mar 20 22:29:19 UTC 2023 kill -USR1 34574 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 34574 killed at Mon Mar 20 22:29:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35835 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35835 found at Mon Mar 20 22:29:20 UTC 2023 selfserv_9887 with PID 35835 started at Mon Mar 20 22:29:20 UTC 2023 trying to kill selfserv_9887 with PID 35835 at Mon Mar 20 22:29:20 UTC 2023 kill -USR1 35835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35835 killed at Mon Mar 20 22:29:20 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 22:29:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 35880 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 35880 found at Mon Mar 20 22:29:20 UTC 2023 selfserv_9887 with PID 35880 started at Mon Mar 20 22:29:20 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1409: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1410: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1411: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1412: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1413: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1414: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1415: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1416: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1417: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1418: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1419: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1420: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1421: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1422: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1423: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 35880 at Mon Mar 20 22:29:25 UTC 2023 kill -USR1 35880 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 35880 killed at Mon Mar 20 22:29:26 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:29:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 36432 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 36432 found at Mon Mar 20 22:29:26 UTC 2023 selfserv_9887 with PID 36432 started at Mon Mar 20 22:29:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1424: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1425: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1426: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1427: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1428: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 36432 at Mon Mar 20 22:29:39 UTC 2023 kill -USR1 36432 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 36432 killed at Mon Mar 20 22:29:39 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 22:29:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37230 found at Mon Mar 20 22:29:39 UTC 2023 selfserv_9887 with PID 37230 started at Mon Mar 20 22:29:39 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1500: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1501: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37230 at Mon Mar 20 22:29:39 UTC 2023 kill -USR1 37230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37230 killed at Mon Mar 20 22:29:39 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37296 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37296 found at Mon Mar 20 22:29:40 UTC 2023 selfserv_9887 with PID 37296 started at Mon Mar 20 22:29:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1500: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37296 at Mon Mar 20 22:29:40 UTC 2023 kill -USR1 37296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37296 killed at Mon Mar 20 22:29:40 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37351 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37351 found at Mon Mar 20 22:29:40 UTC 2023 selfserv_9887 with PID 37351 started at Mon Mar 20 22:29:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1501: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37351 at Mon Mar 20 22:29:41 UTC 2023 kill -USR1 37351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37351 killed at Mon Mar 20 22:29:41 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37403 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37403 found at Mon Mar 20 22:29:41 UTC 2023 selfserv_9887 with PID 37403 started at Mon Mar 20 22:29:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37403 at Mon Mar 20 22:29:41 UTC 2023 kill -USR1 37403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37403 killed at Mon Mar 20 22:29:41 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37459 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37459 found at Mon Mar 20 22:29:42 UTC 2023 selfserv_9887 with PID 37459 started at Mon Mar 20 22:29:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1503: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37459 at Mon Mar 20 22:29:42 UTC 2023 kill -USR1 37459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37459 killed at Mon Mar 20 22:29:42 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37512 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37512 found at Mon Mar 20 22:29:42 UTC 2023 selfserv_9887 with PID 37512 started at Mon Mar 20 22:29:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1504: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37512 at Mon Mar 20 22:29:43 UTC 2023 kill -USR1 37512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37512 killed at Mon Mar 20 22:29:43 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37564 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37564 found at Mon Mar 20 22:29:43 UTC 2023 selfserv_9887 with PID 37564 started at Mon Mar 20 22:29:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1505: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37564 at Mon Mar 20 22:29:43 UTC 2023 kill -USR1 37564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37564 killed at Mon Mar 20 22:29:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37623 found at Mon Mar 20 22:29:43 UTC 2023 selfserv_9887 with PID 37623 started at Mon Mar 20 22:29:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1506: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37623 at Mon Mar 20 22:29:44 UTC 2023 kill -USR1 37623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37623 killed at Mon Mar 20 22:29:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37676 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37676 found at Mon Mar 20 22:29:44 UTC 2023 selfserv_9887 with PID 37676 started at Mon Mar 20 22:29:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1507: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37676 at Mon Mar 20 22:29:44 UTC 2023 kill -USR1 37676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37676 killed at Mon Mar 20 22:29:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37728 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37728 found at Mon Mar 20 22:29:44 UTC 2023 selfserv_9887 with PID 37728 started at Mon Mar 20 22:29:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37728 at Mon Mar 20 22:29:45 UTC 2023 kill -USR1 37728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37728 killed at Mon Mar 20 22:29:45 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37780 found at Mon Mar 20 22:29:45 UTC 2023 selfserv_9887 with PID 37780 started at Mon Mar 20 22:29:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1509: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37780 at Mon Mar 20 22:29:45 UTC 2023 kill -USR1 37780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37780 killed at Mon Mar 20 22:29:45 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37832 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37832 found at Mon Mar 20 22:29:45 UTC 2023 selfserv_9887 with PID 37832 started at Mon Mar 20 22:29:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1510: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 37832 at Mon Mar 20 22:29:45 UTC 2023 kill -USR1 37832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37832 killed at Mon Mar 20 22:29:46 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37884 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37884 found at Mon Mar 20 22:29:46 UTC 2023 selfserv_9887 with PID 37884 started at Mon Mar 20 22:29:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37884 at Mon Mar 20 22:29:46 UTC 2023 kill -USR1 37884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37884 killed at Mon Mar 20 22:29:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37937 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37937 found at Mon Mar 20 22:29:46 UTC 2023 selfserv_9887 with PID 37937 started at Mon Mar 20 22:29:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1512: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37937 at Mon Mar 20 22:29:47 UTC 2023 kill -USR1 37937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37937 killed at Mon Mar 20 22:29:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37989 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 37989 found at Mon Mar 20 22:29:47 UTC 2023 selfserv_9887 with PID 37989 started at Mon Mar 20 22:29:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 37989 at Mon Mar 20 22:29:48 UTC 2023 kill -USR1 37989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 37989 killed at Mon Mar 20 22:29:48 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38041 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38041 found at Mon Mar 20 22:29:48 UTC 2023 selfserv_9887 with PID 38041 started at Mon Mar 20 22:29:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38041 at Mon Mar 20 22:29:48 UTC 2023 kill -USR1 38041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38041 killed at Mon Mar 20 22:29:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38093 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38093 found at Mon Mar 20 22:29:49 UTC 2023 selfserv_9887 with PID 38093 started at Mon Mar 20 22:29:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1515: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38093 at Mon Mar 20 22:29:49 UTC 2023 kill -USR1 38093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38093 killed at Mon Mar 20 22:29:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38145 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38145 found at Mon Mar 20 22:29:50 UTC 2023 selfserv_9887 with PID 38145 started at Mon Mar 20 22:29:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1516: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38145 at Mon Mar 20 22:29:50 UTC 2023 kill -USR1 38145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38145 killed at Mon Mar 20 22:29:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38197 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38197 found at Mon Mar 20 22:29:50 UTC 2023 selfserv_9887 with PID 38197 started at Mon Mar 20 22:29:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38197 at Mon Mar 20 22:29:51 UTC 2023 kill -USR1 38197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38197 killed at Mon Mar 20 22:29:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38249 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38249 found at Mon Mar 20 22:29:51 UTC 2023 selfserv_9887 with PID 38249 started at Mon Mar 20 22:29:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1518: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38249 at Mon Mar 20 22:29:52 UTC 2023 kill -USR1 38249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38249 killed at Mon Mar 20 22:29:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38301 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38301 found at Mon Mar 20 22:29:52 UTC 2023 selfserv_9887 with PID 38301 started at Mon Mar 20 22:29:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38301 at Mon Mar 20 22:29:53 UTC 2023 kill -USR1 38301 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38301 killed at Mon Mar 20 22:29:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38353 found at Mon Mar 20 22:29:53 UTC 2023 selfserv_9887 with PID 38353 started at Mon Mar 20 22:29:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38353 at Mon Mar 20 22:29:54 UTC 2023 kill -USR1 38353 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38353 killed at Mon Mar 20 22:29:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38405 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38405 found at Mon Mar 20 22:29:54 UTC 2023 selfserv_9887 with PID 38405 started at Mon Mar 20 22:29:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1521: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38405 at Mon Mar 20 22:29:54 UTC 2023 kill -USR1 38405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38405 killed at Mon Mar 20 22:29:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38457 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38457 found at Mon Mar 20 22:29:55 UTC 2023 selfserv_9887 with PID 38457 started at Mon Mar 20 22:29:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38457 at Mon Mar 20 22:29:55 UTC 2023 kill -USR1 38457 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38457 killed at Mon Mar 20 22:29:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38509 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38509 found at Mon Mar 20 22:29:55 UTC 2023 selfserv_9887 with PID 38509 started at Mon Mar 20 22:29:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38509 at Mon Mar 20 22:29:56 UTC 2023 kill -USR1 38509 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38509 killed at Mon Mar 20 22:29:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38561 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38561 found at Mon Mar 20 22:29:56 UTC 2023 selfserv_9887 with PID 38561 started at Mon Mar 20 22:29:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1524: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38561 at Mon Mar 20 22:29:57 UTC 2023 kill -USR1 38561 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38561 killed at Mon Mar 20 22:29:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38613 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38613 found at Mon Mar 20 22:29:57 UTC 2023 selfserv_9887 with PID 38613 started at Mon Mar 20 22:29:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38613 at Mon Mar 20 22:29:57 UTC 2023 kill -USR1 38613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38613 killed at Mon Mar 20 22:29:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38665 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38665 found at Mon Mar 20 22:29:57 UTC 2023 selfserv_9887 with PID 38665 started at Mon Mar 20 22:29:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38665 at Mon Mar 20 22:29:58 UTC 2023 kill -USR1 38665 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38665 killed at Mon Mar 20 22:29:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38717 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38717 found at Mon Mar 20 22:29:58 UTC 2023 selfserv_9887 with PID 38717 started at Mon Mar 20 22:29:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1527: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38717 at Mon Mar 20 22:29:58 UTC 2023 kill -USR1 38717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38717 killed at Mon Mar 20 22:29:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:29:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38769 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38769 found at Mon Mar 20 22:29:58 UTC 2023 selfserv_9887 with PID 38769 started at Mon Mar 20 22:29:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1528: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 38769 at Mon Mar 20 22:29:59 UTC 2023 kill -USR1 38769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38769 killed at Mon Mar 20 22:29:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38821 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38821 found at Mon Mar 20 22:29:59 UTC 2023 selfserv_9887 with PID 38821 started at Mon Mar 20 22:29:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1529: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38821 at Mon Mar 20 22:29:59 UTC 2023 kill -USR1 38821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38821 killed at Mon Mar 20 22:29:59 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:29:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:29:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38873 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38873 found at Mon Mar 20 22:29:59 UTC 2023 selfserv_9887 with PID 38873 started at Mon Mar 20 22:29:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1530: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38873 at Mon Mar 20 22:29:59 UTC 2023 kill -USR1 38873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38873 killed at Mon Mar 20 22:30:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38926 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38926 found at Mon Mar 20 22:30:00 UTC 2023 selfserv_9887 with PID 38926 started at Mon Mar 20 22:30:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1531: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38926 at Mon Mar 20 22:30:00 UTC 2023 kill -USR1 38926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38926 killed at Mon Mar 20 22:30:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38978 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 38978 found at Mon Mar 20 22:30:00 UTC 2023 selfserv_9887 with PID 38978 started at Mon Mar 20 22:30:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1532: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 38978 at Mon Mar 20 22:30:00 UTC 2023 kill -USR1 38978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 38978 killed at Mon Mar 20 22:30:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39030 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39030 found at Mon Mar 20 22:30:01 UTC 2023 selfserv_9887 with PID 39030 started at Mon Mar 20 22:30:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1533: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39030 at Mon Mar 20 22:30:01 UTC 2023 kill -USR1 39030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39030 killed at Mon Mar 20 22:30:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39163 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39163 found at Mon Mar 20 22:30:01 UTC 2023 selfserv_9887 with PID 39163 started at Mon Mar 20 22:30:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1534: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39163 at Mon Mar 20 22:30:01 UTC 2023 kill -USR1 39163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39163 killed at Mon Mar 20 22:30:01 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39215 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39215 found at Mon Mar 20 22:30:02 UTC 2023 selfserv_9887 with PID 39215 started at Mon Mar 20 22:30:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1535: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39215 at Mon Mar 20 22:30:02 UTC 2023 kill -USR1 39215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39215 killed at Mon Mar 20 22:30:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39269 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39269 found at Mon Mar 20 22:30:02 UTC 2023 selfserv_9887 with PID 39269 started at Mon Mar 20 22:30:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1536: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39269 at Mon Mar 20 22:30:02 UTC 2023 kill -USR1 39269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39269 killed at Mon Mar 20 22:30:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39321 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39321 found at Mon Mar 20 22:30:03 UTC 2023 selfserv_9887 with PID 39321 started at Mon Mar 20 22:30:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1537: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39321 at Mon Mar 20 22:30:03 UTC 2023 kill -USR1 39321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39321 killed at Mon Mar 20 22:30:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39373 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39373 found at Mon Mar 20 22:30:03 UTC 2023 selfserv_9887 with PID 39373 started at Mon Mar 20 22:30:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1538: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39373 at Mon Mar 20 22:30:04 UTC 2023 kill -USR1 39373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39373 killed at Mon Mar 20 22:30:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39425 found at Mon Mar 20 22:30:04 UTC 2023 selfserv_9887 with PID 39425 started at Mon Mar 20 22:30:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1539: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39425 at Mon Mar 20 22:30:04 UTC 2023 kill -USR1 39425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39425 killed at Mon Mar 20 22:30:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39477 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39477 found at Mon Mar 20 22:30:05 UTC 2023 selfserv_9887 with PID 39477 started at Mon Mar 20 22:30:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1540: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39477 at Mon Mar 20 22:30:05 UTC 2023 kill -USR1 39477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39477 killed at Mon Mar 20 22:30:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39529 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39529 found at Mon Mar 20 22:30:05 UTC 2023 selfserv_9887 with PID 39529 started at Mon Mar 20 22:30:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1541: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39529 at Mon Mar 20 22:30:05 UTC 2023 kill -USR1 39529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39529 killed at Mon Mar 20 22:30:05 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39582 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39582 found at Mon Mar 20 22:30:06 UTC 2023 selfserv_9887 with PID 39582 started at Mon Mar 20 22:30:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1542: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39582 at Mon Mar 20 22:30:06 UTC 2023 kill -USR1 39582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39582 killed at Mon Mar 20 22:30:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39634 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39634 found at Mon Mar 20 22:30:06 UTC 2023 selfserv_9887 with PID 39634 started at Mon Mar 20 22:30:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1543: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39634 at Mon Mar 20 22:30:06 UTC 2023 kill -USR1 39634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39634 killed at Mon Mar 20 22:30:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39686 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39686 found at Mon Mar 20 22:30:06 UTC 2023 selfserv_9887 with PID 39686 started at Mon Mar 20 22:30:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1544: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39686 at Mon Mar 20 22:30:07 UTC 2023 kill -USR1 39686 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39686 killed at Mon Mar 20 22:30:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39738 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39738 found at Mon Mar 20 22:30:07 UTC 2023 selfserv_9887 with PID 39738 started at Mon Mar 20 22:30:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1545: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39738 at Mon Mar 20 22:30:08 UTC 2023 kill -USR1 39738 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39738 killed at Mon Mar 20 22:30:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39790 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39790 found at Mon Mar 20 22:30:08 UTC 2023 selfserv_9887 with PID 39790 started at Mon Mar 20 22:30:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1546: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39790 at Mon Mar 20 22:30:09 UTC 2023 kill -USR1 39790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39790 killed at Mon Mar 20 22:30:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39842 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39842 found at Mon Mar 20 22:30:09 UTC 2023 selfserv_9887 with PID 39842 started at Mon Mar 20 22:30:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1547: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39842 at Mon Mar 20 22:30:10 UTC 2023 kill -USR1 39842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39842 killed at Mon Mar 20 22:30:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39895 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39895 found at Mon Mar 20 22:30:10 UTC 2023 selfserv_9887 with PID 39895 started at Mon Mar 20 22:30:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1548: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39895 at Mon Mar 20 22:30:10 UTC 2023 kill -USR1 39895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39895 killed at Mon Mar 20 22:30:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39947 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39947 found at Mon Mar 20 22:30:11 UTC 2023 selfserv_9887 with PID 39947 started at Mon Mar 20 22:30:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1549: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 39947 at Mon Mar 20 22:30:11 UTC 2023 kill -USR1 39947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39947 killed at Mon Mar 20 22:30:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39999 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 39999 found at Mon Mar 20 22:30:12 UTC 2023 selfserv_9887 with PID 39999 started at Mon Mar 20 22:30:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 39999 at Mon Mar 20 22:30:12 UTC 2023 kill -USR1 39999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 39999 killed at Mon Mar 20 22:30:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40055 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40055 found at Mon Mar 20 22:30:12 UTC 2023 selfserv_9887 with PID 40055 started at Mon Mar 20 22:30:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40055 at Mon Mar 20 22:30:13 UTC 2023 kill -USR1 40055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40055 killed at Mon Mar 20 22:30:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40107 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40107 found at Mon Mar 20 22:30:13 UTC 2023 selfserv_9887 with PID 40107 started at Mon Mar 20 22:30:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1552: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40107 at Mon Mar 20 22:30:13 UTC 2023 kill -USR1 40107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40107 killed at Mon Mar 20 22:30:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40160 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40160 found at Mon Mar 20 22:30:14 UTC 2023 selfserv_9887 with PID 40160 started at Mon Mar 20 22:30:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1553: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40160 at Mon Mar 20 22:30:14 UTC 2023 kill -USR1 40160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40160 killed at Mon Mar 20 22:30:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:30:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40212 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40212 found at Mon Mar 20 22:30:14 UTC 2023 selfserv_9887 with PID 40212 started at Mon Mar 20 22:30:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1554: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40212 at Mon Mar 20 22:30:14 UTC 2023 kill -USR1 40212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40212 killed at Mon Mar 20 22:30:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40264 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40264 found at Mon Mar 20 22:30:15 UTC 2023 selfserv_9887 with PID 40264 started at Mon Mar 20 22:30:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1555: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40264 at Mon Mar 20 22:30:15 UTC 2023 kill -USR1 40264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40264 killed at Mon Mar 20 22:30:15 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40316 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40316 found at Mon Mar 20 22:30:15 UTC 2023 selfserv_9887 with PID 40316 started at Mon Mar 20 22:30:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40316 at Mon Mar 20 22:30:16 UTC 2023 kill -USR1 40316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40316 killed at Mon Mar 20 22:30:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:30:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40368 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40368 found at Mon Mar 20 22:30:16 UTC 2023 selfserv_9887 with PID 40368 started at Mon Mar 20 22:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40368 at Mon Mar 20 22:30:16 UTC 2023 kill -USR1 40368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40368 killed at Mon Mar 20 22:30:16 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:30:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40426 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40426 found at Mon Mar 20 22:30:16 UTC 2023 selfserv_9887 with PID 40426 started at Mon Mar 20 22:30:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40426 at Mon Mar 20 22:30:17 UTC 2023 kill -USR1 40426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40426 killed at Mon Mar 20 22:30:17 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:30:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40484 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40484 found at Mon Mar 20 22:30:17 UTC 2023 selfserv_9887 with PID 40484 started at Mon Mar 20 22:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40484 at Mon Mar 20 22:30:17 UTC 2023 kill -USR1 40484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40484 killed at Mon Mar 20 22:30:17 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:30:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40543 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40543 found at Mon Mar 20 22:30:17 UTC 2023 selfserv_9887 with PID 40543 started at Mon Mar 20 22:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1560: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40543 at Mon Mar 20 22:30:17 UTC 2023 kill -USR1 40543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40543 killed at Mon Mar 20 22:30:17 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:30:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40601 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40601 found at Mon Mar 20 22:30:18 UTC 2023 selfserv_9887 with PID 40601 started at Mon Mar 20 22:30:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40601 at Mon Mar 20 22:30:18 UTC 2023 kill -USR1 40601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40601 killed at Mon Mar 20 22:30:18 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 22:30:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40659 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40659 found at Mon Mar 20 22:30:18 UTC 2023 selfserv_9887 with PID 40659 started at Mon Mar 20 22:30:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1562: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40659 at Mon Mar 20 22:30:18 UTC 2023 kill -USR1 40659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40659 killed at Mon Mar 20 22:30:18 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:30:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40717 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40717 found at Mon Mar 20 22:30:18 UTC 2023 selfserv_9887 with PID 40717 started at Mon Mar 20 22:30:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40717 at Mon Mar 20 22:30:19 UTC 2023 kill -USR1 40717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40717 killed at Mon Mar 20 22:30:19 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:30:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40775 found at Mon Mar 20 22:30:19 UTC 2023 selfserv_9887 with PID 40775 started at Mon Mar 20 22:30:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 40775 at Mon Mar 20 22:30:19 UTC 2023 kill -USR1 40775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40775 killed at Mon Mar 20 22:30:19 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:30:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40833 found at Mon Mar 20 22:30:19 UTC 2023 selfserv_9887 with PID 40833 started at Mon Mar 20 22:30:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1565: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40833 at Mon Mar 20 22:30:19 UTC 2023 kill -USR1 40833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40833 killed at Mon Mar 20 22:30:19 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:30:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40891 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40891 found at Mon Mar 20 22:30:20 UTC 2023 selfserv_9887 with PID 40891 started at Mon Mar 20 22:30:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1566: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40891 at Mon Mar 20 22:30:20 UTC 2023 kill -USR1 40891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40891 killed at Mon Mar 20 22:30:20 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:30:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40949 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 40949 found at Mon Mar 20 22:30:20 UTC 2023 selfserv_9887 with PID 40949 started at Mon Mar 20 22:30:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1567: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 40949 at Mon Mar 20 22:30:20 UTC 2023 kill -USR1 40949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 40949 killed at Mon Mar 20 22:30:20 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 22:30:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 332 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 332 found at Mon Mar 20 22:30:20 UTC 2023 selfserv_9887 with PID 332 started at Mon Mar 20 22:30:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1500: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 332 at Mon Mar 20 22:30:20 UTC 2023 kill -USR1 332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 332 killed at Mon Mar 20 22:30:21 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 22:30:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 374 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 374 found at Mon Mar 20 22:30:21 UTC 2023 selfserv_9887 with PID 374 started at Mon Mar 20 22:30:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1501: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 374 at Mon Mar 20 22:30:21 UTC 2023 kill -USR1 374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 374 killed at Mon Mar 20 22:30:21 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 22:30:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 416 found at Mon Mar 20 22:30:21 UTC 2023 selfserv_9887 with PID 416 started at Mon Mar 20 22:30:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1502: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 416 at Mon Mar 20 22:30:21 UTC 2023 kill -USR1 416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 416 killed at Mon Mar 20 22:30:21 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 22:30:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 458 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 458 found at Mon Mar 20 22:30:21 UTC 2023 selfserv_9887 with PID 458 started at Mon Mar 20 22:30:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1503: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 458 at Mon Mar 20 22:30:22 UTC 2023 kill -USR1 458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 458 killed at Mon Mar 20 22:30:22 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 22:30:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 500 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 500 found at Mon Mar 20 22:30:22 UTC 2023 selfserv_9887 with PID 500 started at Mon Mar 20 22:30:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1504: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 500 at Mon Mar 20 22:30:22 UTC 2023 kill -USR1 500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 500 killed at Mon Mar 20 22:30:22 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 22:30:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 542 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 542 found at Mon Mar 20 22:30:22 UTC 2023 selfserv_9887 with PID 542 started at Mon Mar 20 22:30:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1505: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 542 at Mon Mar 20 22:30:22 UTC 2023 kill -USR1 542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 542 killed at Mon Mar 20 22:30:22 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 22:30:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 584 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 584 found at Mon Mar 20 22:30:23 UTC 2023 selfserv_9887 with PID 584 started at Mon Mar 20 22:30:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1506: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 584 at Mon Mar 20 22:30:23 UTC 2023 kill -USR1 584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 584 killed at Mon Mar 20 22:30:23 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 22:30:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:30:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 626 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 626 found at Mon Mar 20 22:30:23 UTC 2023 selfserv_9887 with PID 626 started at Mon Mar 20 22:30:23 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 22:30:23 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 22:32:30 UTC 2023 ssl.sh: #1507: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 626 at Mon Mar 20 22:32:30 UTC 2023 kill -USR1 626 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 626 killed at Mon Mar 20 22:32:31 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:32:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 707 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 707 found at Mon Mar 20 22:32:31 UTC 2023 selfserv_9887 with PID 707 started at Mon Mar 20 22:32:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 707 at Mon Mar 20 22:32:31 UTC 2023 kill -USR1 707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 707 killed at Mon Mar 20 22:32:31 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 749 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 749 found at Mon Mar 20 22:32:31 UTC 2023 selfserv_9887 with PID 749 started at Mon Mar 20 22:32:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1509: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 749 at Mon Mar 20 22:32:31 UTC 2023 kill -USR1 749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 749 killed at Mon Mar 20 22:32:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 789 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 789 found at Mon Mar 20 22:32:32 UTC 2023 selfserv_9887 with PID 789 started at Mon Mar 20 22:32:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1510: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 789 at Mon Mar 20 22:32:32 UTC 2023 kill -USR1 789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 789 killed at Mon Mar 20 22:32:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 828 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 828 found at Mon Mar 20 22:32:32 UTC 2023 selfserv_9887 with PID 828 started at Mon Mar 20 22:32:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 828 at Mon Mar 20 22:32:32 UTC 2023 kill -USR1 828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 828 killed at Mon Mar 20 22:32:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 867 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 867 found at Mon Mar 20 22:32:32 UTC 2023 selfserv_9887 with PID 867 started at Mon Mar 20 22:32:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1512: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 867 at Mon Mar 20 22:32:33 UTC 2023 kill -USR1 867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 867 killed at Mon Mar 20 22:32:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 906 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 906 found at Mon Mar 20 22:32:33 UTC 2023 selfserv_9887 with PID 906 started at Mon Mar 20 22:32:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 906 at Mon Mar 20 22:32:33 UTC 2023 kill -USR1 906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 906 killed at Mon Mar 20 22:32:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 946 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 946 found at Mon Mar 20 22:32:33 UTC 2023 selfserv_9887 with PID 946 started at Mon Mar 20 22:32:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 946 at Mon Mar 20 22:32:33 UTC 2023 kill -USR1 946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 946 killed at Mon Mar 20 22:32:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 986 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 986 found at Mon Mar 20 22:32:33 UTC 2023 selfserv_9887 with PID 986 started at Mon Mar 20 22:32:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 986 at Mon Mar 20 22:32:34 UTC 2023 kill -USR1 986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 986 killed at Mon Mar 20 22:32:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1025 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1025 found at Mon Mar 20 22:32:34 UTC 2023 selfserv_9887 with PID 1025 started at Mon Mar 20 22:32:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1516: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1025 at Mon Mar 20 22:32:34 UTC 2023 kill -USR1 1025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1025 killed at Mon Mar 20 22:32:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1064 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1064 found at Mon Mar 20 22:32:34 UTC 2023 selfserv_9887 with PID 1064 started at Mon Mar 20 22:32:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1064 at Mon Mar 20 22:32:34 UTC 2023 kill -USR1 1064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1064 killed at Mon Mar 20 22:32:34 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1103 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1103 found at Mon Mar 20 22:32:35 UTC 2023 selfserv_9887 with PID 1103 started at Mon Mar 20 22:32:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1518: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1103 at Mon Mar 20 22:32:35 UTC 2023 kill -USR1 1103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1103 killed at Mon Mar 20 22:32:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1143 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1143 found at Mon Mar 20 22:32:35 UTC 2023 selfserv_9887 with PID 1143 started at Mon Mar 20 22:32:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1519: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1143 at Mon Mar 20 22:32:35 UTC 2023 kill -USR1 1143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1143 killed at Mon Mar 20 22:32:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1184 found at Mon Mar 20 22:32:35 UTC 2023 selfserv_9887 with PID 1184 started at Mon Mar 20 22:32:35 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1520: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1184 at Mon Mar 20 22:32:35 UTC 2023 kill -USR1 1184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1184 killed at Mon Mar 20 22:32:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1224 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1224 found at Mon Mar 20 22:32:36 UTC 2023 selfserv_9887 with PID 1224 started at Mon Mar 20 22:32:36 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1521: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 1224 at Mon Mar 20 22:32:36 UTC 2023 kill -USR1 1224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1224 killed at Mon Mar 20 22:32:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1264 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1264 found at Mon Mar 20 22:32:36 UTC 2023 selfserv_9887 with PID 1264 started at Mon Mar 20 22:32:36 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1522: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1264 at Mon Mar 20 22:32:36 UTC 2023 kill -USR1 1264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1264 killed at Mon Mar 20 22:32:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1304 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1304 found at Mon Mar 20 22:32:36 UTC 2023 selfserv_9887 with PID 1304 started at Mon Mar 20 22:32:36 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1523: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1304 at Mon Mar 20 22:32:36 UTC 2023 kill -USR1 1304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1304 killed at Mon Mar 20 22:32:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1344 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1344 found at Mon Mar 20 22:32:37 UTC 2023 selfserv_9887 with PID 1344 started at Mon Mar 20 22:32:37 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1524: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1344 at Mon Mar 20 22:32:37 UTC 2023 kill -USR1 1344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1344 killed at Mon Mar 20 22:32:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1384 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1384 found at Mon Mar 20 22:32:37 UTC 2023 selfserv_9887 with PID 1384 started at Mon Mar 20 22:32:37 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1525: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1384 at Mon Mar 20 22:32:37 UTC 2023 kill -USR1 1384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1384 killed at Mon Mar 20 22:32:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:32:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1424 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1424 found at Mon Mar 20 22:32:37 UTC 2023 selfserv_9887 with PID 1424 started at Mon Mar 20 22:32:37 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1526: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 1424 at Mon Mar 20 22:32:38 UTC 2023 kill -USR1 1424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1424 killed at Mon Mar 20 22:32:38 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9887 starting at Mon Mar 20 22:32:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 1464 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 1464 found at Mon Mar 20 22:32:38 UTC 2023 selfserv_9887 with PID 1464 started at Mon Mar 20 22:32:38 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1563: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1564: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1565: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1566: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1567: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1568: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1569: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1570: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1571: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1572: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1573: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1574: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1575: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1576: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1577: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 1464 at Mon Mar 20 22:32:43 UTC 2023 kill -USR1 1464 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 1464 killed at Mon Mar 20 22:32:43 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:32:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 2029 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2029 found at Mon Mar 20 22:32:44 UTC 2023 selfserv_9887 with PID 2029 started at Mon Mar 20 22:32:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1578: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1579: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1580: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1581: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1582: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1583: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1584: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1585: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1586: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1587: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1588: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1589: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1590: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1591: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1592: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1593: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1594: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1595: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1596: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1597: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1598: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1599: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1600: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1601: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1602: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1603: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1604: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1605: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1606: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1607: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1608: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1609: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1610: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1611: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1612: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1613: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1614: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1615: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1616: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1617: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1618: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1619: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1620: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1621: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1622: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1623: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1624: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1625: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1626: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1627: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1628: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1629: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1630: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1631: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1632: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1633: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1634: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1635: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1636: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1637: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1638: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1639: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1640: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1641: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1642: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1643: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1644: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1645: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1646: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1647: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1648: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1649: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1650: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1651: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1652: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1653: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2029 at Mon Mar 20 22:32:53 UTC 2023 kill -USR1 2029 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2029 killed at Mon Mar 20 22:32:53 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2841 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2841 found at Mon Mar 20 22:32:53 UTC 2023 selfserv_9887 with PID 2841 started at Mon Mar 20 22:32:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1654: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2841 at Mon Mar 20 22:32:54 UTC 2023 kill -USR1 2841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2841 killed at Mon Mar 20 22:32:54 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:32:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2893 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2893 found at Mon Mar 20 22:32:54 UTC 2023 selfserv_9887 with PID 2893 started at Mon Mar 20 22:32:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1655: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2893 at Mon Mar 20 22:32:54 UTC 2023 kill -USR1 2893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2893 killed at Mon Mar 20 22:32:54 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2945 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2945 found at Mon Mar 20 22:32:54 UTC 2023 selfserv_9887 with PID 2945 started at Mon Mar 20 22:32:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 2945 at Mon Mar 20 22:32:54 UTC 2023 kill -USR1 2945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2945 killed at Mon Mar 20 22:32:54 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2997 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 2997 found at Mon Mar 20 22:32:55 UTC 2023 selfserv_9887 with PID 2997 started at Mon Mar 20 22:32:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1657: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 2997 at Mon Mar 20 22:32:55 UTC 2023 kill -USR1 2997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 2997 killed at Mon Mar 20 22:32:55 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:32:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3049 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3049 found at Mon Mar 20 22:32:55 UTC 2023 selfserv_9887 with PID 3049 started at Mon Mar 20 22:32:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1658: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3049 at Mon Mar 20 22:32:55 UTC 2023 kill -USR1 3049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3049 killed at Mon Mar 20 22:32:55 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3101 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3101 found at Mon Mar 20 22:32:55 UTC 2023 selfserv_9887 with PID 3101 started at Mon Mar 20 22:32:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1659: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3101 at Mon Mar 20 22:32:56 UTC 2023 kill -USR1 3101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3101 killed at Mon Mar 20 22:32:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3154 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3154 found at Mon Mar 20 22:32:56 UTC 2023 selfserv_9887 with PID 3154 started at Mon Mar 20 22:32:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1660: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3154 at Mon Mar 20 22:32:56 UTC 2023 kill -USR1 3154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3154 killed at Mon Mar 20 22:32:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:32:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3206 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3206 found at Mon Mar 20 22:32:56 UTC 2023 selfserv_9887 with PID 3206 started at Mon Mar 20 22:32:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3206 at Mon Mar 20 22:32:57 UTC 2023 kill -USR1 3206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3206 killed at Mon Mar 20 22:32:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3258 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3258 found at Mon Mar 20 22:32:57 UTC 2023 selfserv_9887 with PID 3258 started at Mon Mar 20 22:32:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3258 at Mon Mar 20 22:32:57 UTC 2023 kill -USR1 3258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3258 killed at Mon Mar 20 22:32:57 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3310 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3310 found at Mon Mar 20 22:32:57 UTC 2023 selfserv_9887 with PID 3310 started at Mon Mar 20 22:32:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1663: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3310 at Mon Mar 20 22:32:57 UTC 2023 kill -USR1 3310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3310 killed at Mon Mar 20 22:32:58 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:32:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3362 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3362 found at Mon Mar 20 22:32:58 UTC 2023 selfserv_9887 with PID 3362 started at Mon Mar 20 22:32:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1664: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3362 at Mon Mar 20 22:32:58 UTC 2023 kill -USR1 3362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3362 killed at Mon Mar 20 22:32:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3414 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3414 found at Mon Mar 20 22:32:58 UTC 2023 selfserv_9887 with PID 3414 started at Mon Mar 20 22:32:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1665: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3414 at Mon Mar 20 22:32:58 UTC 2023 kill -USR1 3414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3414 killed at Mon Mar 20 22:32:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3466 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3466 found at Mon Mar 20 22:32:59 UTC 2023 selfserv_9887 with PID 3466 started at Mon Mar 20 22:32:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1666: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3466 at Mon Mar 20 22:32:59 UTC 2023 kill -USR1 3466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3466 killed at Mon Mar 20 22:32:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:32:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3519 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3519 found at Mon Mar 20 22:32:59 UTC 2023 selfserv_9887 with PID 3519 started at Mon Mar 20 22:32:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3519 at Mon Mar 20 22:32:59 UTC 2023 kill -USR1 3519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3519 killed at Mon Mar 20 22:32:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:32:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:32:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3571 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3571 found at Mon Mar 20 22:32:59 UTC 2023 selfserv_9887 with PID 3571 started at Mon Mar 20 22:32:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1668: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3571 at Mon Mar 20 22:33:00 UTC 2023 kill -USR1 3571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3571 killed at Mon Mar 20 22:33:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3623 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3623 found at Mon Mar 20 22:33:00 UTC 2023 selfserv_9887 with PID 3623 started at Mon Mar 20 22:33:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1669: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3623 at Mon Mar 20 22:33:00 UTC 2023 kill -USR1 3623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3623 killed at Mon Mar 20 22:33:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3683 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3683 found at Mon Mar 20 22:33:00 UTC 2023 selfserv_9887 with PID 3683 started at Mon Mar 20 22:33:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1670: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3683 at Mon Mar 20 22:33:01 UTC 2023 kill -USR1 3683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3683 killed at Mon Mar 20 22:33:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3736 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3736 found at Mon Mar 20 22:33:01 UTC 2023 selfserv_9887 with PID 3736 started at Mon Mar 20 22:33:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1671: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3736 at Mon Mar 20 22:33:01 UTC 2023 kill -USR1 3736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3736 killed at Mon Mar 20 22:33:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3788 found at Mon Mar 20 22:33:01 UTC 2023 selfserv_9887 with PID 3788 started at Mon Mar 20 22:33:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1672: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3788 at Mon Mar 20 22:33:02 UTC 2023 kill -USR1 3788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3788 killed at Mon Mar 20 22:33:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3840 found at Mon Mar 20 22:33:02 UTC 2023 selfserv_9887 with PID 3840 started at Mon Mar 20 22:33:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3840 at Mon Mar 20 22:33:02 UTC 2023 kill -USR1 3840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3840 killed at Mon Mar 20 22:33:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3904 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3904 found at Mon Mar 20 22:33:02 UTC 2023 selfserv_9887 with PID 3904 started at Mon Mar 20 22:33:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 3904 at Mon Mar 20 22:33:03 UTC 2023 kill -USR1 3904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3904 killed at Mon Mar 20 22:33:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3956 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 3956 found at Mon Mar 20 22:33:03 UTC 2023 selfserv_9887 with PID 3956 started at Mon Mar 20 22:33:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 3956 at Mon Mar 20 22:33:03 UTC 2023 kill -USR1 3956 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 3956 killed at Mon Mar 20 22:33:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4008 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4008 found at Mon Mar 20 22:33:03 UTC 2023 selfserv_9887 with PID 4008 started at Mon Mar 20 22:33:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4008 at Mon Mar 20 22:33:04 UTC 2023 kill -USR1 4008 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4008 killed at Mon Mar 20 22:33:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4061 found at Mon Mar 20 22:33:04 UTC 2023 selfserv_9887 with PID 4061 started at Mon Mar 20 22:33:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4061 at Mon Mar 20 22:33:04 UTC 2023 kill -USR1 4061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4061 killed at Mon Mar 20 22:33:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4113 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4113 found at Mon Mar 20 22:33:04 UTC 2023 selfserv_9887 with PID 4113 started at Mon Mar 20 22:33:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1678: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4113 at Mon Mar 20 22:33:05 UTC 2023 kill -USR1 4113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4113 killed at Mon Mar 20 22:33:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4166 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4166 found at Mon Mar 20 22:33:05 UTC 2023 selfserv_9887 with PID 4166 started at Mon Mar 20 22:33:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1679: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4166 at Mon Mar 20 22:33:05 UTC 2023 kill -USR1 4166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4166 killed at Mon Mar 20 22:33:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4218 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4218 found at Mon Mar 20 22:33:05 UTC 2023 selfserv_9887 with PID 4218 started at Mon Mar 20 22:33:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1680: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4218 at Mon Mar 20 22:33:06 UTC 2023 kill -USR1 4218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4218 killed at Mon Mar 20 22:33:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4271 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4271 found at Mon Mar 20 22:33:06 UTC 2023 selfserv_9887 with PID 4271 started at Mon Mar 20 22:33:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1681: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4271 at Mon Mar 20 22:33:06 UTC 2023 kill -USR1 4271 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4271 killed at Mon Mar 20 22:33:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4324 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4324 found at Mon Mar 20 22:33:06 UTC 2023 selfserv_9887 with PID 4324 started at Mon Mar 20 22:33:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1682: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4324 at Mon Mar 20 22:33:07 UTC 2023 kill -USR1 4324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4324 killed at Mon Mar 20 22:33:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4377 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4377 found at Mon Mar 20 22:33:07 UTC 2023 selfserv_9887 with PID 4377 started at Mon Mar 20 22:33:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4377 at Mon Mar 20 22:33:07 UTC 2023 kill -USR1 4377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4377 killed at Mon Mar 20 22:33:07 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4430 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4430 found at Mon Mar 20 22:33:07 UTC 2023 selfserv_9887 with PID 4430 started at Mon Mar 20 22:33:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1684: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4430 at Mon Mar 20 22:33:08 UTC 2023 kill -USR1 4430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4430 killed at Mon Mar 20 22:33:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4482 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4482 found at Mon Mar 20 22:33:08 UTC 2023 selfserv_9887 with PID 4482 started at Mon Mar 20 22:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1685: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4482 at Mon Mar 20 22:33:08 UTC 2023 kill -USR1 4482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4482 killed at Mon Mar 20 22:33:08 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4534 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4534 found at Mon Mar 20 22:33:08 UTC 2023 selfserv_9887 with PID 4534 started at Mon Mar 20 22:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1686: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4534 at Mon Mar 20 22:33:08 UTC 2023 kill -USR1 4534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4534 killed at Mon Mar 20 22:33:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4586 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4586 found at Mon Mar 20 22:33:09 UTC 2023 selfserv_9887 with PID 4586 started at Mon Mar 20 22:33:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1687: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4586 at Mon Mar 20 22:33:09 UTC 2023 kill -USR1 4586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4586 killed at Mon Mar 20 22:33:09 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4638 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4638 found at Mon Mar 20 22:33:09 UTC 2023 selfserv_9887 with PID 4638 started at Mon Mar 20 22:33:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1688: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4638 at Mon Mar 20 22:33:09 UTC 2023 kill -USR1 4638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4638 killed at Mon Mar 20 22:33:09 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4691 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4691 found at Mon Mar 20 22:33:10 UTC 2023 selfserv_9887 with PID 4691 started at Mon Mar 20 22:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1689: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4691 at Mon Mar 20 22:33:10 UTC 2023 kill -USR1 4691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4691 killed at Mon Mar 20 22:33:10 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4743 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4743 found at Mon Mar 20 22:33:10 UTC 2023 selfserv_9887 with PID 4743 started at Mon Mar 20 22:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1690: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4743 at Mon Mar 20 22:33:10 UTC 2023 kill -USR1 4743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4743 killed at Mon Mar 20 22:33:10 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4795 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4795 found at Mon Mar 20 22:33:10 UTC 2023 selfserv_9887 with PID 4795 started at Mon Mar 20 22:33:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1691: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4795 at Mon Mar 20 22:33:11 UTC 2023 kill -USR1 4795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4795 killed at Mon Mar 20 22:33:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4847 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4847 found at Mon Mar 20 22:33:11 UTC 2023 selfserv_9887 with PID 4847 started at Mon Mar 20 22:33:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1692: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 4847 at Mon Mar 20 22:33:11 UTC 2023 kill -USR1 4847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4847 killed at Mon Mar 20 22:33:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4900 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4900 found at Mon Mar 20 22:33:11 UTC 2023 selfserv_9887 with PID 4900 started at Mon Mar 20 22:33:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1693: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4900 at Mon Mar 20 22:33:11 UTC 2023 kill -USR1 4900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4900 killed at Mon Mar 20 22:33:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4952 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 4952 found at Mon Mar 20 22:33:12 UTC 2023 selfserv_9887 with PID 4952 started at Mon Mar 20 22:33:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1694: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 4952 at Mon Mar 20 22:33:12 UTC 2023 kill -USR1 4952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 4952 killed at Mon Mar 20 22:33:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5004 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5004 found at Mon Mar 20 22:33:12 UTC 2023 selfserv_9887 with PID 5004 started at Mon Mar 20 22:33:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1695: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5004 at Mon Mar 20 22:33:12 UTC 2023 kill -USR1 5004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5004 killed at Mon Mar 20 22:33:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5056 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5056 found at Mon Mar 20 22:33:13 UTC 2023 selfserv_9887 with PID 5056 started at Mon Mar 20 22:33:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1696: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5056 at Mon Mar 20 22:33:13 UTC 2023 kill -USR1 5056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5056 killed at Mon Mar 20 22:33:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5108 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5108 found at Mon Mar 20 22:33:13 UTC 2023 selfserv_9887 with PID 5108 started at Mon Mar 20 22:33:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1697: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5108 at Mon Mar 20 22:33:13 UTC 2023 kill -USR1 5108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5108 killed at Mon Mar 20 22:33:13 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5160 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5160 found at Mon Mar 20 22:33:14 UTC 2023 selfserv_9887 with PID 5160 started at Mon Mar 20 22:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1698: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5160 at Mon Mar 20 22:33:14 UTC 2023 kill -USR1 5160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5160 killed at Mon Mar 20 22:33:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5212 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5212 found at Mon Mar 20 22:33:14 UTC 2023 selfserv_9887 with PID 5212 started at Mon Mar 20 22:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1699: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5212 at Mon Mar 20 22:33:14 UTC 2023 kill -USR1 5212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5212 killed at Mon Mar 20 22:33:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5264 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5264 found at Mon Mar 20 22:33:14 UTC 2023 selfserv_9887 with PID 5264 started at Mon Mar 20 22:33:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1700: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5264 at Mon Mar 20 22:33:15 UTC 2023 kill -USR1 5264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5264 killed at Mon Mar 20 22:33:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5316 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5316 found at Mon Mar 20 22:33:15 UTC 2023 selfserv_9887 with PID 5316 started at Mon Mar 20 22:33:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1701: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5316 at Mon Mar 20 22:33:15 UTC 2023 kill -USR1 5316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5316 killed at Mon Mar 20 22:33:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5370 found at Mon Mar 20 22:33:15 UTC 2023 selfserv_9887 with PID 5370 started at Mon Mar 20 22:33:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1702: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5370 at Mon Mar 20 22:33:16 UTC 2023 kill -USR1 5370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5370 killed at Mon Mar 20 22:33:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5422 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5422 found at Mon Mar 20 22:33:16 UTC 2023 selfserv_9887 with PID 5422 started at Mon Mar 20 22:33:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1703: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5422 at Mon Mar 20 22:33:16 UTC 2023 kill -USR1 5422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5422 killed at Mon Mar 20 22:33:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5474 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5474 found at Mon Mar 20 22:33:17 UTC 2023 selfserv_9887 with PID 5474 started at Mon Mar 20 22:33:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1704: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5474 at Mon Mar 20 22:33:17 UTC 2023 kill -USR1 5474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5474 killed at Mon Mar 20 22:33:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5526 found at Mon Mar 20 22:33:17 UTC 2023 selfserv_9887 with PID 5526 started at Mon Mar 20 22:33:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1705: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5526 at Mon Mar 20 22:33:17 UTC 2023 kill -USR1 5526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5526 killed at Mon Mar 20 22:33:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5578 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5578 found at Mon Mar 20 22:33:18 UTC 2023 selfserv_9887 with PID 5578 started at Mon Mar 20 22:33:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1706: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5578 at Mon Mar 20 22:33:18 UTC 2023 kill -USR1 5578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5578 killed at Mon Mar 20 22:33:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5630 found at Mon Mar 20 22:33:18 UTC 2023 selfserv_9887 with PID 5630 started at Mon Mar 20 22:33:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1707: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5630 at Mon Mar 20 22:33:18 UTC 2023 kill -USR1 5630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5630 killed at Mon Mar 20 22:33:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5683 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5683 found at Mon Mar 20 22:33:19 UTC 2023 selfserv_9887 with PID 5683 started at Mon Mar 20 22:33:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 5683 at Mon Mar 20 22:33:19 UTC 2023 kill -USR1 5683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5683 killed at Mon Mar 20 22:33:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5735 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5735 found at Mon Mar 20 22:33:19 UTC 2023 selfserv_9887 with PID 5735 started at Mon Mar 20 22:33:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5735 at Mon Mar 20 22:33:19 UTC 2023 kill -USR1 5735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5735 killed at Mon Mar 20 22:33:19 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5787 found at Mon Mar 20 22:33:20 UTC 2023 selfserv_9887 with PID 5787 started at Mon Mar 20 22:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1710: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5787 at Mon Mar 20 22:33:20 UTC 2023 kill -USR1 5787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5787 killed at Mon Mar 20 22:33:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5839 found at Mon Mar 20 22:33:20 UTC 2023 selfserv_9887 with PID 5839 started at Mon Mar 20 22:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1711: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5839 at Mon Mar 20 22:33:20 UTC 2023 kill -USR1 5839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5839 killed at Mon Mar 20 22:33:20 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:33:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5921 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5921 found at Mon Mar 20 22:33:20 UTC 2023 selfserv_9887 with PID 5921 started at Mon Mar 20 22:33:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1654: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5921 at Mon Mar 20 22:33:21 UTC 2023 kill -USR1 5921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5921 killed at Mon Mar 20 22:33:21 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5963 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 5963 found at Mon Mar 20 22:33:21 UTC 2023 selfserv_9887 with PID 5963 started at Mon Mar 20 22:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1655: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 5963 at Mon Mar 20 22:33:21 UTC 2023 kill -USR1 5963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 5963 killed at Mon Mar 20 22:33:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6002 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6002 found at Mon Mar 20 22:33:21 UTC 2023 selfserv_9887 with PID 6002 started at Mon Mar 20 22:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1656: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6002 at Mon Mar 20 22:33:21 UTC 2023 kill -USR1 6002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6002 killed at Mon Mar 20 22:33:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6041 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6041 found at Mon Mar 20 22:33:21 UTC 2023 selfserv_9887 with PID 6041 started at Mon Mar 20 22:33:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6041 at Mon Mar 20 22:33:22 UTC 2023 kill -USR1 6041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6041 killed at Mon Mar 20 22:33:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6080 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6080 found at Mon Mar 20 22:33:22 UTC 2023 selfserv_9887 with PID 6080 started at Mon Mar 20 22:33:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1658: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 6080 at Mon Mar 20 22:33:22 UTC 2023 kill -USR1 6080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6080 killed at Mon Mar 20 22:33:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6119 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6119 found at Mon Mar 20 22:33:22 UTC 2023 selfserv_9887 with PID 6119 started at Mon Mar 20 22:33:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1659: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6119 at Mon Mar 20 22:33:22 UTC 2023 kill -USR1 6119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6119 killed at Mon Mar 20 22:33:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6158 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6158 found at Mon Mar 20 22:33:23 UTC 2023 selfserv_9887 with PID 6158 started at Mon Mar 20 22:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1660: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6158 at Mon Mar 20 22:33:23 UTC 2023 kill -USR1 6158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6158 killed at Mon Mar 20 22:33:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6198 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6198 found at Mon Mar 20 22:33:23 UTC 2023 selfserv_9887 with PID 6198 started at Mon Mar 20 22:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6198 at Mon Mar 20 22:33:23 UTC 2023 kill -USR1 6198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6198 killed at Mon Mar 20 22:33:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6246 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6246 found at Mon Mar 20 22:33:23 UTC 2023 selfserv_9887 with PID 6246 started at Mon Mar 20 22:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6246 at Mon Mar 20 22:33:23 UTC 2023 kill -USR1 6246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6246 killed at Mon Mar 20 22:33:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6287 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6287 found at Mon Mar 20 22:33:24 UTC 2023 selfserv_9887 with PID 6287 started at Mon Mar 20 22:33:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6287 at Mon Mar 20 22:33:24 UTC 2023 kill -USR1 6287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6287 killed at Mon Mar 20 22:33:24 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6328 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6328 found at Mon Mar 20 22:33:24 UTC 2023 selfserv_9887 with PID 6328 started at Mon Mar 20 22:33:24 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1664: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6328 at Mon Mar 20 22:33:24 UTC 2023 kill -USR1 6328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6328 killed at Mon Mar 20 22:33:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6370 found at Mon Mar 20 22:33:24 UTC 2023 selfserv_9887 with PID 6370 started at Mon Mar 20 22:33:24 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1665: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6370 at Mon Mar 20 22:33:24 UTC 2023 kill -USR1 6370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6370 killed at Mon Mar 20 22:33:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6410 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6410 found at Mon Mar 20 22:33:25 UTC 2023 selfserv_9887 with PID 6410 started at Mon Mar 20 22:33:25 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1666: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6410 at Mon Mar 20 22:33:25 UTC 2023 kill -USR1 6410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6410 killed at Mon Mar 20 22:33:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6455 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6455 found at Mon Mar 20 22:33:25 UTC 2023 selfserv_9887 with PID 6455 started at Mon Mar 20 22:33:25 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1667: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 6455 at Mon Mar 20 22:33:25 UTC 2023 kill -USR1 6455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6455 killed at Mon Mar 20 22:33:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6499 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6499 found at Mon Mar 20 22:33:25 UTC 2023 selfserv_9887 with PID 6499 started at Mon Mar 20 22:33:25 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1668: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6499 at Mon Mar 20 22:33:26 UTC 2023 kill -USR1 6499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6499 killed at Mon Mar 20 22:33:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6540 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6540 found at Mon Mar 20 22:33:26 UTC 2023 selfserv_9887 with PID 6540 started at Mon Mar 20 22:33:26 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1669: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6540 at Mon Mar 20 22:33:26 UTC 2023 kill -USR1 6540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6540 killed at Mon Mar 20 22:33:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6582 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6582 found at Mon Mar 20 22:33:26 UTC 2023 selfserv_9887 with PID 6582 started at Mon Mar 20 22:33:26 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1670: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6582 at Mon Mar 20 22:33:26 UTC 2023 kill -USR1 6582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6582 killed at Mon Mar 20 22:33:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6631 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6631 found at Mon Mar 20 22:33:26 UTC 2023 selfserv_9887 with PID 6631 started at Mon Mar 20 22:33:27 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1671: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6631 at Mon Mar 20 22:33:27 UTC 2023 kill -USR1 6631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6631 killed at Mon Mar 20 22:33:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:33:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6675 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6675 found at Mon Mar 20 22:33:27 UTC 2023 selfserv_9887 with PID 6675 started at Mon Mar 20 22:33:27 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1672: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 6675 at Mon Mar 20 22:33:27 UTC 2023 kill -USR1 6675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6675 killed at Mon Mar 20 22:33:27 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -fips true -force FIPS mode enabled. ssl.sh: #1673: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1674: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1675: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1676: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1677: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1678: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 22:33:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 6762 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 6762 found at Mon Mar 20 22:33:28 UTC 2023 selfserv_9887 with PID 6762 started at Mon Mar 20 22:33:28 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1679: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1680: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1681: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1682: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1683: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1684: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1685: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1686: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1687: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1688: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1689: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1690: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1691: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1692: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1693: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1694: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1695: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1696: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1697: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1698: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1699: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1700: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1701: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1702: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1703: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1704: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1705: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1706: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1707: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1708: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1709: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1710: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1711: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1712: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1713: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1714: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1715: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1716: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1717: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1718: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1719: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1720: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1721: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1722: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1723: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1724: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1725: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1726: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1727: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1728: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1729: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 6762 at Mon Mar 20 22:33:33 UTC 2023 kill -USR1 6762 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 6762 killed at Mon Mar 20 22:33:33 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:33:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 7318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 7318 found at Mon Mar 20 22:33:34 UTC 2023 selfserv_9887 with PID 7318 started at Mon Mar 20 22:33:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1730: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1731: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1732: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1733: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1734: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1735: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1736: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1737: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1738: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1739: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1740: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1741: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1742: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1743: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1744: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1745: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1746: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1747: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1748: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1749: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1750: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1751: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1752: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1753: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1754: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1755: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1756: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1757: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1758: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1759: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1760: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1761: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1762: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1763: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1764: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1765: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1766: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1767: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1768: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1769: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1770: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1771: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1772: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1773: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1774: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1775: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1776: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1777: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1778: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1779: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1780: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1781: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1782: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1783: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1784: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1785: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1786: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1787: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1788: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1789: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1790: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1791: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1792: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1793: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1794: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1795: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1796: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1797: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1798: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1799: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1800: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1801: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1802: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1803: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1804: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1805: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 7318 at Mon Mar 20 22:33:47 UTC 2023 kill -USR1 7318 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 7318 killed at Mon Mar 20 22:33:47 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 22:33:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8145 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8145 found at Mon Mar 20 22:33:47 UTC 2023 selfserv_9887 with PID 8145 started at Mon Mar 20 22:33:47 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1806: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1807: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8145 at Mon Mar 20 22:33:48 UTC 2023 kill -USR1 8145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8145 killed at Mon Mar 20 22:33:48 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8212 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8212 found at Mon Mar 20 22:33:48 UTC 2023 selfserv_9887 with PID 8212 started at Mon Mar 20 22:33:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1806: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8212 at Mon Mar 20 22:33:48 UTC 2023 kill -USR1 8212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8212 killed at Mon Mar 20 22:33:48 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:48 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:48 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8264 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8264 found at Mon Mar 20 22:33:49 UTC 2023 selfserv_9887 with PID 8264 started at Mon Mar 20 22:33:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1807: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8264 at Mon Mar 20 22:33:49 UTC 2023 kill -USR1 8264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8264 killed at Mon Mar 20 22:33:49 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:49 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8317 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8317 found at Mon Mar 20 22:33:49 UTC 2023 selfserv_9887 with PID 8317 started at Mon Mar 20 22:33:49 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8317 at Mon Mar 20 22:33:50 UTC 2023 kill -USR1 8317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8317 killed at Mon Mar 20 22:33:50 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8370 found at Mon Mar 20 22:33:50 UTC 2023 selfserv_9887 with PID 8370 started at Mon Mar 20 22:33:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1809: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8370 at Mon Mar 20 22:33:50 UTC 2023 kill -USR1 8370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8370 killed at Mon Mar 20 22:33:50 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:50 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8422 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8422 found at Mon Mar 20 22:33:50 UTC 2023 selfserv_9887 with PID 8422 started at Mon Mar 20 22:33:50 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1810: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8422 at Mon Mar 20 22:33:51 UTC 2023 kill -USR1 8422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8422 killed at Mon Mar 20 22:33:51 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8474 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8474 found at Mon Mar 20 22:33:51 UTC 2023 selfserv_9887 with PID 8474 started at Mon Mar 20 22:33:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1811: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8474 at Mon Mar 20 22:33:51 UTC 2023 kill -USR1 8474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8474 killed at Mon Mar 20 22:33:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8526 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8526 found at Mon Mar 20 22:33:52 UTC 2023 selfserv_9887 with PID 8526 started at Mon Mar 20 22:33:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1812: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8526 at Mon Mar 20 22:33:52 UTC 2023 kill -USR1 8526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8526 killed at Mon Mar 20 22:33:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8578 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8578 found at Mon Mar 20 22:33:52 UTC 2023 selfserv_9887 with PID 8578 started at Mon Mar 20 22:33:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1813: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8578 at Mon Mar 20 22:33:52 UTC 2023 kill -USR1 8578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8578 killed at Mon Mar 20 22:33:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:52 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:52 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8630 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8630 found at Mon Mar 20 22:33:53 UTC 2023 selfserv_9887 with PID 8630 started at Mon Mar 20 22:33:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8630 at Mon Mar 20 22:33:53 UTC 2023 kill -USR1 8630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8630 killed at Mon Mar 20 22:33:53 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8682 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8682 found at Mon Mar 20 22:33:53 UTC 2023 selfserv_9887 with PID 8682 started at Mon Mar 20 22:33:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1815: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8682 at Mon Mar 20 22:33:53 UTC 2023 kill -USR1 8682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8682 killed at Mon Mar 20 22:33:53 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8734 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8734 found at Mon Mar 20 22:33:54 UTC 2023 selfserv_9887 with PID 8734 started at Mon Mar 20 22:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1816: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8734 at Mon Mar 20 22:33:54 UTC 2023 kill -USR1 8734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8734 killed at Mon Mar 20 22:33:54 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8786 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8786 found at Mon Mar 20 22:33:54 UTC 2023 selfserv_9887 with PID 8786 started at Mon Mar 20 22:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8786 at Mon Mar 20 22:33:54 UTC 2023 kill -USR1 8786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8786 killed at Mon Mar 20 22:33:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8838 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8838 found at Mon Mar 20 22:33:54 UTC 2023 selfserv_9887 with PID 8838 started at Mon Mar 20 22:33:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1818: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8838 at Mon Mar 20 22:33:55 UTC 2023 kill -USR1 8838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8838 killed at Mon Mar 20 22:33:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8890 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8890 found at Mon Mar 20 22:33:55 UTC 2023 selfserv_9887 with PID 8890 started at Mon Mar 20 22:33:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8890 at Mon Mar 20 22:33:56 UTC 2023 kill -USR1 8890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8890 killed at Mon Mar 20 22:33:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8942 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8942 found at Mon Mar 20 22:33:56 UTC 2023 selfserv_9887 with PID 8942 started at Mon Mar 20 22:33:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 8942 at Mon Mar 20 22:33:57 UTC 2023 kill -USR1 8942 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8942 killed at Mon Mar 20 22:33:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8995 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 8995 found at Mon Mar 20 22:33:57 UTC 2023 selfserv_9887 with PID 8995 started at Mon Mar 20 22:33:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1821: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 8995 at Mon Mar 20 22:33:58 UTC 2023 kill -USR1 8995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 8995 killed at Mon Mar 20 22:33:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:33:58 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9047 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9047 found at Mon Mar 20 22:33:58 UTC 2023 selfserv_9887 with PID 9047 started at Mon Mar 20 22:33:58 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1822: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9047 at Mon Mar 20 22:33:58 UTC 2023 kill -USR1 9047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9047 killed at Mon Mar 20 22:33:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9099 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9099 found at Mon Mar 20 22:33:59 UTC 2023 selfserv_9887 with PID 9099 started at Mon Mar 20 22:33:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9099 at Mon Mar 20 22:33:59 UTC 2023 kill -USR1 9099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9099 killed at Mon Mar 20 22:33:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:33:59 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:33:59 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9151 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9151 found at Mon Mar 20 22:34:00 UTC 2023 selfserv_9887 with PID 9151 started at Mon Mar 20 22:34:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1824: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9151 at Mon Mar 20 22:34:00 UTC 2023 kill -USR1 9151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9151 killed at Mon Mar 20 22:34:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9203 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9203 found at Mon Mar 20 22:34:00 UTC 2023 selfserv_9887 with PID 9203 started at Mon Mar 20 22:34:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9203 at Mon Mar 20 22:34:01 UTC 2023 kill -USR1 9203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9203 killed at Mon Mar 20 22:34:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9255 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9255 found at Mon Mar 20 22:34:01 UTC 2023 selfserv_9887 with PID 9255 started at Mon Mar 20 22:34:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9255 at Mon Mar 20 22:34:02 UTC 2023 kill -USR1 9255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9255 killed at Mon Mar 20 22:34:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9307 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9307 found at Mon Mar 20 22:34:02 UTC 2023 selfserv_9887 with PID 9307 started at Mon Mar 20 22:34:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1827: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9307 at Mon Mar 20 22:34:03 UTC 2023 kill -USR1 9307 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9307 killed at Mon Mar 20 22:34:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9360 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9360 found at Mon Mar 20 22:34:03 UTC 2023 selfserv_9887 with PID 9360 started at Mon Mar 20 22:34:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1828: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9360 at Mon Mar 20 22:34:04 UTC 2023 kill -USR1 9360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9360 killed at Mon Mar 20 22:34:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9412 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9412 found at Mon Mar 20 22:34:04 UTC 2023 selfserv_9887 with PID 9412 started at Mon Mar 20 22:34:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1829: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9412 at Mon Mar 20 22:34:04 UTC 2023 kill -USR1 9412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9412 killed at Mon Mar 20 22:34:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9464 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9464 found at Mon Mar 20 22:34:05 UTC 2023 selfserv_9887 with PID 9464 started at Mon Mar 20 22:34:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1830: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9464 at Mon Mar 20 22:34:05 UTC 2023 kill -USR1 9464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9464 killed at Mon Mar 20 22:34:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9516 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9516 found at Mon Mar 20 22:34:05 UTC 2023 selfserv_9887 with PID 9516 started at Mon Mar 20 22:34:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9516 at Mon Mar 20 22:34:05 UTC 2023 kill -USR1 9516 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9516 killed at Mon Mar 20 22:34:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9568 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9568 found at Mon Mar 20 22:34:06 UTC 2023 selfserv_9887 with PID 9568 started at Mon Mar 20 22:34:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9568 at Mon Mar 20 22:34:06 UTC 2023 kill -USR1 9568 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9568 killed at Mon Mar 20 22:34:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9620 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9620 found at Mon Mar 20 22:34:06 UTC 2023 selfserv_9887 with PID 9620 started at Mon Mar 20 22:34:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1833: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9620 at Mon Mar 20 22:34:07 UTC 2023 kill -USR1 9620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9620 killed at Mon Mar 20 22:34:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9672 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9672 found at Mon Mar 20 22:34:07 UTC 2023 selfserv_9887 with PID 9672 started at Mon Mar 20 22:34:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1834: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9672 at Mon Mar 20 22:34:07 UTC 2023 kill -USR1 9672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9672 killed at Mon Mar 20 22:34:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9724 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9724 found at Mon Mar 20 22:34:07 UTC 2023 selfserv_9887 with PID 9724 started at Mon Mar 20 22:34:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1835: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9724 at Mon Mar 20 22:34:08 UTC 2023 kill -USR1 9724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9724 killed at Mon Mar 20 22:34:08 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9776 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9776 found at Mon Mar 20 22:34:08 UTC 2023 selfserv_9887 with PID 9776 started at Mon Mar 20 22:34:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1836: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9776 at Mon Mar 20 22:34:08 UTC 2023 kill -USR1 9776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9776 killed at Mon Mar 20 22:34:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9829 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9829 found at Mon Mar 20 22:34:08 UTC 2023 selfserv_9887 with PID 9829 started at Mon Mar 20 22:34:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1837: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9829 at Mon Mar 20 22:34:08 UTC 2023 kill -USR1 9829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9829 killed at Mon Mar 20 22:34:09 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9881 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9881 found at Mon Mar 20 22:34:09 UTC 2023 selfserv_9887 with PID 9881 started at Mon Mar 20 22:34:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1838: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9881 at Mon Mar 20 22:34:09 UTC 2023 kill -USR1 9881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9881 killed at Mon Mar 20 22:34:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9933 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9933 found at Mon Mar 20 22:34:09 UTC 2023 selfserv_9887 with PID 9933 started at Mon Mar 20 22:34:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1839: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 9933 at Mon Mar 20 22:34:09 UTC 2023 kill -USR1 9933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9933 killed at Mon Mar 20 22:34:09 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9985 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 9985 found at Mon Mar 20 22:34:10 UTC 2023 selfserv_9887 with PID 9985 started at Mon Mar 20 22:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1840: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 9985 at Mon Mar 20 22:34:10 UTC 2023 kill -USR1 9985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 9985 killed at Mon Mar 20 22:34:10 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10037 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10037 found at Mon Mar 20 22:34:10 UTC 2023 selfserv_9887 with PID 10037 started at Mon Mar 20 22:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1841: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10037 at Mon Mar 20 22:34:10 UTC 2023 kill -USR1 10037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10037 killed at Mon Mar 20 22:34:10 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10090 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10090 found at Mon Mar 20 22:34:11 UTC 2023 selfserv_9887 with PID 10090 started at Mon Mar 20 22:34:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1842: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10090 at Mon Mar 20 22:34:11 UTC 2023 kill -USR1 10090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10090 killed at Mon Mar 20 22:34:11 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10142 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10142 found at Mon Mar 20 22:34:11 UTC 2023 selfserv_9887 with PID 10142 started at Mon Mar 20 22:34:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1843: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10142 at Mon Mar 20 22:34:12 UTC 2023 kill -USR1 10142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10142 killed at Mon Mar 20 22:34:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10194 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10194 found at Mon Mar 20 22:34:12 UTC 2023 selfserv_9887 with PID 10194 started at Mon Mar 20 22:34:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1844: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10194 at Mon Mar 20 22:34:12 UTC 2023 kill -USR1 10194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10194 killed at Mon Mar 20 22:34:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10246 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10246 found at Mon Mar 20 22:34:12 UTC 2023 selfserv_9887 with PID 10246 started at Mon Mar 20 22:34:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1845: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10246 at Mon Mar 20 22:34:13 UTC 2023 kill -USR1 10246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10246 killed at Mon Mar 20 22:34:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10298 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10298 found at Mon Mar 20 22:34:13 UTC 2023 selfserv_9887 with PID 10298 started at Mon Mar 20 22:34:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1846: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10298 at Mon Mar 20 22:34:13 UTC 2023 kill -USR1 10298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10298 killed at Mon Mar 20 22:34:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10350 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10350 found at Mon Mar 20 22:34:14 UTC 2023 selfserv_9887 with PID 10350 started at Mon Mar 20 22:34:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1847: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10350 at Mon Mar 20 22:34:14 UTC 2023 kill -USR1 10350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10350 killed at Mon Mar 20 22:34:14 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10402 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10402 found at Mon Mar 20 22:34:14 UTC 2023 selfserv_9887 with PID 10402 started at Mon Mar 20 22:34:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1848: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10402 at Mon Mar 20 22:34:14 UTC 2023 kill -USR1 10402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10402 killed at Mon Mar 20 22:34:14 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10454 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10454 found at Mon Mar 20 22:34:15 UTC 2023 selfserv_9887 with PID 10454 started at Mon Mar 20 22:34:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1849: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10454 at Mon Mar 20 22:34:15 UTC 2023 kill -USR1 10454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10454 killed at Mon Mar 20 22:34:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10506 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10506 found at Mon Mar 20 22:34:15 UTC 2023 selfserv_9887 with PID 10506 started at Mon Mar 20 22:34:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1850: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10506 at Mon Mar 20 22:34:16 UTC 2023 kill -USR1 10506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10506 killed at Mon Mar 20 22:34:16 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10558 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10558 found at Mon Mar 20 22:34:16 UTC 2023 selfserv_9887 with PID 10558 started at Mon Mar 20 22:34:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1851: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10558 at Mon Mar 20 22:34:16 UTC 2023 kill -USR1 10558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10558 killed at Mon Mar 20 22:34:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10610 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10610 found at Mon Mar 20 22:34:17 UTC 2023 selfserv_9887 with PID 10610 started at Mon Mar 20 22:34:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1852: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10610 at Mon Mar 20 22:34:17 UTC 2023 kill -USR1 10610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10610 killed at Mon Mar 20 22:34:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10663 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10663 found at Mon Mar 20 22:34:18 UTC 2023 selfserv_9887 with PID 10663 started at Mon Mar 20 22:34:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1853: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10663 at Mon Mar 20 22:34:18 UTC 2023 kill -USR1 10663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10663 killed at Mon Mar 20 22:34:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10715 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10715 found at Mon Mar 20 22:34:18 UTC 2023 selfserv_9887 with PID 10715 started at Mon Mar 20 22:34:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1854: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10715 at Mon Mar 20 22:34:19 UTC 2023 kill -USR1 10715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10715 killed at Mon Mar 20 22:34:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10767 found at Mon Mar 20 22:34:19 UTC 2023 selfserv_9887 with PID 10767 started at Mon Mar 20 22:34:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1855: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10767 at Mon Mar 20 22:34:20 UTC 2023 kill -USR1 10767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10767 killed at Mon Mar 20 22:34:20 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10819 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10819 found at Mon Mar 20 22:34:20 UTC 2023 selfserv_9887 with PID 10819 started at Mon Mar 20 22:34:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1856: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 10819 at Mon Mar 20 22:34:21 UTC 2023 kill -USR1 10819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10819 killed at Mon Mar 20 22:34:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10871 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10871 found at Mon Mar 20 22:34:21 UTC 2023 selfserv_9887 with PID 10871 started at Mon Mar 20 22:34:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1857: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10871 at Mon Mar 20 22:34:22 UTC 2023 kill -USR1 10871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10871 killed at Mon Mar 20 22:34:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10923 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10923 found at Mon Mar 20 22:34:22 UTC 2023 selfserv_9887 with PID 10923 started at Mon Mar 20 22:34:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1858: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10923 at Mon Mar 20 22:34:22 UTC 2023 kill -USR1 10923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10923 killed at Mon Mar 20 22:34:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10975 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 10975 found at Mon Mar 20 22:34:22 UTC 2023 selfserv_9887 with PID 10975 started at Mon Mar 20 22:34:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1859: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 10975 at Mon Mar 20 22:34:23 UTC 2023 kill -USR1 10975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 10975 killed at Mon Mar 20 22:34:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:34:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11027 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11027 found at Mon Mar 20 22:34:23 UTC 2023 selfserv_9887 with PID 11027 started at Mon Mar 20 22:34:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1860: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11027 at Mon Mar 20 22:34:23 UTC 2023 kill -USR1 11027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11027 killed at Mon Mar 20 22:34:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11079 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11079 found at Mon Mar 20 22:34:23 UTC 2023 selfserv_9887 with PID 11079 started at Mon Mar 20 22:34:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1861: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11079 at Mon Mar 20 22:34:24 UTC 2023 kill -USR1 11079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11079 killed at Mon Mar 20 22:34:24 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11131 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11131 found at Mon Mar 20 22:34:24 UTC 2023 selfserv_9887 with PID 11131 started at Mon Mar 20 22:34:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1862: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11131 at Mon Mar 20 22:34:24 UTC 2023 kill -USR1 11131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11131 killed at Mon Mar 20 22:34:25 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:34:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11184 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11184 found at Mon Mar 20 22:34:25 UTC 2023 selfserv_9887 with PID 11184 started at Mon Mar 20 22:34:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1863: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11184 at Mon Mar 20 22:34:25 UTC 2023 kill -USR1 11184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11184 killed at Mon Mar 20 22:34:25 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:34:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11242 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11242 found at Mon Mar 20 22:34:25 UTC 2023 selfserv_9887 with PID 11242 started at Mon Mar 20 22:34:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1864: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11242 at Mon Mar 20 22:34:25 UTC 2023 kill -USR1 11242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11242 killed at Mon Mar 20 22:34:25 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:34:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11300 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11300 found at Mon Mar 20 22:34:26 UTC 2023 selfserv_9887 with PID 11300 started at Mon Mar 20 22:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1865: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11300 at Mon Mar 20 22:34:26 UTC 2023 kill -USR1 11300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11300 killed at Mon Mar 20 22:34:26 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:34:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11358 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11358 found at Mon Mar 20 22:34:26 UTC 2023 selfserv_9887 with PID 11358 started at Mon Mar 20 22:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1866: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11358 at Mon Mar 20 22:34:26 UTC 2023 kill -USR1 11358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11358 killed at Mon Mar 20 22:34:26 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:34:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11416 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11416 found at Mon Mar 20 22:34:26 UTC 2023 selfserv_9887 with PID 11416 started at Mon Mar 20 22:34:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1867: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11416 at Mon Mar 20 22:34:27 UTC 2023 kill -USR1 11416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11416 killed at Mon Mar 20 22:34:27 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 22:34:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11475 found at Mon Mar 20 22:34:27 UTC 2023 selfserv_9887 with PID 11475 started at Mon Mar 20 22:34:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1868: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11475 at Mon Mar 20 22:34:27 UTC 2023 kill -USR1 11475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11475 killed at Mon Mar 20 22:34:27 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:34:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11533 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11533 found at Mon Mar 20 22:34:27 UTC 2023 selfserv_9887 with PID 11533 started at Mon Mar 20 22:34:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1869: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11533 at Mon Mar 20 22:34:27 UTC 2023 kill -USR1 11533 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11533 killed at Mon Mar 20 22:34:27 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:34:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11591 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11591 found at Mon Mar 20 22:34:28 UTC 2023 selfserv_9887 with PID 11591 started at Mon Mar 20 22:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1870: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11591 at Mon Mar 20 22:34:28 UTC 2023 kill -USR1 11591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11591 killed at Mon Mar 20 22:34:28 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:34:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11650 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11650 found at Mon Mar 20 22:34:28 UTC 2023 selfserv_9887 with PID 11650 started at Mon Mar 20 22:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1871: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11650 at Mon Mar 20 22:34:28 UTC 2023 kill -USR1 11650 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11650 killed at Mon Mar 20 22:34:28 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:34:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11708 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11708 found at Mon Mar 20 22:34:28 UTC 2023 selfserv_9887 with PID 11708 started at Mon Mar 20 22:34:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1872: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11708 at Mon Mar 20 22:34:29 UTC 2023 kill -USR1 11708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11708 killed at Mon Mar 20 22:34:29 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:34:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11767 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11767 found at Mon Mar 20 22:34:29 UTC 2023 selfserv_9887 with PID 11767 started at Mon Mar 20 22:34:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1873: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 11767 at Mon Mar 20 22:34:29 UTC 2023 kill -USR1 11767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11767 killed at Mon Mar 20 22:34:29 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 22:34:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11809 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11809 found at Mon Mar 20 22:34:29 UTC 2023 selfserv_9887 with PID 11809 started at Mon Mar 20 22:34:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1806: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 11809 at Mon Mar 20 22:34:29 UTC 2023 kill -USR1 11809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11809 killed at Mon Mar 20 22:34:29 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 22:34:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11851 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11851 found at Mon Mar 20 22:34:30 UTC 2023 selfserv_9887 with PID 11851 started at Mon Mar 20 22:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1807: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 11851 at Mon Mar 20 22:34:30 UTC 2023 kill -USR1 11851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11851 killed at Mon Mar 20 22:34:30 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 22:34:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11893 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11893 found at Mon Mar 20 22:34:30 UTC 2023 selfserv_9887 with PID 11893 started at Mon Mar 20 22:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1808: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 11893 at Mon Mar 20 22:34:30 UTC 2023 kill -USR1 11893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11893 killed at Mon Mar 20 22:34:30 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 22:34:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11935 found at Mon Mar 20 22:34:30 UTC 2023 selfserv_9887 with PID 11935 started at Mon Mar 20 22:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1809: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 11935 at Mon Mar 20 22:34:30 UTC 2023 kill -USR1 11935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11935 killed at Mon Mar 20 22:34:30 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 22:34:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11977 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 11977 found at Mon Mar 20 22:34:31 UTC 2023 selfserv_9887 with PID 11977 started at Mon Mar 20 22:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1810: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 11977 at Mon Mar 20 22:34:31 UTC 2023 kill -USR1 11977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 11977 killed at Mon Mar 20 22:34:31 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 22:34:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12019 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12019 found at Mon Mar 20 22:34:31 UTC 2023 selfserv_9887 with PID 12019 started at Mon Mar 20 22:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1811: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 12019 at Mon Mar 20 22:34:31 UTC 2023 kill -USR1 12019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12019 killed at Mon Mar 20 22:34:31 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 22:34:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12061 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12061 found at Mon Mar 20 22:34:31 UTC 2023 selfserv_9887 with PID 12061 started at Mon Mar 20 22:34:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1812: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 12061 at Mon Mar 20 22:34:31 UTC 2023 kill -USR1 12061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12061 killed at Mon Mar 20 22:34:32 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 22:34:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:34:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12103 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12103 found at Mon Mar 20 22:34:32 UTC 2023 selfserv_9887 with PID 12103 started at Mon Mar 20 22:34:32 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 22:34:32 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 22:36:37 UTC 2023 ssl.sh: #1813: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 12103 at Mon Mar 20 22:36:37 UTC 2023 kill -USR1 12103 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12103 killed at Mon Mar 20 22:36:38 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:36:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12196 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12196 found at Mon Mar 20 22:36:38 UTC 2023 selfserv_9887 with PID 12196 started at Mon Mar 20 22:36:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12196 at Mon Mar 20 22:36:38 UTC 2023 kill -USR1 12196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12196 killed at Mon Mar 20 22:36:38 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12238 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12238 found at Mon Mar 20 22:36:38 UTC 2023 selfserv_9887 with PID 12238 started at Mon Mar 20 22:36:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1815: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12238 at Mon Mar 20 22:36:38 UTC 2023 kill -USR1 12238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12238 killed at Mon Mar 20 22:36:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12277 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12277 found at Mon Mar 20 22:36:39 UTC 2023 selfserv_9887 with PID 12277 started at Mon Mar 20 22:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1816: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12277 at Mon Mar 20 22:36:39 UTC 2023 kill -USR1 12277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12277 killed at Mon Mar 20 22:36:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12316 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12316 found at Mon Mar 20 22:36:39 UTC 2023 selfserv_9887 with PID 12316 started at Mon Mar 20 22:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12316 at Mon Mar 20 22:36:39 UTC 2023 kill -USR1 12316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12316 killed at Mon Mar 20 22:36:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12355 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12355 found at Mon Mar 20 22:36:39 UTC 2023 selfserv_9887 with PID 12355 started at Mon Mar 20 22:36:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1818: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 12355 at Mon Mar 20 22:36:39 UTC 2023 kill -USR1 12355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12355 killed at Mon Mar 20 22:36:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12397 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12397 found at Mon Mar 20 22:36:40 UTC 2023 selfserv_9887 with PID 12397 started at Mon Mar 20 22:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12397 at Mon Mar 20 22:36:40 UTC 2023 kill -USR1 12397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12397 killed at Mon Mar 20 22:36:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12436 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12436 found at Mon Mar 20 22:36:40 UTC 2023 selfserv_9887 with PID 12436 started at Mon Mar 20 22:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12436 at Mon Mar 20 22:36:40 UTC 2023 kill -USR1 12436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12436 killed at Mon Mar 20 22:36:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:40 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12475 found at Mon Mar 20 22:36:40 UTC 2023 selfserv_9887 with PID 12475 started at Mon Mar 20 22:36:40 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12475 at Mon Mar 20 22:36:41 UTC 2023 kill -USR1 12475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12475 killed at Mon Mar 20 22:36:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12520 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12520 found at Mon Mar 20 22:36:41 UTC 2023 selfserv_9887 with PID 12520 started at Mon Mar 20 22:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12520 at Mon Mar 20 22:36:41 UTC 2023 kill -USR1 12520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12520 killed at Mon Mar 20 22:36:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12559 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12559 found at Mon Mar 20 22:36:41 UTC 2023 selfserv_9887 with PID 12559 started at Mon Mar 20 22:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12559 at Mon Mar 20 22:36:41 UTC 2023 kill -USR1 12559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12559 killed at Mon Mar 20 22:36:41 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:41 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:41 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12598 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12598 found at Mon Mar 20 22:36:42 UTC 2023 selfserv_9887 with PID 12598 started at Mon Mar 20 22:36:42 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1824: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12598 at Mon Mar 20 22:36:42 UTC 2023 kill -USR1 12598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12598 killed at Mon Mar 20 22:36:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12639 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12639 found at Mon Mar 20 22:36:42 UTC 2023 selfserv_9887 with PID 12639 started at Mon Mar 20 22:36:42 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1825: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12639 at Mon Mar 20 22:36:42 UTC 2023 kill -USR1 12639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12639 killed at Mon Mar 20 22:36:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12685 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12685 found at Mon Mar 20 22:36:42 UTC 2023 selfserv_9887 with PID 12685 started at Mon Mar 20 22:36:42 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1826: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12685 at Mon Mar 20 22:36:42 UTC 2023 kill -USR1 12685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12685 killed at Mon Mar 20 22:36:42 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12725 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12725 found at Mon Mar 20 22:36:43 UTC 2023 selfserv_9887 with PID 12725 started at Mon Mar 20 22:36:43 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1827: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 12725 at Mon Mar 20 22:36:43 UTC 2023 kill -USR1 12725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12725 killed at Mon Mar 20 22:36:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12775 found at Mon Mar 20 22:36:43 UTC 2023 selfserv_9887 with PID 12775 started at Mon Mar 20 22:36:43 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1828: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12775 at Mon Mar 20 22:36:43 UTC 2023 kill -USR1 12775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12775 killed at Mon Mar 20 22:36:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12816 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12816 found at Mon Mar 20 22:36:43 UTC 2023 selfserv_9887 with PID 12816 started at Mon Mar 20 22:36:43 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1829: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12816 at Mon Mar 20 22:36:43 UTC 2023 kill -USR1 12816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12816 killed at Mon Mar 20 22:36:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12859 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12859 found at Mon Mar 20 22:36:44 UTC 2023 selfserv_9887 with PID 12859 started at Mon Mar 20 22:36:44 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1830: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12859 at Mon Mar 20 22:36:44 UTC 2023 kill -USR1 12859 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12859 killed at Mon Mar 20 22:36:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12899 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12899 found at Mon Mar 20 22:36:44 UTC 2023 selfserv_9887 with PID 12899 started at Mon Mar 20 22:36:44 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1831: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12899 at Mon Mar 20 22:36:44 UTC 2023 kill -USR1 12899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12899 killed at Mon Mar 20 22:36:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:36:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12939 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12939 found at Mon Mar 20 22:36:44 UTC 2023 selfserv_9887 with PID 12939 started at Mon Mar 20 22:36:44 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1832: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 12939 at Mon Mar 20 22:36:45 UTC 2023 kill -USR1 12939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12939 killed at Mon Mar 20 22:36:45 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9887 starting at Mon Mar 20 22:36:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 12979 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 12979 found at Mon Mar 20 22:36:45 UTC 2023 selfserv_9887 with PID 12979 started at Mon Mar 20 22:36:45 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1833: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1834: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1835: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1836: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1837: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1838: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1839: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1840: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1841: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1842: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1843: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1844: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1845: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1846: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1847: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1848: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1849: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1850: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1851: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1852: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1853: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1854: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1855: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1856: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1857: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1858: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1859: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1860: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1861: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1862: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1863: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1864: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1865: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1866: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1867: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1868: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1869: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1870: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1871: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1872: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1873: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1874: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1875: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1876: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1877: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1878: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1879: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1880: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1881: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1882: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1883: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 12979 at Mon Mar 20 22:36:51 UTC 2023 kill -USR1 12979 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 12979 killed at Mon Mar 20 22:36:51 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:36:51 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:36:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 13528 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 13528 found at Mon Mar 20 22:36:51 UTC 2023 selfserv_9887 with PID 13528 started at Mon Mar 20 22:36:51 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1884: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1885: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1886: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1887: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1888: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1889: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1890: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1891: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1892: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1893: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1894: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1895: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1896: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1897: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1898: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1899: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1900: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1901: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1902: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1903: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1904: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1905: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1906: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1907: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1908: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1909: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1910: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1911: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1912: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1913: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1914: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1915: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1916: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1917: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1918: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1919: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1920: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1921: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1922: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1923: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1924: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1925: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1926: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1927: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1928: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1929: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1930: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1931: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1932: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1933: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1934: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1935: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1936: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1937: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1938: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1939: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1940: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1941: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1942: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1943: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1944: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1945: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1946: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1947: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1948: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1949: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1950: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1951: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1952: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1953: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1954: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1956: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1957: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1958: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1959: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 13528 at Mon Mar 20 22:37:01 UTC 2023 kill -USR1 13528 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 13528 killed at Mon Mar 20 22:37:01 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14340 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14340 found at Mon Mar 20 22:37:01 UTC 2023 selfserv_9887 with PID 14340 started at Mon Mar 20 22:37:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1960: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14340 at Mon Mar 20 22:37:01 UTC 2023 kill -USR1 14340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14340 killed at Mon Mar 20 22:37:01 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14392 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14392 found at Mon Mar 20 22:37:01 UTC 2023 selfserv_9887 with PID 14392 started at Mon Mar 20 22:37:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1961: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14392 at Mon Mar 20 22:37:02 UTC 2023 kill -USR1 14392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14392 killed at Mon Mar 20 22:37:02 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14444 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14444 found at Mon Mar 20 22:37:02 UTC 2023 selfserv_9887 with PID 14444 started at Mon Mar 20 22:37:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1962: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14444 at Mon Mar 20 22:37:02 UTC 2023 kill -USR1 14444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14444 killed at Mon Mar 20 22:37:02 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14496 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14496 found at Mon Mar 20 22:37:02 UTC 2023 selfserv_9887 with PID 14496 started at Mon Mar 20 22:37:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1963: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14496 at Mon Mar 20 22:37:02 UTC 2023 kill -USR1 14496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14496 killed at Mon Mar 20 22:37:02 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14548 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14548 found at Mon Mar 20 22:37:03 UTC 2023 selfserv_9887 with PID 14548 started at Mon Mar 20 22:37:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1964: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14548 at Mon Mar 20 22:37:03 UTC 2023 kill -USR1 14548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14548 killed at Mon Mar 20 22:37:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14600 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14600 found at Mon Mar 20 22:37:03 UTC 2023 selfserv_9887 with PID 14600 started at Mon Mar 20 22:37:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1965: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14600 at Mon Mar 20 22:37:03 UTC 2023 kill -USR1 14600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14600 killed at Mon Mar 20 22:37:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14652 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14652 found at Mon Mar 20 22:37:04 UTC 2023 selfserv_9887 with PID 14652 started at Mon Mar 20 22:37:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1966: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14652 at Mon Mar 20 22:37:04 UTC 2023 kill -USR1 14652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14652 killed at Mon Mar 20 22:37:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14704 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14704 found at Mon Mar 20 22:37:04 UTC 2023 selfserv_9887 with PID 14704 started at Mon Mar 20 22:37:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14704 at Mon Mar 20 22:37:04 UTC 2023 kill -USR1 14704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14704 killed at Mon Mar 20 22:37:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14756 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14756 found at Mon Mar 20 22:37:04 UTC 2023 selfserv_9887 with PID 14756 started at Mon Mar 20 22:37:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14756 at Mon Mar 20 22:37:05 UTC 2023 kill -USR1 14756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14756 killed at Mon Mar 20 22:37:05 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14808 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14808 found at Mon Mar 20 22:37:05 UTC 2023 selfserv_9887 with PID 14808 started at Mon Mar 20 22:37:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1969: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14808 at Mon Mar 20 22:37:05 UTC 2023 kill -USR1 14808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14808 killed at Mon Mar 20 22:37:05 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14861 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14861 found at Mon Mar 20 22:37:05 UTC 2023 selfserv_9887 with PID 14861 started at Mon Mar 20 22:37:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1970: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 14861 at Mon Mar 20 22:37:06 UTC 2023 kill -USR1 14861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14861 killed at Mon Mar 20 22:37:06 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14913 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14913 found at Mon Mar 20 22:37:06 UTC 2023 selfserv_9887 with PID 14913 started at Mon Mar 20 22:37:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1971: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14913 at Mon Mar 20 22:37:06 UTC 2023 kill -USR1 14913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14913 killed at Mon Mar 20 22:37:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14965 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 14965 found at Mon Mar 20 22:37:06 UTC 2023 selfserv_9887 with PID 14965 started at Mon Mar 20 22:37:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1972: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 14965 at Mon Mar 20 22:37:07 UTC 2023 kill -USR1 14965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 14965 killed at Mon Mar 20 22:37:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15017 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15017 found at Mon Mar 20 22:37:07 UTC 2023 selfserv_9887 with PID 15017 started at Mon Mar 20 22:37:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15017 at Mon Mar 20 22:37:07 UTC 2023 kill -USR1 15017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15017 killed at Mon Mar 20 22:37:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15069 found at Mon Mar 20 22:37:07 UTC 2023 selfserv_9887 with PID 15069 started at Mon Mar 20 22:37:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1974: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15069 at Mon Mar 20 22:37:07 UTC 2023 kill -USR1 15069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15069 killed at Mon Mar 20 22:37:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15121 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15121 found at Mon Mar 20 22:37:08 UTC 2023 selfserv_9887 with PID 15121 started at Mon Mar 20 22:37:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1975: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15121 at Mon Mar 20 22:37:08 UTC 2023 kill -USR1 15121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15121 killed at Mon Mar 20 22:37:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15173 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15173 found at Mon Mar 20 22:37:08 UTC 2023 selfserv_9887 with PID 15173 started at Mon Mar 20 22:37:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1976: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15173 at Mon Mar 20 22:37:08 UTC 2023 kill -USR1 15173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15173 killed at Mon Mar 20 22:37:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15225 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15225 found at Mon Mar 20 22:37:09 UTC 2023 selfserv_9887 with PID 15225 started at Mon Mar 20 22:37:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1977: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15225 at Mon Mar 20 22:37:09 UTC 2023 kill -USR1 15225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15225 killed at Mon Mar 20 22:37:09 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15277 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15277 found at Mon Mar 20 22:37:09 UTC 2023 selfserv_9887 with PID 15277 started at Mon Mar 20 22:37:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1978: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15277 at Mon Mar 20 22:37:09 UTC 2023 kill -USR1 15277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15277 killed at Mon Mar 20 22:37:09 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15329 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15329 found at Mon Mar 20 22:37:10 UTC 2023 selfserv_9887 with PID 15329 started at Mon Mar 20 22:37:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15329 at Mon Mar 20 22:37:10 UTC 2023 kill -USR1 15329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15329 killed at Mon Mar 20 22:37:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15381 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15381 found at Mon Mar 20 22:37:10 UTC 2023 selfserv_9887 with PID 15381 started at Mon Mar 20 22:37:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15381 at Mon Mar 20 22:37:10 UTC 2023 kill -USR1 15381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15381 killed at Mon Mar 20 22:37:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15433 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15433 found at Mon Mar 20 22:37:11 UTC 2023 selfserv_9887 with PID 15433 started at Mon Mar 20 22:37:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1981: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15433 at Mon Mar 20 22:37:11 UTC 2023 kill -USR1 15433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15433 killed at Mon Mar 20 22:37:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15485 found at Mon Mar 20 22:37:11 UTC 2023 selfserv_9887 with PID 15485 started at Mon Mar 20 22:37:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1982: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15485 at Mon Mar 20 22:37:11 UTC 2023 kill -USR1 15485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15485 killed at Mon Mar 20 22:37:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15538 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15538 found at Mon Mar 20 22:37:12 UTC 2023 selfserv_9887 with PID 15538 started at Mon Mar 20 22:37:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1983: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15538 at Mon Mar 20 22:37:12 UTC 2023 kill -USR1 15538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15538 killed at Mon Mar 20 22:37:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15590 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15590 found at Mon Mar 20 22:37:12 UTC 2023 selfserv_9887 with PID 15590 started at Mon Mar 20 22:37:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1984: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15590 at Mon Mar 20 22:37:12 UTC 2023 kill -USR1 15590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15590 killed at Mon Mar 20 22:37:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15642 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15642 found at Mon Mar 20 22:37:13 UTC 2023 selfserv_9887 with PID 15642 started at Mon Mar 20 22:37:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1985: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15642 at Mon Mar 20 22:37:13 UTC 2023 kill -USR1 15642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15642 killed at Mon Mar 20 22:37:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15694 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15694 found at Mon Mar 20 22:37:13 UTC 2023 selfserv_9887 with PID 15694 started at Mon Mar 20 22:37:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1986: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15694 at Mon Mar 20 22:37:14 UTC 2023 kill -USR1 15694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15694 killed at Mon Mar 20 22:37:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15746 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15746 found at Mon Mar 20 22:37:14 UTC 2023 selfserv_9887 with PID 15746 started at Mon Mar 20 22:37:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1987: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15746 at Mon Mar 20 22:37:14 UTC 2023 kill -USR1 15746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15746 killed at Mon Mar 20 22:37:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15798 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15798 found at Mon Mar 20 22:37:14 UTC 2023 selfserv_9887 with PID 15798 started at Mon Mar 20 22:37:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1988: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 15798 at Mon Mar 20 22:37:15 UTC 2023 kill -USR1 15798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15798 killed at Mon Mar 20 22:37:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15850 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15850 found at Mon Mar 20 22:37:15 UTC 2023 selfserv_9887 with PID 15850 started at Mon Mar 20 22:37:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1989: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15850 at Mon Mar 20 22:37:15 UTC 2023 kill -USR1 15850 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15850 killed at Mon Mar 20 22:37:15 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15902 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15902 found at Mon Mar 20 22:37:15 UTC 2023 selfserv_9887 with PID 15902 started at Mon Mar 20 22:37:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1990: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15902 at Mon Mar 20 22:37:16 UTC 2023 kill -USR1 15902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15902 killed at Mon Mar 20 22:37:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15954 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 15954 found at Mon Mar 20 22:37:16 UTC 2023 selfserv_9887 with PID 15954 started at Mon Mar 20 22:37:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1991: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 15954 at Mon Mar 20 22:37:16 UTC 2023 kill -USR1 15954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 15954 killed at Mon Mar 20 22:37:16 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16006 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16006 found at Mon Mar 20 22:37:16 UTC 2023 selfserv_9887 with PID 16006 started at Mon Mar 20 22:37:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1992: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16006 at Mon Mar 20 22:37:16 UTC 2023 kill -USR1 16006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16006 killed at Mon Mar 20 22:37:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16058 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16058 found at Mon Mar 20 22:37:17 UTC 2023 selfserv_9887 with PID 16058 started at Mon Mar 20 22:37:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1993: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16058 at Mon Mar 20 22:37:17 UTC 2023 kill -USR1 16058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16058 killed at Mon Mar 20 22:37:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16110 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16110 found at Mon Mar 20 22:37:17 UTC 2023 selfserv_9887 with PID 16110 started at Mon Mar 20 22:37:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1994: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16110 at Mon Mar 20 22:37:17 UTC 2023 kill -USR1 16110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16110 killed at Mon Mar 20 22:37:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:17 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:17 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16162 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16162 found at Mon Mar 20 22:37:18 UTC 2023 selfserv_9887 with PID 16162 started at Mon Mar 20 22:37:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1995: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16162 at Mon Mar 20 22:37:18 UTC 2023 kill -USR1 16162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16162 killed at Mon Mar 20 22:37:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16214 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16214 found at Mon Mar 20 22:37:18 UTC 2023 selfserv_9887 with PID 16214 started at Mon Mar 20 22:37:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1996: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16214 at Mon Mar 20 22:37:18 UTC 2023 kill -USR1 16214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16214 killed at Mon Mar 20 22:37:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16266 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16266 found at Mon Mar 20 22:37:18 UTC 2023 selfserv_9887 with PID 16266 started at Mon Mar 20 22:37:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1997: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16266 at Mon Mar 20 22:37:19 UTC 2023 kill -USR1 16266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16266 killed at Mon Mar 20 22:37:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16318 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16318 found at Mon Mar 20 22:37:19 UTC 2023 selfserv_9887 with PID 16318 started at Mon Mar 20 22:37:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1998: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16318 at Mon Mar 20 22:37:19 UTC 2023 kill -USR1 16318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16318 killed at Mon Mar 20 22:37:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16370 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16370 found at Mon Mar 20 22:37:19 UTC 2023 selfserv_9887 with PID 16370 started at Mon Mar 20 22:37:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1999: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16370 at Mon Mar 20 22:37:19 UTC 2023 kill -USR1 16370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16370 killed at Mon Mar 20 22:37:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16423 found at Mon Mar 20 22:37:20 UTC 2023 selfserv_9887 with PID 16423 started at Mon Mar 20 22:37:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2000: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16423 at Mon Mar 20 22:37:20 UTC 2023 kill -USR1 16423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16423 killed at Mon Mar 20 22:37:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16475 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16475 found at Mon Mar 20 22:37:20 UTC 2023 selfserv_9887 with PID 16475 started at Mon Mar 20 22:37:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2001: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16475 at Mon Mar 20 22:37:20 UTC 2023 kill -USR1 16475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16475 killed at Mon Mar 20 22:37:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:20 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:20 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16528 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16528 found at Mon Mar 20 22:37:21 UTC 2023 selfserv_9887 with PID 16528 started at Mon Mar 20 22:37:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2002: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16528 at Mon Mar 20 22:37:21 UTC 2023 kill -USR1 16528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16528 killed at Mon Mar 20 22:37:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16580 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16580 found at Mon Mar 20 22:37:21 UTC 2023 selfserv_9887 with PID 16580 started at Mon Mar 20 22:37:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2003: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16580 at Mon Mar 20 22:37:21 UTC 2023 kill -USR1 16580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16580 killed at Mon Mar 20 22:37:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16632 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16632 found at Mon Mar 20 22:37:22 UTC 2023 selfserv_9887 with PID 16632 started at Mon Mar 20 22:37:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2004: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16632 at Mon Mar 20 22:37:22 UTC 2023 kill -USR1 16632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16632 killed at Mon Mar 20 22:37:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16684 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16684 found at Mon Mar 20 22:37:22 UTC 2023 selfserv_9887 with PID 16684 started at Mon Mar 20 22:37:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2005: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16684 at Mon Mar 20 22:37:22 UTC 2023 kill -USR1 16684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16684 killed at Mon Mar 20 22:37:22 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16736 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16736 found at Mon Mar 20 22:37:22 UTC 2023 selfserv_9887 with PID 16736 started at Mon Mar 20 22:37:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2006: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16736 at Mon Mar 20 22:37:23 UTC 2023 kill -USR1 16736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16736 killed at Mon Mar 20 22:37:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16788 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16788 found at Mon Mar 20 22:37:23 UTC 2023 selfserv_9887 with PID 16788 started at Mon Mar 20 22:37:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2007: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16788 at Mon Mar 20 22:37:23 UTC 2023 kill -USR1 16788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16788 killed at Mon Mar 20 22:37:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16840 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16840 found at Mon Mar 20 22:37:23 UTC 2023 selfserv_9887 with PID 16840 started at Mon Mar 20 22:37:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2008: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16840 at Mon Mar 20 22:37:24 UTC 2023 kill -USR1 16840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16840 killed at Mon Mar 20 22:37:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16892 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16892 found at Mon Mar 20 22:37:24 UTC 2023 selfserv_9887 with PID 16892 started at Mon Mar 20 22:37:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2009: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16892 at Mon Mar 20 22:37:24 UTC 2023 kill -USR1 16892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16892 killed at Mon Mar 20 22:37:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16944 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16944 found at Mon Mar 20 22:37:25 UTC 2023 selfserv_9887 with PID 16944 started at Mon Mar 20 22:37:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2010: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 16944 at Mon Mar 20 22:37:25 UTC 2023 kill -USR1 16944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16944 killed at Mon Mar 20 22:37:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16996 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 16996 found at Mon Mar 20 22:37:25 UTC 2023 selfserv_9887 with PID 16996 started at Mon Mar 20 22:37:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2011: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 16996 at Mon Mar 20 22:37:25 UTC 2023 kill -USR1 16996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 16996 killed at Mon Mar 20 22:37:25 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17048 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17048 found at Mon Mar 20 22:37:26 UTC 2023 selfserv_9887 with PID 17048 started at Mon Mar 20 22:37:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2012: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17048 at Mon Mar 20 22:37:26 UTC 2023 kill -USR1 17048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17048 killed at Mon Mar 20 22:37:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17101 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17101 found at Mon Mar 20 22:37:26 UTC 2023 selfserv_9887 with PID 17101 started at Mon Mar 20 22:37:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2013: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17101 at Mon Mar 20 22:37:27 UTC 2023 kill -USR1 17101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17101 killed at Mon Mar 20 22:37:27 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17153 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17153 found at Mon Mar 20 22:37:27 UTC 2023 selfserv_9887 with PID 17153 started at Mon Mar 20 22:37:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2014: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17153 at Mon Mar 20 22:37:27 UTC 2023 kill -USR1 17153 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17153 killed at Mon Mar 20 22:37:27 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17205 found at Mon Mar 20 22:37:27 UTC 2023 selfserv_9887 with PID 17205 started at Mon Mar 20 22:37:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2015: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17205 at Mon Mar 20 22:37:28 UTC 2023 kill -USR1 17205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17205 killed at Mon Mar 20 22:37:28 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17259 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17259 found at Mon Mar 20 22:37:28 UTC 2023 selfserv_9887 with PID 17259 started at Mon Mar 20 22:37:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2016: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17259 at Mon Mar 20 22:37:28 UTC 2023 kill -USR1 17259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17259 killed at Mon Mar 20 22:37:28 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17311 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17311 found at Mon Mar 20 22:37:28 UTC 2023 selfserv_9887 with PID 17311 started at Mon Mar 20 22:37:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2017: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17311 at Mon Mar 20 22:37:28 UTC 2023 kill -USR1 17311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17311 killed at Mon Mar 20 22:37:29 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:37:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17393 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17393 found at Mon Mar 20 22:37:29 UTC 2023 selfserv_9887 with PID 17393 started at Mon Mar 20 22:37:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1960: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17393 at Mon Mar 20 22:37:29 UTC 2023 kill -USR1 17393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17393 killed at Mon Mar 20 22:37:29 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17435 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17435 found at Mon Mar 20 22:37:29 UTC 2023 selfserv_9887 with PID 17435 started at Mon Mar 20 22:37:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1961: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17435 at Mon Mar 20 22:37:29 UTC 2023 kill -USR1 17435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17435 killed at Mon Mar 20 22:37:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17474 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17474 found at Mon Mar 20 22:37:30 UTC 2023 selfserv_9887 with PID 17474 started at Mon Mar 20 22:37:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1962: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 17474 at Mon Mar 20 22:37:30 UTC 2023 kill -USR1 17474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17474 killed at Mon Mar 20 22:37:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17520 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17520 found at Mon Mar 20 22:37:30 UTC 2023 selfserv_9887 with PID 17520 started at Mon Mar 20 22:37:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1963: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17520 at Mon Mar 20 22:37:30 UTC 2023 kill -USR1 17520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17520 killed at Mon Mar 20 22:37:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17559 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17559 found at Mon Mar 20 22:37:30 UTC 2023 selfserv_9887 with PID 17559 started at Mon Mar 20 22:37:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1964: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 17559 at Mon Mar 20 22:37:30 UTC 2023 kill -USR1 17559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17559 killed at Mon Mar 20 22:37:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17598 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17598 found at Mon Mar 20 22:37:31 UTC 2023 selfserv_9887 with PID 17598 started at Mon Mar 20 22:37:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1965: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17598 at Mon Mar 20 22:37:31 UTC 2023 kill -USR1 17598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17598 killed at Mon Mar 20 22:37:31 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17637 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17637 found at Mon Mar 20 22:37:31 UTC 2023 selfserv_9887 with PID 17637 started at Mon Mar 20 22:37:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1966: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17637 at Mon Mar 20 22:37:31 UTC 2023 kill -USR1 17637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17637 killed at Mon Mar 20 22:37:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17676 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17676 found at Mon Mar 20 22:37:31 UTC 2023 selfserv_9887 with PID 17676 started at Mon Mar 20 22:37:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17676 at Mon Mar 20 22:37:31 UTC 2023 kill -USR1 17676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17676 killed at Mon Mar 20 22:37:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:31 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:31 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17715 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17715 found at Mon Mar 20 22:37:32 UTC 2023 selfserv_9887 with PID 17715 started at Mon Mar 20 22:37:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17715 at Mon Mar 20 22:37:32 UTC 2023 kill -USR1 17715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17715 killed at Mon Mar 20 22:37:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17754 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17754 found at Mon Mar 20 22:37:32 UTC 2023 selfserv_9887 with PID 17754 started at Mon Mar 20 22:37:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17754 at Mon Mar 20 22:37:32 UTC 2023 kill -USR1 17754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17754 killed at Mon Mar 20 22:37:32 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:32 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:32 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17793 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17793 found at Mon Mar 20 22:37:32 UTC 2023 selfserv_9887 with PID 17793 started at Mon Mar 20 22:37:32 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1970: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17793 at Mon Mar 20 22:37:32 UTC 2023 kill -USR1 17793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17793 killed at Mon Mar 20 22:37:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17833 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17833 found at Mon Mar 20 22:37:33 UTC 2023 selfserv_9887 with PID 17833 started at Mon Mar 20 22:37:33 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1971: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17833 at Mon Mar 20 22:37:33 UTC 2023 kill -USR1 17833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17833 killed at Mon Mar 20 22:37:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17873 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17873 found at Mon Mar 20 22:37:33 UTC 2023 selfserv_9887 with PID 17873 started at Mon Mar 20 22:37:33 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1972: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17873 at Mon Mar 20 22:37:33 UTC 2023 kill -USR1 17873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17873 killed at Mon Mar 20 22:37:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:33 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:33 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17913 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17913 found at Mon Mar 20 22:37:33 UTC 2023 selfserv_9887 with PID 17913 started at Mon Mar 20 22:37:33 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1973: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 17913 at Mon Mar 20 22:37:34 UTC 2023 kill -USR1 17913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17913 killed at Mon Mar 20 22:37:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17954 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17954 found at Mon Mar 20 22:37:34 UTC 2023 selfserv_9887 with PID 17954 started at Mon Mar 20 22:37:34 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1974: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17954 at Mon Mar 20 22:37:34 UTC 2023 kill -USR1 17954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17954 killed at Mon Mar 20 22:37:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17994 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 17994 found at Mon Mar 20 22:37:34 UTC 2023 selfserv_9887 with PID 17994 started at Mon Mar 20 22:37:34 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1975: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 17994 at Mon Mar 20 22:37:34 UTC 2023 kill -USR1 17994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 17994 killed at Mon Mar 20 22:37:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:34 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:34 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18034 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18034 found at Mon Mar 20 22:37:34 UTC 2023 selfserv_9887 with PID 18034 started at Mon Mar 20 22:37:34 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1976: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18034 at Mon Mar 20 22:37:35 UTC 2023 kill -USR1 18034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18034 killed at Mon Mar 20 22:37:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18074 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18074 found at Mon Mar 20 22:37:35 UTC 2023 selfserv_9887 with PID 18074 started at Mon Mar 20 22:37:35 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1977: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18074 at Mon Mar 20 22:37:35 UTC 2023 kill -USR1 18074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18074 killed at Mon Mar 20 22:37:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:37:35 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:35 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18114 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18114 found at Mon Mar 20 22:37:35 UTC 2023 selfserv_9887 with PID 18114 started at Mon Mar 20 22:37:35 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1978: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18114 at Mon Mar 20 22:37:35 UTC 2023 kill -USR1 18114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18114 killed at Mon Mar 20 22:37:35 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -fips false -force FIPS mode disabled. ssl.sh: #1979: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1980: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1981: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1982: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1983: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1984: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -fips true -force FIPS mode enabled. ssl.sh: #1985: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #1986: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1987: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1988: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #1989: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1990: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 22:37:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 18236 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18236 found at Mon Mar 20 22:37:36 UTC 2023 selfserv_9887 with PID 18236 started at Mon Mar 20 22:37:36 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1991: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1992: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1993: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1994: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1995: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1996: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1997: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1998: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1999: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2000: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2001: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2002: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2003: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2004: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2005: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2006: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2007: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2008: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2009: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2010: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2011: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2012: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2013: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2014: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2015: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2016: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2017: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2018: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2019: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2020: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2021: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2022: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2023: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2024: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2025: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2026: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2027: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2028: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2029: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2030: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2031: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2032: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2033: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2034: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2035: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2036: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2037: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2038: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2039: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2040: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2041: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 18236 at Mon Mar 20 22:37:42 UTC 2023 kill -USR1 18236 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18236 killed at Mon Mar 20 22:37:42 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:37:42 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 18794 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 18794 found at Mon Mar 20 22:37:42 UTC 2023 selfserv_9887 with PID 18794 started at Mon Mar 20 22:37:42 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2042: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2043: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2044: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2045: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2046: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2047: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2048: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2049: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2050: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2051: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2052: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2053: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2054: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2055: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2056: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2057: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2058: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2059: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2060: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2061: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2062: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2063: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2064: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2065: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2066: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2067: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2068: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2069: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2070: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2071: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2072: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2073: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2074: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2075: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2076: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2077: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2078: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2079: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2080: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2081: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2082: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2083: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2084: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2085: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2086: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2087: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2088: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2089: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2090: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2091: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2092: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2093: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2094: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2095: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2096: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2097: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2098: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2099: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2100: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2101: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2102: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2105: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2106: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2107: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2108: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2109: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2110: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2111: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2112: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2113: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2114: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2115: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2116: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2117: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 18794 at Mon Mar 20 22:37:56 UTC 2023 kill -USR1 18794 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 18794 killed at Mon Mar 20 22:37:56 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 22:37:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19603 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19603 found at Mon Mar 20 22:37:56 UTC 2023 selfserv_9887 with PID 19603 started at Mon Mar 20 22:37:56 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2118: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2119: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19603 at Mon Mar 20 22:37:56 UTC 2023 kill -USR1 19603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19603 killed at Mon Mar 20 22:37:56 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:37:56 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:56 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19681 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19681 found at Mon Mar 20 22:37:57 UTC 2023 selfserv_9887 with PID 19681 started at Mon Mar 20 22:37:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2118: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19681 at Mon Mar 20 22:37:57 UTC 2023 kill -USR1 19681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19681 killed at Mon Mar 20 22:37:57 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:37:57 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:37:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19733 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19733 found at Mon Mar 20 22:37:57 UTC 2023 selfserv_9887 with PID 19733 started at Mon Mar 20 22:37:57 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2119: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19733 at Mon Mar 20 22:38:21 UTC 2023 kill -USR1 19733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19733 killed at Mon Mar 20 22:38:21 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:38:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:38:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19787 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19787 found at Mon Mar 20 22:38:22 UTC 2023 selfserv_9887 with PID 19787 started at Mon Mar 20 22:38:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2120: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19787 at Mon Mar 20 22:38:22 UTC 2023 kill -USR1 19787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19787 killed at Mon Mar 20 22:38:22 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:38:22 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:38:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19851 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19851 found at Mon Mar 20 22:38:22 UTC 2023 selfserv_9887 with PID 19851 started at Mon Mar 20 22:38:22 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2121: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19851 at Mon Mar 20 22:38:22 UTC 2023 kill -USR1 19851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19851 killed at Mon Mar 20 22:38:22 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:38:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:38:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19903 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19903 found at Mon Mar 20 22:38:23 UTC 2023 selfserv_9887 with PID 19903 started at Mon Mar 20 22:38:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2122: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 19903 at Mon Mar 20 22:38:46 UTC 2023 kill -USR1 19903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19903 killed at Mon Mar 20 22:38:46 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:38:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:38:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 19970 found at Mon Mar 20 22:38:46 UTC 2023 selfserv_9887 with PID 19970 started at Mon Mar 20 22:38:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2123: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 19970 at Mon Mar 20 22:38:46 UTC 2023 kill -USR1 19970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 19970 killed at Mon Mar 20 22:38:46 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:38:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:38:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20034 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20034 found at Mon Mar 20 22:38:47 UTC 2023 selfserv_9887 with PID 20034 started at Mon Mar 20 22:38:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2124: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20034 at Mon Mar 20 22:38:47 UTC 2023 kill -USR1 20034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20034 killed at Mon Mar 20 22:38:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:38:47 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:38:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20086 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20086 found at Mon Mar 20 22:38:47 UTC 2023 selfserv_9887 with PID 20086 started at Mon Mar 20 22:38:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2125: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20086 at Mon Mar 20 22:39:12 UTC 2023 kill -USR1 20086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20086 killed at Mon Mar 20 22:39:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:39:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:39:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20138 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20138 found at Mon Mar 20 22:39:12 UTC 2023 selfserv_9887 with PID 20138 started at Mon Mar 20 22:39:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2126: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20138 at Mon Mar 20 22:39:12 UTC 2023 kill -USR1 20138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20138 killed at Mon Mar 20 22:39:12 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:39:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:39:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20202 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20202 found at Mon Mar 20 22:39:13 UTC 2023 selfserv_9887 with PID 20202 started at Mon Mar 20 22:39:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2127: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20202 at Mon Mar 20 22:39:13 UTC 2023 kill -USR1 20202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20202 killed at Mon Mar 20 22:39:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:39:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:39:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20255 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20255 found at Mon Mar 20 22:39:14 UTC 2023 selfserv_9887 with PID 20255 started at Mon Mar 20 22:39:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2128: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20255 at Mon Mar 20 22:39:38 UTC 2023 kill -USR1 20255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20255 killed at Mon Mar 20 22:39:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:39:38 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:39:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20307 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20307 found at Mon Mar 20 22:39:38 UTC 2023 selfserv_9887 with PID 20307 started at Mon Mar 20 22:39:38 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2129: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20307 at Mon Mar 20 22:39:39 UTC 2023 kill -USR1 20307 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20307 killed at Mon Mar 20 22:39:39 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:39:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:39:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20371 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20371 found at Mon Mar 20 22:39:39 UTC 2023 selfserv_9887 with PID 20371 started at Mon Mar 20 22:39:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2130: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20371 at Mon Mar 20 22:39:39 UTC 2023 kill -USR1 20371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20371 killed at Mon Mar 20 22:39:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:39:39 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:39:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20423 found at Mon Mar 20 22:39:39 UTC 2023 selfserv_9887 with PID 20423 started at Mon Mar 20 22:39:39 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2131: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20423 at Mon Mar 20 22:40:02 UTC 2023 kill -USR1 20423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20423 killed at Mon Mar 20 22:40:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:40:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20491 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20491 found at Mon Mar 20 22:40:03 UTC 2023 selfserv_9887 with PID 20491 started at Mon Mar 20 22:40:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2132: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20491 at Mon Mar 20 22:40:03 UTC 2023 kill -USR1 20491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20491 killed at Mon Mar 20 22:40:03 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:40:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20547 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20547 found at Mon Mar 20 22:40:03 UTC 2023 selfserv_9887 with PID 20547 started at Mon Mar 20 22:40:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2133: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20547 at Mon Mar 20 22:40:03 UTC 2023 kill -USR1 20547 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20547 killed at Mon Mar 20 22:40:04 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:40:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20603 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20603 found at Mon Mar 20 22:40:04 UTC 2023 selfserv_9887 with PID 20603 started at Mon Mar 20 22:40:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2134: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20603 at Mon Mar 20 22:40:04 UTC 2023 kill -USR1 20603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20603 killed at Mon Mar 20 22:40:04 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:40:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20659 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20659 found at Mon Mar 20 22:40:04 UTC 2023 selfserv_9887 with PID 20659 started at Mon Mar 20 22:40:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20659 at Mon Mar 20 22:40:04 UTC 2023 kill -USR1 20659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20659 killed at Mon Mar 20 22:40:05 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:40:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20719 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20719 found at Mon Mar 20 22:40:05 UTC 2023 selfserv_9887 with PID 20719 started at Mon Mar 20 22:40:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2136: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20719 at Mon Mar 20 22:40:29 UTC 2023 kill -USR1 20719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20719 killed at Mon Mar 20 22:40:29 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:40:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20771 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20771 found at Mon Mar 20 22:40:29 UTC 2023 selfserv_9887 with PID 20771 started at Mon Mar 20 22:40:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2137: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20771 at Mon Mar 20 22:40:30 UTC 2023 kill -USR1 20771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20771 killed at Mon Mar 20 22:40:30 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:40:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20831 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20831 found at Mon Mar 20 22:40:30 UTC 2023 selfserv_9887 with PID 20831 started at Mon Mar 20 22:40:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20831 at Mon Mar 20 22:40:53 UTC 2023 kill -USR1 20831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20831 killed at Mon Mar 20 22:40:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:40:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20898 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20898 found at Mon Mar 20 22:40:53 UTC 2023 selfserv_9887 with PID 20898 started at Mon Mar 20 22:40:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 20898 at Mon Mar 20 22:40:53 UTC 2023 kill -USR1 20898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20898 killed at Mon Mar 20 22:40:54 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:40:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:40:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20958 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 20958 found at Mon Mar 20 22:40:54 UTC 2023 selfserv_9887 with PID 20958 started at Mon Mar 20 22:40:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2140: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 20958 at Mon Mar 20 22:41:18 UTC 2023 kill -USR1 20958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 20958 killed at Mon Mar 20 22:41:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:41:18 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:41:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21010 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21010 found at Mon Mar 20 22:41:18 UTC 2023 selfserv_9887 with PID 21010 started at Mon Mar 20 22:41:18 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2141: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21010 at Mon Mar 20 22:41:19 UTC 2023 kill -USR1 21010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21010 killed at Mon Mar 20 22:41:19 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:41:19 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:41:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21070 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21070 found at Mon Mar 20 22:41:19 UTC 2023 selfserv_9887 with PID 21070 started at Mon Mar 20 22:41:19 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2142: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21070 at Mon Mar 20 22:41:43 UTC 2023 kill -USR1 21070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21070 killed at Mon Mar 20 22:41:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:41:43 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:41:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21137 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21137 found at Mon Mar 20 22:41:43 UTC 2023 selfserv_9887 with PID 21137 started at Mon Mar 20 22:41:43 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2143: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21137 at Mon Mar 20 22:41:44 UTC 2023 kill -USR1 21137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21137 killed at Mon Mar 20 22:41:44 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:41:44 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:41:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21197 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21197 found at Mon Mar 20 22:41:44 UTC 2023 selfserv_9887 with PID 21197 started at Mon Mar 20 22:41:44 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21197 at Mon Mar 20 22:42:07 UTC 2023 kill -USR1 21197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21197 killed at Mon Mar 20 22:42:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:42:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21249 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21249 found at Mon Mar 20 22:42:08 UTC 2023 selfserv_9887 with PID 21249 started at Mon Mar 20 22:42:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21249 at Mon Mar 20 22:42:08 UTC 2023 kill -USR1 21249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21249 killed at Mon Mar 20 22:42:08 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:42:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21301 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21301 found at Mon Mar 20 22:42:08 UTC 2023 selfserv_9887 with PID 21301 started at Mon Mar 20 22:42:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21301 at Mon Mar 20 22:42:09 UTC 2023 kill -USR1 21301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21301 killed at Mon Mar 20 22:42:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:42:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21353 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21353 found at Mon Mar 20 22:42:09 UTC 2023 selfserv_9887 with PID 21353 started at Mon Mar 20 22:42:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21353 at Mon Mar 20 22:42:09 UTC 2023 kill -USR1 21353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21353 killed at Mon Mar 20 22:42:09 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:42:09 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:09 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21411 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21411 found at Mon Mar 20 22:42:10 UTC 2023 selfserv_9887 with PID 21411 started at Mon Mar 20 22:42:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21411 at Mon Mar 20 22:42:10 UTC 2023 kill -USR1 21411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21411 killed at Mon Mar 20 22:42:10 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:42:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21469 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21469 found at Mon Mar 20 22:42:10 UTC 2023 selfserv_9887 with PID 21469 started at Mon Mar 20 22:42:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21469 at Mon Mar 20 22:42:10 UTC 2023 kill -USR1 21469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21469 killed at Mon Mar 20 22:42:10 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:42:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21527 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21527 found at Mon Mar 20 22:42:10 UTC 2023 selfserv_9887 with PID 21527 started at Mon Mar 20 22:42:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21527 at Mon Mar 20 22:42:10 UTC 2023 kill -USR1 21527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21527 killed at Mon Mar 20 22:42:10 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:42:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21586 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21586 found at Mon Mar 20 22:42:11 UTC 2023 selfserv_9887 with PID 21586 started at Mon Mar 20 22:42:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21586 at Mon Mar 20 22:42:11 UTC 2023 kill -USR1 21586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21586 killed at Mon Mar 20 22:42:11 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9887 starting at Mon Mar 20 22:42:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21645 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21645 found at Mon Mar 20 22:42:11 UTC 2023 selfserv_9887 with PID 21645 started at Mon Mar 20 22:42:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21645 at Mon Mar 20 22:42:11 UTC 2023 kill -USR1 21645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21645 killed at Mon Mar 20 22:42:11 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9887 starting at Mon Mar 20 22:42:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21703 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21703 found at Mon Mar 20 22:42:12 UTC 2023 selfserv_9887 with PID 21703 started at Mon Mar 20 22:42:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21703 at Mon Mar 20 22:42:12 UTC 2023 kill -USR1 21703 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21703 killed at Mon Mar 20 22:42:12 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9887 starting at Mon Mar 20 22:42:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21761 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21761 found at Mon Mar 20 22:42:12 UTC 2023 selfserv_9887 with PID 21761 started at Mon Mar 20 22:42:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21761 at Mon Mar 20 22:42:12 UTC 2023 kill -USR1 21761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21761 killed at Mon Mar 20 22:42:12 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:42:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21819 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21819 found at Mon Mar 20 22:42:12 UTC 2023 selfserv_9887 with PID 21819 started at Mon Mar 20 22:42:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21819 at Mon Mar 20 22:42:12 UTC 2023 kill -USR1 21819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21819 killed at Mon Mar 20 22:42:13 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9887 starting at Mon Mar 20 22:42:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21877 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21877 found at Mon Mar 20 22:42:13 UTC 2023 selfserv_9887 with PID 21877 started at Mon Mar 20 22:42:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21877 at Mon Mar 20 22:42:13 UTC 2023 kill -USR1 21877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21877 killed at Mon Mar 20 22:42:13 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9887 starting at Mon Mar 20 22:42:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21935 found at Mon Mar 20 22:42:13 UTC 2023 selfserv_9887 with PID 21935 started at Mon Mar 20 22:42:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 21935 at Mon Mar 20 22:42:13 UTC 2023 kill -USR1 21935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21935 killed at Mon Mar 20 22:42:13 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9887 starting at Mon Mar 20 22:42:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21977 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 21977 found at Mon Mar 20 22:42:13 UTC 2023 selfserv_9887 with PID 21977 started at Mon Mar 20 22:42:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2118: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 21977 at Mon Mar 20 22:42:14 UTC 2023 kill -USR1 21977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 21977 killed at Mon Mar 20 22:42:14 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9887 starting at Mon Mar 20 22:42:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22019 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22019 found at Mon Mar 20 22:42:14 UTC 2023 selfserv_9887 with PID 22019 started at Mon Mar 20 22:42:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2119: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9887 with PID 22019 at Mon Mar 20 22:42:14 UTC 2023 kill -USR1 22019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22019 killed at Mon Mar 20 22:42:14 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9887 starting at Mon Mar 20 22:42:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22062 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22062 found at Mon Mar 20 22:42:14 UTC 2023 selfserv_9887 with PID 22062 started at Mon Mar 20 22:42:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2120: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 22062 at Mon Mar 20 22:42:14 UTC 2023 kill -USR1 22062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22062 killed at Mon Mar 20 22:42:14 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9887 starting at Mon Mar 20 22:42:14 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:14 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22104 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22104 found at Mon Mar 20 22:42:15 UTC 2023 selfserv_9887 with PID 22104 started at Mon Mar 20 22:42:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2121: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 22104 at Mon Mar 20 22:42:15 UTC 2023 kill -USR1 22104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22104 killed at Mon Mar 20 22:42:15 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9887 starting at Mon Mar 20 22:42:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22146 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22146 found at Mon Mar 20 22:42:15 UTC 2023 selfserv_9887 with PID 22146 started at Mon Mar 20 22:42:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2122: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 22146 at Mon Mar 20 22:42:15 UTC 2023 kill -USR1 22146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22146 killed at Mon Mar 20 22:42:15 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9887 starting at Mon Mar 20 22:42:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22188 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22188 found at Mon Mar 20 22:42:15 UTC 2023 selfserv_9887 with PID 22188 started at Mon Mar 20 22:42:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2123: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 22188 at Mon Mar 20 22:42:15 UTC 2023 kill -USR1 22188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22188 killed at Mon Mar 20 22:42:15 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9887 starting at Mon Mar 20 22:42:15 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:15 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22230 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22230 found at Mon Mar 20 22:42:16 UTC 2023 selfserv_9887 with PID 22230 started at Mon Mar 20 22:42:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #2124: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9887 with PID 22230 at Mon Mar 20 22:42:16 UTC 2023 kill -USR1 22230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22230 killed at Mon Mar 20 22:42:16 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9887 starting at Mon Mar 20 22:42:16 UTC 2023 selfserv_9887 -D -p 9887 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:42:16 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22273 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22273 found at Mon Mar 20 22:42:16 UTC 2023 selfserv_9887 with PID 22273 started at Mon Mar 20 22:42:16 UTC 2023 strsclnt -q -p 9887 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Mon Mar 20 22:42:16 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Mar 20 22:44:23 UTC 2023 ssl.sh: #2125: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9887 with PID 22273 at Mon Mar 20 22:44:23 UTC 2023 kill -USR1 22273 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22273 killed at Mon Mar 20 22:44:23 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:44:23 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22355 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22355 found at Mon Mar 20 22:44:23 UTC 2023 selfserv_9887 with PID 22355 started at Mon Mar 20 22:44:23 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2126: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22355 at Mon Mar 20 22:44:23 UTC 2023 kill -USR1 22355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22355 killed at Mon Mar 20 22:44:23 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22397 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22397 found at Mon Mar 20 22:44:24 UTC 2023 selfserv_9887 with PID 22397 started at Mon Mar 20 22:44:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2127: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22397 at Mon Mar 20 22:44:24 UTC 2023 kill -USR1 22397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22397 killed at Mon Mar 20 22:44:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22437 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22437 found at Mon Mar 20 22:44:24 UTC 2023 selfserv_9887 with PID 22437 started at Mon Mar 20 22:44:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2128: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22437 at Mon Mar 20 22:44:24 UTC 2023 kill -USR1 22437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22437 killed at Mon Mar 20 22:44:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:24 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22476 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22476 found at Mon Mar 20 22:44:24 UTC 2023 selfserv_9887 with PID 22476 started at Mon Mar 20 22:44:24 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2129: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22476 at Mon Mar 20 22:44:24 UTC 2023 kill -USR1 22476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22476 killed at Mon Mar 20 22:44:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22515 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22515 found at Mon Mar 20 22:44:25 UTC 2023 selfserv_9887 with PID 22515 started at Mon Mar 20 22:44:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2130: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 22515 at Mon Mar 20 22:44:25 UTC 2023 kill -USR1 22515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22515 killed at Mon Mar 20 22:44:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22554 found at Mon Mar 20 22:44:25 UTC 2023 selfserv_9887 with PID 22554 started at Mon Mar 20 22:44:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22554 at Mon Mar 20 22:44:25 UTC 2023 kill -USR1 22554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22554 killed at Mon Mar 20 22:44:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:25 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22593 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22593 found at Mon Mar 20 22:44:25 UTC 2023 selfserv_9887 with PID 22593 started at Mon Mar 20 22:44:25 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2132: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22593 at Mon Mar 20 22:44:26 UTC 2023 kill -USR1 22593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22593 killed at Mon Mar 20 22:44:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22632 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22632 found at Mon Mar 20 22:44:26 UTC 2023 selfserv_9887 with PID 22632 started at Mon Mar 20 22:44:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2133: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22632 at Mon Mar 20 22:44:26 UTC 2023 kill -USR1 22632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22632 killed at Mon Mar 20 22:44:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22671 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22671 found at Mon Mar 20 22:44:26 UTC 2023 selfserv_9887 with PID 22671 started at Mon Mar 20 22:44:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22671 at Mon Mar 20 22:44:26 UTC 2023 kill -USR1 22671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22671 killed at Mon Mar 20 22:44:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:26 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:26 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22710 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22710 found at Mon Mar 20 22:44:27 UTC 2023 selfserv_9887 with PID 22710 started at Mon Mar 20 22:44:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22710 at Mon Mar 20 22:44:27 UTC 2023 kill -USR1 22710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22710 killed at Mon Mar 20 22:44:27 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22749 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22749 found at Mon Mar 20 22:44:27 UTC 2023 selfserv_9887 with PID 22749 started at Mon Mar 20 22:44:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2136: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22749 at Mon Mar 20 22:44:27 UTC 2023 kill -USR1 22749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22749 killed at Mon Mar 20 22:44:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22789 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22789 found at Mon Mar 20 22:44:27 UTC 2023 selfserv_9887 with PID 22789 started at Mon Mar 20 22:44:27 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2137: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22789 at Mon Mar 20 22:44:27 UTC 2023 kill -USR1 22789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22789 killed at Mon Mar 20 22:44:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:27 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:27 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22829 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22829 found at Mon Mar 20 22:44:28 UTC 2023 selfserv_9887 with PID 22829 started at Mon Mar 20 22:44:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2138: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22829 at Mon Mar 20 22:44:28 UTC 2023 kill -USR1 22829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22829 killed at Mon Mar 20 22:44:28 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22869 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22869 found at Mon Mar 20 22:44:28 UTC 2023 selfserv_9887 with PID 22869 started at Mon Mar 20 22:44:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2139: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 22869 at Mon Mar 20 22:44:28 UTC 2023 kill -USR1 22869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22869 killed at Mon Mar 20 22:44:28 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:28 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:28 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22909 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22909 found at Mon Mar 20 22:44:28 UTC 2023 selfserv_9887 with PID 22909 started at Mon Mar 20 22:44:28 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2140: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22909 at Mon Mar 20 22:44:28 UTC 2023 kill -USR1 22909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22909 killed at Mon Mar 20 22:44:28 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22949 found at Mon Mar 20 22:44:29 UTC 2023 selfserv_9887 with PID 22949 started at Mon Mar 20 22:44:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2141: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22949 at Mon Mar 20 22:44:29 UTC 2023 kill -USR1 22949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22949 killed at Mon Mar 20 22:44:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22989 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 22989 found at Mon Mar 20 22:44:29 UTC 2023 selfserv_9887 with PID 22989 started at Mon Mar 20 22:44:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2142: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 22989 at Mon Mar 20 22:44:29 UTC 2023 kill -USR1 22989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 22989 killed at Mon Mar 20 22:44:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23029 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23029 found at Mon Mar 20 22:44:29 UTC 2023 selfserv_9887 with PID 23029 started at Mon Mar 20 22:44:29 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2143: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23029 at Mon Mar 20 22:44:30 UTC 2023 kill -USR1 23029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23029 killed at Mon Mar 20 22:44:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:44:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23069 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23069 found at Mon Mar 20 22:44:30 UTC 2023 selfserv_9887 with PID 23069 started at Mon Mar 20 22:44:30 UTC 2023 strsclnt -q -p 9887 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2144: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23069 at Mon Mar 20 22:44:30 UTC 2023 kill -USR1 23069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23069 killed at Mon Mar 20 22:44:30 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9887 starting at Mon Mar 20 22:44:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 23109 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23109 found at Mon Mar 20 22:44:30 UTC 2023 selfserv_9887 with PID 23109 started at Mon Mar 20 22:44:30 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2145: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2146: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2147: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2148: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2149: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2150: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2151: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2152: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2153: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2154: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2155: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2156: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2157: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2158: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2159: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2160: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2161: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2162: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2163: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2164: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2165: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2166: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2167: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2168: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2169: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2170: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2171: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2172: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2173: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2174: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2175: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2176: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2177: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2178: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2179: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2180: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2181: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2182: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2183: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2184: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2185: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2186: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2187: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2188: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2189: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2190: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2191: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2192: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2193: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2194: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2195: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9887 with PID 23109 at Mon Mar 20 22:44:36 UTC 2023 kill -USR1 23109 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23109 killed at Mon Mar 20 22:44:36 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9887 starting at Mon Mar 20 22:44:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.30514\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9887 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 23662 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 23662 found at Mon Mar 20 22:44:36 UTC 2023 selfserv_9887 with PID 23662 started at Mon Mar 20 22:44:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2196: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2197: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2198: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2199: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2200: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2201: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2202: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2203: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2204: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2205: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2206: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2207: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2208: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2209: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2210: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2211: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2212: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2213: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2214: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2215: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2216: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2217: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2218: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2219: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2220: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2221: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2222: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2223: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2224: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2225: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2226: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2227: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2228: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2229: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2230: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2231: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2232: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2233: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2234: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2235: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2236: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2237: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2238: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2239: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2240: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2241: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2242: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2243: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2244: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2245: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2246: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2247: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2248: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2249: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2250: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2251: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2252: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2253: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2254: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2255: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2256: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2257: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2258: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2259: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2260: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2261: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2262: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2263: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2264: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2265: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2266: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2267: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2268: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2269: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2270: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9887 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9887 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2271: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 23662 at Mon Mar 20 22:44:46 UTC 2023 kill -USR1 23662 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 23662 killed at Mon Mar 20 22:44:46 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:44:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24502 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24502 found at Mon Mar 20 22:44:46 UTC 2023 selfserv_9887 with PID 24502 started at Mon Mar 20 22:44:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2272: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24502 at Mon Mar 20 22:44:46 UTC 2023 kill -USR1 24502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24502 killed at Mon Mar 20 22:44:46 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:44:46 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:44:46 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24554 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24554 found at Mon Mar 20 22:44:47 UTC 2023 selfserv_9887 with PID 24554 started at Mon Mar 20 22:44:47 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2273: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24554 at Mon Mar 20 22:45:12 UTC 2023 kill -USR1 24554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24554 killed at Mon Mar 20 22:45:12 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:45:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:45:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24606 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24606 found at Mon Mar 20 22:45:12 UTC 2023 selfserv_9887 with PID 24606 started at Mon Mar 20 22:45:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2274: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24606 at Mon Mar 20 22:45:12 UTC 2023 kill -USR1 24606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24606 killed at Mon Mar 20 22:45:12 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:45:12 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:45:12 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24671 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24671 found at Mon Mar 20 22:45:13 UTC 2023 selfserv_9887 with PID 24671 started at Mon Mar 20 22:45:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2275: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24671 at Mon Mar 20 22:45:13 UTC 2023 kill -USR1 24671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24671 killed at Mon Mar 20 22:45:13 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:45:13 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:45:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24723 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24723 found at Mon Mar 20 22:45:13 UTC 2023 selfserv_9887 with PID 24723 started at Mon Mar 20 22:45:13 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2276: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24723 at Mon Mar 20 22:45:36 UTC 2023 kill -USR1 24723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24723 killed at Mon Mar 20 22:45:36 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:45:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:45:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24775 found at Mon Mar 20 22:45:36 UTC 2023 selfserv_9887 with PID 24775 started at Mon Mar 20 22:45:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24775 at Mon Mar 20 22:45:37 UTC 2023 kill -USR1 24775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24775 killed at Mon Mar 20 22:45:37 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:45:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:45:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24839 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24839 found at Mon Mar 20 22:45:37 UTC 2023 selfserv_9887 with PID 24839 started at Mon Mar 20 22:45:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2278: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24839 at Mon Mar 20 22:45:37 UTC 2023 kill -USR1 24839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24839 killed at Mon Mar 20 22:45:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:45:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:45:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24892 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24892 found at Mon Mar 20 22:45:37 UTC 2023 selfserv_9887 with PID 24892 started at Mon Mar 20 22:45:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2279: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 24892 at Mon Mar 20 22:46:02 UTC 2023 kill -USR1 24892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24892 killed at Mon Mar 20 22:46:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24959 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 24959 found at Mon Mar 20 22:46:03 UTC 2023 selfserv_9887 with PID 24959 started at Mon Mar 20 22:46:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 24959 at Mon Mar 20 22:46:03 UTC 2023 kill -USR1 24959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 24959 killed at Mon Mar 20 22:46:03 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25023 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25023 found at Mon Mar 20 22:46:03 UTC 2023 selfserv_9887 with PID 25023 started at Mon Mar 20 22:46:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2281: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25023 at Mon Mar 20 22:46:03 UTC 2023 kill -USR1 25023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25023 killed at Mon Mar 20 22:46:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:46:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25075 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25075 found at Mon Mar 20 22:46:04 UTC 2023 selfserv_9887 with PID 25075 started at Mon Mar 20 22:46:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2282: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25075 at Mon Mar 20 22:46:29 UTC 2023 kill -USR1 25075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25075 killed at Mon Mar 20 22:46:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25127 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25127 found at Mon Mar 20 22:46:29 UTC 2023 selfserv_9887 with PID 25127 started at Mon Mar 20 22:46:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2283: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25127 at Mon Mar 20 22:46:29 UTC 2023 kill -USR1 25127 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25127 killed at Mon Mar 20 22:46:29 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:29 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:29 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25191 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25191 found at Mon Mar 20 22:46:30 UTC 2023 selfserv_9887 with PID 25191 started at Mon Mar 20 22:46:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2284: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25191 at Mon Mar 20 22:46:30 UTC 2023 kill -USR1 25191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25191 killed at Mon Mar 20 22:46:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:46:30 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25243 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25243 found at Mon Mar 20 22:46:30 UTC 2023 selfserv_9887 with PID 25243 started at Mon Mar 20 22:46:30 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2285: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25243 at Mon Mar 20 22:46:53 UTC 2023 kill -USR1 25243 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25243 killed at Mon Mar 20 22:46:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:53 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:53 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25313 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25313 found at Mon Mar 20 22:46:54 UTC 2023 selfserv_9887 with PID 25313 started at Mon Mar 20 22:46:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2286: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25313 at Mon Mar 20 22:46:54 UTC 2023 kill -USR1 25313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25313 killed at Mon Mar 20 22:46:54 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25369 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25369 found at Mon Mar 20 22:46:54 UTC 2023 selfserv_9887 with PID 25369 started at Mon Mar 20 22:46:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2287: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25369 at Mon Mar 20 22:46:54 UTC 2023 kill -USR1 25369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25369 killed at Mon Mar 20 22:46:54 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:54 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:54 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25425 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25425 found at Mon Mar 20 22:46:55 UTC 2023 selfserv_9887 with PID 25425 started at Mon Mar 20 22:46:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2288: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25425 at Mon Mar 20 22:46:55 UTC 2023 kill -USR1 25425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25425 killed at Mon Mar 20 22:46:55 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:46:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25481 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25481 found at Mon Mar 20 22:46:55 UTC 2023 selfserv_9887 with PID 25481 started at Mon Mar 20 22:46:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25481 at Mon Mar 20 22:46:55 UTC 2023 kill -USR1 25481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25481 killed at Mon Mar 20 22:46:55 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:46:55 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:46:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25541 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25541 found at Mon Mar 20 22:46:55 UTC 2023 selfserv_9887 with PID 25541 started at Mon Mar 20 22:46:55 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2290: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25541 at Mon Mar 20 22:47:21 UTC 2023 kill -USR1 25541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25541 killed at Mon Mar 20 22:47:21 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:47:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:47:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25593 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25593 found at Mon Mar 20 22:47:21 UTC 2023 selfserv_9887 with PID 25593 started at Mon Mar 20 22:47:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2291: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25593 at Mon Mar 20 22:47:21 UTC 2023 kill -USR1 25593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25593 killed at Mon Mar 20 22:47:21 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:47:21 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:47:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25653 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25653 found at Mon Mar 20 22:47:21 UTC 2023 selfserv_9887 with PID 25653 started at Mon Mar 20 22:47:21 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25653 at Mon Mar 20 22:47:44 UTC 2023 kill -USR1 25653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25653 killed at Mon Mar 20 22:47:45 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:47:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:47:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25720 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25720 found at Mon Mar 20 22:47:45 UTC 2023 selfserv_9887 with PID 25720 started at Mon Mar 20 22:47:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25720 at Mon Mar 20 22:47:45 UTC 2023 kill -USR1 25720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25720 killed at Mon Mar 20 22:47:45 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:47:45 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:47:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25780 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25780 found at Mon Mar 20 22:47:45 UTC 2023 selfserv_9887 with PID 25780 started at Mon Mar 20 22:47:45 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2294: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25780 at Mon Mar 20 22:48:10 UTC 2023 kill -USR1 25780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25780 killed at Mon Mar 20 22:48:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:48:10 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:48:10 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25834 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25834 found at Mon Mar 20 22:48:11 UTC 2023 selfserv_9887 with PID 25834 started at Mon Mar 20 22:48:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2295: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25834 at Mon Mar 20 22:48:11 UTC 2023 kill -USR1 25834 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25834 killed at Mon Mar 20 22:48:11 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:48:11 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:48:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25894 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25894 found at Mon Mar 20 22:48:11 UTC 2023 selfserv_9887 with PID 25894 started at Mon Mar 20 22:48:11 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2296: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 25894 at Mon Mar 20 22:48:36 UTC 2023 kill -USR1 25894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25894 killed at Mon Mar 20 22:48:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:48:36 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:48:36 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25947 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 25947 found at Mon Mar 20 22:48:37 UTC 2023 selfserv_9887 with PID 25947 started at Mon Mar 20 22:48:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 25947 at Mon Mar 20 22:48:37 UTC 2023 kill -USR1 25947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 25947 killed at Mon Mar 20 22:48:37 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9887 starting at Mon Mar 20 22:48:37 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:48:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26007 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26007 found at Mon Mar 20 22:48:37 UTC 2023 selfserv_9887 with PID 26007 started at Mon Mar 20 22:48:37 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26007 at Mon Mar 20 22:49:00 UTC 2023 kill -USR1 26007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26007 killed at Mon Mar 20 22:49:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:49:00 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26074 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26074 found at Mon Mar 20 22:49:00 UTC 2023 selfserv_9887 with PID 26074 started at Mon Mar 20 22:49:00 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26074 at Mon Mar 20 22:49:01 UTC 2023 kill -USR1 26074 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26074 killed at Mon Mar 20 22:49:01 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:49:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26126 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26126 found at Mon Mar 20 22:49:01 UTC 2023 selfserv_9887 with PID 26126 started at Mon Mar 20 22:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26126 at Mon Mar 20 22:49:01 UTC 2023 kill -USR1 26126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26126 killed at Mon Mar 20 22:49:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9887 starting at Mon Mar 20 22:49:01 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.30514\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26179 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26179 found at Mon Mar 20 22:49:01 UTC 2023 selfserv_9887 with PID 26179 started at Mon Mar 20 22:49:01 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26179 at Mon Mar 20 22:49:02 UTC 2023 kill -USR1 26179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26179 killed at Mon Mar 20 22:49:02 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9887 starting at Mon Mar 20 22:49:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26261 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26261 found at Mon Mar 20 22:49:02 UTC 2023 selfserv_9887 with PID 26261 started at Mon Mar 20 22:49:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2272: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26261 at Mon Mar 20 22:49:02 UTC 2023 kill -USR1 26261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26261 killed at Mon Mar 20 22:49:02 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26303 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26303 found at Mon Mar 20 22:49:02 UTC 2023 selfserv_9887 with PID 26303 started at Mon Mar 20 22:49:02 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2273: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26303 at Mon Mar 20 22:49:02 UTC 2023 kill -USR1 26303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26303 killed at Mon Mar 20 22:49:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:02 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26342 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26342 found at Mon Mar 20 22:49:03 UTC 2023 selfserv_9887 with PID 26342 started at Mon Mar 20 22:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2274: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 26342 at Mon Mar 20 22:49:03 UTC 2023 kill -USR1 26342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26342 killed at Mon Mar 20 22:49:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26381 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26381 found at Mon Mar 20 22:49:03 UTC 2023 selfserv_9887 with PID 26381 started at Mon Mar 20 22:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2275: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26381 at Mon Mar 20 22:49:03 UTC 2023 kill -USR1 26381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26381 killed at Mon Mar 20 22:49:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:03 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26420 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26420 found at Mon Mar 20 22:49:03 UTC 2023 selfserv_9887 with PID 26420 started at Mon Mar 20 22:49:03 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2276: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9887 with PID 26420 at Mon Mar 20 22:49:03 UTC 2023 kill -USR1 26420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26420 killed at Mon Mar 20 22:49:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26459 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26459 found at Mon Mar 20 22:49:04 UTC 2023 selfserv_9887 with PID 26459 started at Mon Mar 20 22:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26459 at Mon Mar 20 22:49:04 UTC 2023 kill -USR1 26459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26459 killed at Mon Mar 20 22:49:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26498 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26498 found at Mon Mar 20 22:49:04 UTC 2023 selfserv_9887 with PID 26498 started at Mon Mar 20 22:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2278: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26498 at Mon Mar 20 22:49:04 UTC 2023 kill -USR1 26498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26498 killed at Mon Mar 20 22:49:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:04 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26537 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26537 found at Mon Mar 20 22:49:04 UTC 2023 selfserv_9887 with PID 26537 started at Mon Mar 20 22:49:04 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26537 at Mon Mar 20 22:49:05 UTC 2023 kill -USR1 26537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26537 killed at Mon Mar 20 22:49:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26577 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26577 found at Mon Mar 20 22:49:05 UTC 2023 selfserv_9887 with PID 26577 started at Mon Mar 20 22:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26577 at Mon Mar 20 22:49:05 UTC 2023 kill -USR1 26577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26577 killed at Mon Mar 20 22:49:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26616 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26616 found at Mon Mar 20 22:49:05 UTC 2023 selfserv_9887 with PID 26616 started at Mon Mar 20 22:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2281: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26616 at Mon Mar 20 22:49:05 UTC 2023 kill -USR1 26616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26616 killed at Mon Mar 20 22:49:05 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:05 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:05 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26655 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26655 found at Mon Mar 20 22:49:06 UTC 2023 selfserv_9887 with PID 26655 started at Mon Mar 20 22:49:06 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2282: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26655 at Mon Mar 20 22:49:06 UTC 2023 kill -USR1 26655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26655 killed at Mon Mar 20 22:49:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26695 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26695 found at Mon Mar 20 22:49:06 UTC 2023 selfserv_9887 with PID 26695 started at Mon Mar 20 22:49:06 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2283: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26695 at Mon Mar 20 22:49:06 UTC 2023 kill -USR1 26695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26695 killed at Mon Mar 20 22:49:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26735 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26735 found at Mon Mar 20 22:49:06 UTC 2023 selfserv_9887 with PID 26735 started at Mon Mar 20 22:49:06 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2284: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26735 at Mon Mar 20 22:49:06 UTC 2023 kill -USR1 26735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26735 killed at Mon Mar 20 22:49:06 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:06 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:06 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26775 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26775 found at Mon Mar 20 22:49:07 UTC 2023 selfserv_9887 with PID 26775 started at Mon Mar 20 22:49:07 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2285: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9887 with PID 26775 at Mon Mar 20 22:49:07 UTC 2023 kill -USR1 26775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26775 killed at Mon Mar 20 22:49:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26815 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26815 found at Mon Mar 20 22:49:07 UTC 2023 selfserv_9887 with PID 26815 started at Mon Mar 20 22:49:07 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2286: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26815 at Mon Mar 20 22:49:07 UTC 2023 kill -USR1 26815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26815 killed at Mon Mar 20 22:49:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:07 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:07 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26855 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26855 found at Mon Mar 20 22:49:07 UTC 2023 selfserv_9887 with PID 26855 started at Mon Mar 20 22:49:07 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2287: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26855 at Mon Mar 20 22:49:07 UTC 2023 kill -USR1 26855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26855 killed at Mon Mar 20 22:49:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26895 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26895 found at Mon Mar 20 22:49:08 UTC 2023 selfserv_9887 with PID 26895 started at Mon Mar 20 22:49:08 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2288: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26895 at Mon Mar 20 22:49:08 UTC 2023 kill -USR1 26895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26895 killed at Mon Mar 20 22:49:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26935 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26935 found at Mon Mar 20 22:49:08 UTC 2023 selfserv_9887 with PID 26935 started at Mon Mar 20 22:49:08 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2289: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26935 at Mon Mar 20 22:49:08 UTC 2023 kill -USR1 26935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26935 killed at Mon Mar 20 22:49:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9887 starting at Mon Mar 20 22:49:08 UTC 2023 selfserv_9887 -D -p 9887 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.30514\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9887 at Mon Mar 20 22:49:08 UTC 2023 tstclnt -p 9887 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26975 >/dev/null 2>/dev/null No server to kill selfserv_9887 with PID 26975 found at Mon Mar 20 22:49:08 UTC 2023 selfserv_9887 with PID 26975 started at Mon Mar 20 22:49:08 UTC 2023 strsclnt -q -p 9887 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2290: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9887 with PID 26975 at Mon Mar 20 22:49:09 UTC 2023 kill -USR1 26975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9887 -b -p 9887 2>/dev/null; selfserv_9887 with PID 26975 killed at Mon Mar 20 22:49:09 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -fips false -force FIPS mode disabled. ssl.sh: #2291: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #2292: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2293: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2294: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #2295: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2296: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 20 22:49:09 UTC 2023 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="standard pkix upgradedb sharedb threadunsafe" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec" NSS_SSL_TESTS="crl iopr policy normal_normal fips_normal normal_fips" NSS_SSL_RUN="cov auth stapling signed_cert_timestamps scheme" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= NSS_DISABLE_HW_AES= NSS_DISABLE_HW_SHA1= NSS_DISABLE_HW_SHA2= NSS_DISABLE_PCLMUL= NSS_DISABLE_AVX= NSS_DISABLE_ARM_NEON= NSS_DISABLE_SSSE3= Tests summary: -------------- Passed: 22261 Failed: 0 Failed with core: 0 ASan failures: 0 Unknown status: 0 + popd ~/build/BUILD/nss-3.79 + killall selfserv_9887 selfserv_9887: no process found + : ++ grep -c -- '- FAILED$' ./tests_results/security/localhost.1/output.log + TEST_FAILURES=0 + GREP_EXIT_STATUS=1 okay: test suite detected no failures test suite completed + '[' 1 -eq 1 ']' + echo 'okay: test suite detected no failures' + echo 'test suite completed' + exit 0 Processing files: nss-3.79.0-5.el7_9.i686 Provides: config(nss) = 3.79.0-5.el7_9 libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.10.2) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.11.9) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.10) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.4) libnss3.so(NSS_3.12.5) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.7) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.13.2) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.15.4) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.19) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.2.1) libnss3.so(NSS_3.21) libnss3.so(NSS_3.22) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.30) libnss3.so(NSS_3.31) libnss3.so(NSS_3.33) libnss3.so(NSS_3.34) libnss3.so(NSS_3.39) libnss3.so(NSS_3.4) libnss3.so(NSS_3.43) libnss3.so(NSS_3.44) libnss3.so(NSS_3.45) libnss3.so(NSS_3.47) libnss3.so(NSS_3.5) libnss3.so(NSS_3.52) libnss3.so(NSS_3.53) libnss3.so(NSS_3.55) libnss3.so(NSS_3.58) libnss3.so(NSS_3.59) libnss3.so(NSS_3.6) libnss3.so(NSS_3.62) libnss3.so(NSS_3.65) libnss3.so(NSS_3.66) libnss3.so(NSS_3.7) libnss3.so(NSS_3.7.1) libnss3.so(NSS_3.77) libnss3.so(NSS_3.79) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssckbi.so libnssckbi.so(NSS_3.1) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.12.10) libsmime3.so(NSS_3.12.2) libsmime3.so(NSS_3.13) libsmime3.so(NSS_3.15) libsmime3.so(NSS_3.16) libsmime3.so(NSS_3.18) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.2.1) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.4.1) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.7) libsmime3.so(NSS_3.7.2) libsmime3.so(NSS_3.8) libsmime3.so(NSS_3.9) libsmime3.so(NSS_3.9.3) libssl3.so libssl3.so(NSS_3.11.4) libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.10) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.2.1) libssl3.so(NSS_3.20) libssl3.so(NSS_3.21) libssl3.so(NSS_3.22) libssl3.so(NSS_3.23) libssl3.so(NSS_3.24) libssl3.so(NSS_3.27) libssl3.so(NSS_3.28) libssl3.so(NSS_3.30) libssl3.so(NSS_3.30.0.1) libssl3.so(NSS_3.33) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libssl3.so(NSS_3.77) nss = 3.79.0-5.el7_9 nss(x86-32) = 3.79.0-5.el7_9 Requires(interp): /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /bin/sh /usr/sbin/update-alternatives Requires(postun): /bin/sh /usr/sbin/update-alternatives Requires: libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.3) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libdl.so.2 libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.13) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.21) libnss3.so(NSS_3.22) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.52) libnss3.so(NSS_3.58) libnss3.so(NSS_3.6) libnss3.so(NSS_3.62) libnss3.so(NSS_3.65) libnss3.so(NSS_3.66) libnss3.so(NSS_3.7) libnss3.so(NSS_3.77) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.13) libnssutil3.so(NSSUTIL_3.14) libnssutil3.so(NSSUTIL_3.15) libnssutil3.so(NSSUTIL_3.17.1) libnssutil3.so(NSSUTIL_3.21) libnssutil3.so(NSSUTIL_3.24) libnssutil3.so(NSSUTIL_3.31) libnssutil3.so(NSSUTIL_3.38) libnssutil3.so(NSSUTIL_3.39) libnssutil3.so(NSSUTIL_3.59) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) rtld(GNU_HASH) Processing files: nss-tools-3.79.0-5.el7_9.i686 Provides: nss-tools = 3.79.0-5.el7_9 nss-tools(x86-32) = 3.79.0-5.el7_9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.3) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libdl.so.2 libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.15) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.2) libnss3.so(NSS_3.21) libnss3.so(NSS_3.3) libnss3.so(NSS_3.30) libnss3.so(NSS_3.31) libnss3.so(NSS_3.33) libnss3.so(NSS_3.34) libnss3.so(NSS_3.39) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.52) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.7) libnssutil3.so(NSSUTIL_3.15) libnssutil3.so(NSSUTIL_3.24) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.9.3) libsoftokn3.so libssl3.so libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.20) libssl3.so(NSS_3.22) libssl3.so(NSS_3.24) libssl3.so(NSS_3.27) libssl3.so(NSS_3.28) libssl3.so(NSS_3.33) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libz.so.1 rtld(GNU_HASH) Processing files: nss-sysinit-3.79.0-5.el7_9.i686 Provides: libnsssysinit.so libnsssysinit.so(NSS_3.15) nss-sysinit = 3.79.0-5.el7_9 nss-sysinit(x86-32) = 3.79.0-5.el7_9 nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.17) libc.so.6(GLIBC_2.4) libdl.so.2 libnspr4.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.14) libplc4.so libplds4.so libpthread.so.0 rtld(GNU_HASH) Processing files: nss-devel-3.79.0-5.el7_9.i686 Provides: nss-devel = 3.79.0-5.el7_9 nss-devel(x86-32) = 3.79.0-5.el7_9 nss-static = 3.79.0-5.el7_9 pkgconfig(nss) = 3.79.0 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.34.0 pkgconfig(nss-util) >= 3.79.0 Processing files: nss-pkcs11-devel-3.79.0-5.el7_9.i686 Provides: nss-pkcs11-devel = 3.79.0-5.el7_9 nss-pkcs11-devel(x86-32) = 3.79.0-5.el7_9 nss-pkcs11-devel-static = 3.79.0-5.el7_9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.79.0-5.el7_9.i686 Provides: nss-debuginfo = 3.79.0-5.el7_9 nss-debuginfo(x86-32) = 3.79.0-5.el7_9 Requires(rpmlib): rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(CompressedFileNames) <= 3.0.4-1 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 Wrote: /builddir/build/RPMS/nss-3.79.0-5.el7_9.i686.rpm Wrote: /builddir/build/RPMS/nss-tools-3.79.0-5.el7_9.i686.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.79.0-5.el7_9.i686.rpm Wrote: /builddir/build/RPMS/nss-devel-3.79.0-5.el7_9.i686.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.79.0-5.el7_9.i686.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.79.0-5.el7_9.i686.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.eJb1YQ + umask 022 + cd /builddir/build/BUILD + cd nss-3.79 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.79.0-5.el7_9.i386 + exit 0 Child return code was: 0